fffffffffff, 0x0) 21:59:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 21:59:12 executing program 2: write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="1b255c1e9ac9", @private, @local, @broadcast}}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080), 0x4e) 21:59:12 executing program 5: clock_nanosleep(0x2, 0x1, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 21:59:12 executing program 1: pipe2(&(0x7f0000000080), 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) 21:59:12 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) 21:59:12 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000580)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 21:59:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={0x0}}, 0x0) 21:59:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0x5, 0x5}) syz_emit_ethernet(0x25e, &(0x7f00000019c0)={@multicast, @empty=[0x5, 0xfc], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00c4c8", 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "ffffefffa0f8ca1cc8000800"}, {0x3, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb99e5ff38403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0642a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba423999086baa39eb8164e240069f656d3a057ecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}]}}}}}}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 21:59:12 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') clock_getres(0x0, &(0x7f0000000140)) 21:59:12 executing program 4: creat(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 415.763905] IPv6: addrconf: prefix option has invalid lifetime [ 415.791237] IPv6: addrconf: prefix option has invalid lifetime [ 415.870752] audit: type=1804 audit(1603231152.380:39): pid=18540 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir145786325/syzkaller.lu4rEz/649/file0" dev="sda1" ino=15857 res=1 [ 415.905430] audit: type=1804 audit(1603231152.380:40): pid=18540 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir145786325/syzkaller.lu4rEz/649/file0" dev="sda1" ino=15857 res=1 21:59:15 executing program 0: io_setup(0x40002, &(0x7f0000000040)) 21:59:15 executing program 1: r0 = eventfd(0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="8e4a6bcdc694ff3837", 0x9}], 0x1) 21:59:15 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self\x00', 0x200000, 0x0) 21:59:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) 21:59:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 21:59:15 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="ff", 0x1}], 0x1, 0x0, 0x0) dup(0xffffffffffffffff) 21:59:15 executing program 2: linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x400) 21:59:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80001, 0x0) 21:59:15 executing program 4: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000100)="b6", 0x1}], 0x1000000000000149) 21:59:15 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000280)={0x100}, 0x4) 21:59:15 executing program 5: 21:59:15 executing program 0: msgget(0x0, 0x600) 21:59:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x10}}], 0x30}, 0x0) 21:59:15 executing program 3: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000080)=0x28b9a96a, 0x5, 0x0) 21:59:15 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 21:59:15 executing program 0: io_setup(0x9ad, &(0x7f0000000080)=0x0) io_destroy(r0) 21:59:15 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) 21:59:15 executing program 5: r0 = eventfd(0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000200)="91", 0x1}, {&(0x7f0000000000)="959e61c82d70d41f9733cd6d116a7df6626375f0af04eee3ac9ab430f27945773ddcbd044317d28a5c18900bafc0d13f846980be8019ad8fe9cc1a296873165be0c0ddd5c7cd8efc8e8a875ccb836eadc7e9a176d5c6ee9c6f1e6c3bff17a9527d7fdb4a62761dd64a3d5340ca00000000"}], 0x2d) 21:59:15 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCINQ(r0, 0x890b, &(0x7f0000000000)) 21:59:15 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x101a01, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 21:59:15 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 21:59:15 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000002300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000002280)=@abs, &(0x7f00000001c0)=0x6e) 21:59:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) keyctl$join(0x1, &(0x7f0000000180)={'syz', 0x2}) 21:59:15 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self\x00', 0x801c69ec07a2c79a, 0x0) 21:59:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 21:59:15 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) writev(r0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000200)="91", 0x1}], 0x2) 21:59:15 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40082, 0x0) 21:59:15 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 21:59:15 executing program 1: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x7}, 0x0, 0x0) 21:59:15 executing program 0: syz_emit_ethernet(0x25e, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0) socket$inet(0x2, 0x840000000003, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r2 = syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r2, @ANYRESDEC, @ANYRESOCT, @ANYRESDEC], 0x100000530) 21:59:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954197b5564e6ac851909cf99421f46b04fff0c935433e6691f8b25bee7df03b08db40ba73ac381dd4dea5dac863b5e2e3300bbd04055fff98a5c92c4b0b0deb44d872aa7bb025d0118d0e12363949f0f52917f95dc079f7c82a8e9eb1c1c840ec3dc93d87be6f6ed2195e8083b0c00ade4a74bd329", 0xde}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:59:15 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x200, 0x0) 21:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xffffffff, 0xd0, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x2e8, 0x2e8, 0x2e8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, [], [], 'veth0_to_hsr\x00', 'gretap0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@unspec=@mac={{0x30, 'mac\x00'}, {@multicast}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@private0, @mcast2, [], [], 'macvlan1\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x418) 21:59:15 executing program 5: syz_emit_ethernet(0x25e, &(0x7f00000019c0)={@multicast, @empty=[0x5, 0xfc], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00c4c8", 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "ffffefffa0f8ca1cc8000800"}, {0x3, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb99e5ff38403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0642a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba423999086baa39eb8164e240069f656d3a057ecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}]}}}}}}, 0x0) 21:59:15 executing program 1: add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 21:59:16 executing program 3: add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 419.475609] x_tables: duplicate underflow at hook 2 [ 419.499166] IPv6: addrconf: prefix option has invalid lifetime [ 419.510862] x_tables: duplicate underflow at hook 2 21:59:16 executing program 1: perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.531999] IPv6: addrconf: prefix option has invalid lifetime 21:59:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 21:59:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[], 0x64}}, 0x0) 21:59:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000200)="91", 0x1}], 0x3) 21:59:16 executing program 2: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 21:59:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 21:59:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) fstat(r0, &(0x7f0000001680)) 21:59:18 executing program 1: r0 = memfd_create(&(0x7f0000000000)='*[%{].\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x1}) 21:59:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f00000001c0)) 21:59:18 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x288, &(0x7f0000000040)) 21:59:18 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 21:59:18 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:59:18 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)) 21:59:19 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000780)={0x2020}, 0x2020) 21:59:19 executing program 5: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0x0) 21:59:19 executing program 3: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 21:59:19 executing program 2: 21:59:19 executing program 0: [ 422.615386] audit: type=1326 audit(1603231159.121:41): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18683 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0xffff0000 21:59:19 executing program 4: 21:59:19 executing program 1: 21:59:19 executing program 5: 21:59:19 executing program 2: 21:59:19 executing program 3: 21:59:19 executing program 0: [ 423.283157] audit: type=1326 audit(1603231159.791:42): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18683 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0xffff0000 21:59:19 executing program 1: 21:59:19 executing program 3: 21:59:19 executing program 4: 21:59:19 executing program 2: 21:59:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x8}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001100)=@filter={'filter\x00', 0xe, 0x4, 0xb20, 0xffffffff, 0x980, 0x0, 0xd0, 0xffffffff, 0xffffffff, 0xa50, 0xa50, 0xa50, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ipv6={@private1, @private2, [], [], 'veth1_to_hsr\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x888, 0x8b0, 0x0, {}, [@common=@unspec=@u32={{0x7e0, 'u32\x00'}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb80) 21:59:19 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0xfffffffffffffffd, 0x0) 21:59:20 executing program 1: 21:59:20 executing program 4: 21:59:20 executing program 3: 21:59:20 executing program 2: 21:59:20 executing program 5: [ 423.585420] x_tables: duplicate underflow at hook 2 21:59:20 executing program 3: [ 423.626652] x_tables: duplicate underflow at hook 2 21:59:20 executing program 1: 21:59:20 executing program 4: 21:59:20 executing program 0: 21:59:20 executing program 5: 21:59:20 executing program 2: 21:59:20 executing program 1: 21:59:20 executing program 4: 21:59:20 executing program 3: 21:59:20 executing program 0: 21:59:20 executing program 5: 21:59:20 executing program 3: 21:59:20 executing program 2: 21:59:20 executing program 4: 21:59:20 executing program 1: 21:59:20 executing program 0: 21:59:20 executing program 5: 21:59:20 executing program 2: 21:59:20 executing program 1: 21:59:20 executing program 3: 21:59:20 executing program 4: 21:59:20 executing program 1: 21:59:20 executing program 2: 21:59:20 executing program 5: 21:59:20 executing program 0: 21:59:20 executing program 4: 21:59:20 executing program 3: 21:59:20 executing program 1: 21:59:20 executing program 5: 21:59:20 executing program 2: 21:59:20 executing program 4: 21:59:20 executing program 3: 21:59:20 executing program 0: 21:59:20 executing program 1: 21:59:20 executing program 5: 21:59:21 executing program 4: 21:59:21 executing program 2: 21:59:21 executing program 0: 21:59:21 executing program 3: 21:59:21 executing program 1: 21:59:21 executing program 5: 21:59:21 executing program 2: 21:59:21 executing program 4: 21:59:21 executing program 5: 21:59:21 executing program 1: 21:59:21 executing program 0: 21:59:21 executing program 3: 21:59:21 executing program 4: 21:59:21 executing program 2: 21:59:21 executing program 5: 21:59:21 executing program 0: 21:59:21 executing program 1: 21:59:21 executing program 4: 21:59:21 executing program 3: 21:59:21 executing program 5: 21:59:21 executing program 2: 21:59:21 executing program 0: 21:59:21 executing program 3: 21:59:21 executing program 1: 21:59:21 executing program 4: 21:59:21 executing program 5: 21:59:21 executing program 2: 21:59:21 executing program 3: 21:59:21 executing program 0: 21:59:21 executing program 5: 21:59:21 executing program 3: 21:59:21 executing program 1: 21:59:21 executing program 4: 21:59:21 executing program 2: 21:59:21 executing program 0: 21:59:21 executing program 3: 21:59:21 executing program 1: 21:59:21 executing program 5: 21:59:21 executing program 4: 21:59:21 executing program 2: 21:59:22 executing program 3: 21:59:22 executing program 0: 21:59:22 executing program 5: 21:59:22 executing program 1: 21:59:22 executing program 4: 21:59:22 executing program 2: 21:59:22 executing program 5: 21:59:22 executing program 3: 21:59:22 executing program 1: 21:59:22 executing program 2: 21:59:22 executing program 0: 21:59:22 executing program 4: 21:59:22 executing program 3: 21:59:22 executing program 2: 21:59:22 executing program 1: 21:59:22 executing program 0: 21:59:22 executing program 5: 21:59:22 executing program 4: 21:59:22 executing program 3: 21:59:22 executing program 1: 21:59:22 executing program 0: 21:59:22 executing program 2: 21:59:22 executing program 5: 21:59:22 executing program 4: 21:59:22 executing program 3: 21:59:22 executing program 4: 21:59:22 executing program 2: 21:59:22 executing program 0: 21:59:22 executing program 5: 21:59:22 executing program 1: 21:59:22 executing program 3: 21:59:22 executing program 2: 21:59:22 executing program 4: 21:59:22 executing program 0: 21:59:22 executing program 1: 21:59:22 executing program 5: 21:59:22 executing program 3: 21:59:22 executing program 0: 21:59:22 executing program 4: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='}^,\x00', 0xfffffffffffffffb) 21:59:22 executing program 5: socket$inet(0x2, 0x3, 0x1ff) 21:59:23 executing program 2: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 21:59:23 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) 21:59:23 executing program 3: r0 = semget(0x1, 0x0, 0x0) semctl$GETNCNT(r0, 0x2, 0xe, 0x0) 21:59:23 executing program 0: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/202) 21:59:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000004c0)=@framed={{}, [@alu={0x7}, @func, @jmp, @map]}, &(0x7f0000000500)='syzkaller\x00', 0x3, 0x81, &(0x7f0000000540)=""/129, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:59:23 executing program 2: bpf$PROG_LOAD(0x1e, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:59:23 executing program 1: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=']-,@\x00', 0xffffffffffffffff) 21:59:23 executing program 4: capget(&(0x7f0000000300)={0x19980330}, &(0x7f0000000340)) 21:59:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x40) 21:59:23 executing program 2: syz_emit_ethernet(0x115, &(0x7f0000000480)=ANY=[@ANYBLOB="aaaaaaaaaaaa"], 0x0) 21:59:23 executing program 3: capget(0x0, &(0x7f0000000340)) 21:59:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 426.761353] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 21:59:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x10000, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:59:23 executing program 1: bpf$MAP_LOOKUP_BATCH(0x23, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0}, 0x38) 21:59:23 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000300)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 21:59:23 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) getpgrp(0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) sync() 21:59:23 executing program 5: 21:59:23 executing program 0: request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0xfffffffffffffffb) 21:59:23 executing program 3: shmget$private(0x0, 0x14000, 0x1000, &(0x7f0000feb000/0x14000)=nil) 21:59:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000001e00)=@framed, &(0x7f0000001e80)='GPL\x00', 0x6, 0xb1, &(0x7f0000001ec0)=""/177, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:59:23 executing program 4: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) 21:59:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000008e40)=[{{&(0x7f0000003cc0)=@generic, 0x80, &(0x7f00000070c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000007180)=""/218, 0xda}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2, &(0x7f0000008f80)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000001e00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 21:59:23 executing program 3: futex(0x0, 0x8b, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f0000000100), 0x0) 21:59:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 21:59:23 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0xe}, 0x14) 21:59:23 executing program 1: syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @link_local, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "27ec62f0ea0c3907"}}}}, 0x0) 21:59:23 executing program 0: syz_emit_ethernet(0x2e, &(0x7f00000001c0)={@remote, @random="c5412f91635a", @val={@void, {0x8100, 0x0, 0x1}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @remote}, {0x0, 0x0, 0x8}}}}}, 0x0) 21:59:23 executing program 3: bpf$MAP_LOOKUP_BATCH(0x21, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0}, 0x38) 21:59:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000880)={'tunl0\x00', &(0x7f0000000400)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x26, 0x4, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x29, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 21:59:23 executing program 1: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) 21:59:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000140)) 21:59:23 executing program 4: select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x6}, &(0x7f00000000c0)) 21:59:23 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) 21:59:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000008e40)=[{{&(0x7f0000003cc0)=@generic, 0x80, &(0x7f00000070c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000007180)=""/218, 0xda}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000001e00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 21:59:23 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:59:23 executing program 2: setregid(0xffffffffffffffff, 0xee00) 21:59:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000001e00)=@framed, &(0x7f0000001e80)='GPL\x00', 0x6, 0xb1, &(0x7f0000001ec0)=""/177, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001fc0), 0x10}, 0x78) 21:59:23 executing program 0: socketpair(0x11, 0xa, 0x0, &(0x7f0000000040)) 21:59:23 executing program 4: futex(&(0x7f0000000100)=0x1, 0x80, 0x1, &(0x7f0000000140)={0x0, 0x3938700}, 0x0, 0x0) 21:59:24 executing program 5: bpf$BPF_PROG_DETACH(0x1c, 0x0, 0x0) 21:59:24 executing program 0: 21:59:24 executing program 2: 21:59:24 executing program 1: 21:59:24 executing program 0: 21:59:24 executing program 3: 21:59:24 executing program 5: 21:59:24 executing program 1: 21:59:24 executing program 3: 21:59:24 executing program 2: 21:59:24 executing program 4: 21:59:24 executing program 3: 21:59:24 executing program 0: 21:59:24 executing program 5: 21:59:24 executing program 2: 21:59:24 executing program 3: 21:59:24 executing program 1: 21:59:24 executing program 4: 21:59:24 executing program 2: 21:59:24 executing program 0: 21:59:24 executing program 5: 21:59:24 executing program 4: 21:59:24 executing program 3: 21:59:24 executing program 1: 21:59:24 executing program 2: 21:59:24 executing program 0: 21:59:24 executing program 4: 21:59:24 executing program 5: 21:59:24 executing program 2: 21:59:24 executing program 3: 21:59:24 executing program 1: 21:59:24 executing program 5: 21:59:24 executing program 4: 21:59:24 executing program 0: 21:59:24 executing program 2: 21:59:24 executing program 3: 21:59:24 executing program 1: 21:59:24 executing program 5: 21:59:24 executing program 4: 21:59:24 executing program 2: 21:59:24 executing program 3: 21:59:24 executing program 0: 21:59:24 executing program 5: 21:59:24 executing program 1: 21:59:24 executing program 4: 21:59:24 executing program 5: 21:59:24 executing program 2: 21:59:24 executing program 0: 21:59:24 executing program 3: 21:59:24 executing program 1: 21:59:24 executing program 4: 21:59:24 executing program 5: 21:59:24 executing program 2: 21:59:24 executing program 0: 21:59:24 executing program 3: 21:59:24 executing program 1: syz_emit_ethernet(0x115, &(0x7f0000000480)=ANY=[], 0x0) 21:59:25 executing program 4: 21:59:25 executing program 5: 21:59:25 executing program 2: 21:59:25 executing program 1: 21:59:25 executing program 3: 21:59:25 executing program 0: 21:59:25 executing program 4: 21:59:25 executing program 2: 21:59:25 executing program 5: 21:59:25 executing program 1: 21:59:25 executing program 4: 21:59:25 executing program 0: openat$vcsu(0xffffff9c, &(0x7f00000005c0)='/dev/vcsu\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') 21:59:25 executing program 3: io_setup(0xfff, &(0x7f0000000540)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) 21:59:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000080)=ANY=[@ANYBLOB="e4"], 0xd04}}, 0x0) 21:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 21:59:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') read$eventfd(r0, 0x0, 0x0) 21:59:25 executing program 4: bpf$PROG_LOAD(0x6, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:25 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x81, 0x41, "d264d6f2088b77e647dfca614c43607dc0639d4d61a8d29253b350c9762f9dd70196d6f0b2f220c8283de8266a7ee6968237ac86ccd9712960e2004d028c00617e"}) 21:59:25 executing program 3: openat$vcsu(0xffffff9c, &(0x7f00000005c0)='/dev/vcsu\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x8}, &(0x7f00000001c0)={0x3}, &(0x7f0000000200), 0x0) 21:59:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'syztnl0\x00', 0x0}) 21:59:25 executing program 4: statx(0xffffffffffffff9c, 0x0, 0x1000, 0x0, 0x0) 21:59:25 executing program 5: r0 = epoll_create(0x7ff) r1 = openat$vcsu(0xffffff9c, &(0x7f00000005c0)='/dev/vcsu\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)={0x20000000}) 21:59:25 executing program 2: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x3) 21:59:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') read$eventfd(r0, 0x0, 0x53) 21:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat\x00') read$eventfd(r0, 0x0, 0x0) 21:59:25 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x81, 0x41, "d264d6f2088b77e647dfca614c43607dc0639d4d61a8d29253b350c9762f9dd70196d6f0b2f220c8283de8266a7ee6968237ac86ccd9712960e2004d028c00617e"}) 21:59:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') read$eventfd(r0, &(0x7f0000000140), 0x8) 21:59:25 executing program 5: r0 = openat$kvm(0xffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 429.047208] audit: type=1400 audit(1603231165.552:43): avc: denied { block_suspend } for pid=19085 comm="syz-executor.5" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 21:59:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') read$eventfd(r0, 0x0, 0x0) 21:59:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x64}]}) 21:59:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x1a8003}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4080aea2, &(0x7f0000000640)) 21:59:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000080)={0xd04, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x900}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x98, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_NODE={0xb30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0xb21, 0x3, "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"}]}]}, 0xd04}}, 0x0) 21:59:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') io_setup(0xfff, &(0x7f0000000540)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x0, r0}]) 21:59:25 executing program 2: io_setup(0x3, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000200)="cbd2a8d7e644d4f954", 0x9}]) 21:59:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:25 executing program 0: bpf$PROG_LOAD(0x1b, 0x0, 0x0) 21:59:25 executing program 1: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5452, &(0x7f0000000000)) 21:59:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='personality\x00') read$eventfd(r0, 0x0, 0x2) 21:59:25 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'macvlan1\x00', @ifru_addrs=@nl}) 21:59:25 executing program 0: syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}}) 21:59:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') read$eventfd(r0, &(0x7f0000000140), 0x8) 21:59:26 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 21:59:26 executing program 1: io_setup(0x3, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x3, 0x0, 0x1, r2}]) 21:59:26 executing program 5: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40049409, &(0x7f0000000000)) 21:59:26 executing program 0: bpf$PROG_LOAD(0x11, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 429.551864] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 21:59:26 executing program 5: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0xc0189436, &(0x7f0000000000)) 21:59:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') write$eventfd(r0, 0x0, 0x0) 21:59:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') read$eventfd(r0, 0x0, 0x2) 21:59:26 executing program 4: socketpair(0x0, 0x80e, 0x0, &(0x7f0000000040)) 21:59:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') read$eventfd(r0, 0x0, 0x0) 21:59:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') read$eventfd(r0, 0x0, 0x2) 21:59:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) 21:59:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, &(0x7f00000015c0), 0x0, &(0x7f0000001640)) 21:59:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') read$eventfd(r0, 0x0, 0x0) 21:59:26 executing program 3: 21:59:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x15}, {}]}) 21:59:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc) 21:59:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3c6, 0x0) 21:59:26 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') 21:59:26 executing program 2: bpf$PROG_LOAD(0x1a, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:26 executing program 1: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="00a4311167cf"]) 21:59:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:26 executing program 5: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 21:59:26 executing program 3: r0 = openat$kvm(0xffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x0) 21:59:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') read$eventfd(r0, 0x0, 0x2) 21:59:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') io_setup(0xfff, &(0x7f0000000540)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x942}]) 21:59:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x201800f, &(0x7f0000001640)) 21:59:27 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="00a4"]) 21:59:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net/raw6\x00') 21:59:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:27 executing program 1: setresgid(0x0, 0xee00, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') 21:59:27 executing program 0: bpf$PROG_LOAD(0x23, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:27 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xf) 21:59:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000000)={'wlan0\x00', @ifru_flags}) 21:59:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) 21:59:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) 21:59:27 executing program 0: r0 = epoll_create(0x5) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x2, 0x0, 0x0) 21:59:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x15}]}) 21:59:27 executing program 5: r0 = openat$urandom(0xffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x40045201, 0x0) 21:59:27 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/net\x00') 21:59:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nf_conntrack\x00') read$eventfd(r0, 0x0, 0x0) 21:59:27 executing program 5: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x1, 0x0) read$eventfd(r0, 0x0, 0x0) [ 431.207085] audit: type=1326 audit(1603231167.712:44): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19241 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 21:59:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x5}, {0x16}]}) 21:59:27 executing program 0: bpf$PROG_LOAD(0xe, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:27 executing program 5: shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 21:59:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 431.373786] audit: type=1326 audit(1603231167.872:45): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19272 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 21:59:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') read$eventfd(r0, &(0x7f0000000140), 0x8) read$eventfd(r0, 0x0, 0x0) 21:59:28 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 21:59:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000080)={0x4ffe0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x98, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_NODE={0xb30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0xb21, 0x3, "7fd1620e71e0f8419917fdfd7754129970ec35204293272928926c9316c0d49867defcf3ec0ecb37f2614af580bbc66f73a0aeae07a7829ab227737e8b55dfb3bd21ae39efbfb247aedb6341bf85fda6d8c8863bb237faf3a717dd5930e062f8b1192106c4643efefa2aa21bd4f4b937dcf62beff15f1a2521433a0f2775d88788183c28f0d924d4d031a81bea8b68cff6cb4d9fe4a9cc658f0b4a7aac48acbb6f162b0e62f644659b4eff53c2987e87e36af242978851226c1ee2979bb4173b8a108a8d37dbf6a97ecefec3ab816c019ba703c6775ec0e7dd56289726b1ba96fb5e5f4147aebb90af48bcd0c5de2a09a9a8e66dc420b7ef9f55a4dd1a2f407bece8836deff6de7ec1285d3b32c6fc1e38ef3724bd3e570598c6354a66949ef1b16626b83e4b798bd14e8c96598faedcd8a80d7fbfcad4f29e6362ab82391c829051e5eebd89340208a25dc6cbf5a7d42385fd63ad92b17a3e2da377893057bccd39d1f0893688f7249a2a8ef6db0565bc7da9e5eeb8a745c70156a8624c4bc65ea591c430947f228acc0bc3e3872c290d203868ebcf0ac24b5cc64c2d8de959ee4f2f66eaffe089e37566df7f6e1a4f69c8d8077649a51c79578ceca9a429a508f8e27a32710888020d53b1b40b7cef7511c40321fd210cdb828a9d368e0aa45adfebf55ee64de2faf85d9d09163a60a2afc6eec8cb243b76a88be06d5f64cfd3fdae1ab54d5c218a71f654276a3eedb2c24217fd9a0f21994bd4081463a0b575065ff52ea1488dd1286d9d6e65269ec34f86399ea206aacbc8c919ead777fe3a4bc9486e44dc483f464bf148bb8d7a83f4a23f286b0536cc402cdc0d5e1926a686946e44a5d44a923c2a1acc9bc9c7a9035a1383b060b189912d414eca746c43b87096f4baef9aa711f7d76329bcbe660d53996cb32e314afe4b9618c33aea4bbb5928289d17b99eaf9e86d22b33c122758ae29de5f288a0c1cf96bfe266cb698acf9d6cb4479f461c7360e163dc069c34e7d4da4c9729cc3d1d7a278d920407b139b5dd45d2f13e849d74299e5e006fa77ed09f2a4bdced457209e6b5d1aa77cebe29e40c30c08a76fc4e79ece64739c64046a30770c8406d0892093ea5c8fd3d4f79f2f3448def970f808a81643c5d79cdd654ee8826e3fac0934e28fb22fc2390cee75933b6f387988ef814e021a621b98e6825347c9ee3236621883779620761913506eac65f2a7b5fa3097c5215ddab51ad9bab6c11c78691af6b8d7b2ecfbc995efc3c32ff152887d0fda74d1550383060c8ad8efe09bd7a1080ac4d104bfb1122a0b537d4a7c5168bc0985e6f481f06bbda1756e6412627b62ae701fbf365131826dc1623cb4fc572c54722481270be5614f90ea19dc4d6ad2c293aab2df91868596f22f6d700010253b79f25401a2584e7071d4e04d0cb0212f84c509f0d69cf7fb42f525324f27800053a724fd634728a29aa171663a6f3a292ef3f1c4072b8ac8f73d6931ebd9d852d1bdac241707713001f107935450e9425bf1c486e2bbda1d0831e4198c9aa89889ed1c31258990b95aa5e7f6806ee5ce3b41e553b6edcc546beed95384ad06075ea3ba51e5e2b44278312333390c344bff15875d2d9f2f6297d957f64f4f6d50950cab4085a3b65a707fac82f125f48fbe199de98a6743d11ecd449fa05359dfa2f41b28a237c27d682770183d274a5e73ee403b763ac9024aa92115bf3c380f290055506e8c479d765a8510c9e90e7318adbb9a9647846afa020987428ff69eb8f47ffc665cb978bb920416e19c43d3d025b7e6842c29ca1a5ccec8ba3f636d41bc2db81ab4ec10855f021eae4d4decc6ec542ed42e9ba296fc78b774409cfa82e2327f01abf4fd65cb0f40e454b308935cc13771eb649053ea4aeee5ee46c9595669b190e55087dbec8914b7e7f7c33006d8fecf665cacb1f205bcde1f3d5a41d7a5e9cdf754c8e862cf6274189762973278b1f11526fd2171b21b3bd1128801d6a254c26c77b1c0d775513b31df2f706745b82f0b36f1b9a8f935728264069a203526c01cba8b9afd0f8b01c8e6d165d37a244c02a66ee35acf36127dcf0f7fd1b8f5565fe58fc367118a20a5e50fb2060c1ee65e500abd77bd0d8dd9b373546db13ea092d26d4adaade1384a8abb7fcdb4210e90580ce6060e657fad95c9bac4b7a85241ddaf287e6f31342cdde37cf0e27ee9ad22ad82b203fe65daa1c01158135004456e3c9cb0d8b612570320a545c1c3f59742e71cc34b0f5109902d0af75e638fc05be675343747af171dcb9e6347405e88e0937cf11ed83c37f84b7a65043c45e808e75e3368301c18485c4e439bbd1548c05bf641a4bb4c5c6b792033669fc9624528fe2915067c25237e79d65d95109c898fe3a4e101fbd3ca691c9c986b31cfc49197a19f79945840af487f83fc048c71267a7450843807c045852025501700452ea0069df83246b9ce25072ee68485b27d592b5d60d99e067a1c5d4681b2aca8c07a5a0abe238259619ce2574ba5e473f13a8f7a5e44921a3dbf8af66668d10db034661e4b9cb9fc09a7fb003dd32b44184849942e6d6c2bf6f3d24150fb313aa90817c2ddd7645dba7ddcf2a9a788a0584ea6481b4618f5cc2515323820bf0ffe8920ea2c9ba4ed7052b2dde29fb98a6633340cf18702745f77bc1b52053aa965e28f0fcd257a24bf37ce83d85ad19aafe3c6fadc70a902db4e80b2ad590a3626170592991fff550ed5e17ae87b2e02a91339080af4b2fe8cc4e387fe7a6124556c7cb9a8e9e3970a6fe59b57d19e7c8683ad5e7d88d1a29286ee6941e36955599939e6c49ccf7a57880de216653e0d66906221d9d954decb94d76be1430c377344de7c8892a8cd86d15215759cf99e6279638f7d309788f391c209176850701efe3a1a7c173b63800129bf32691f4fe11af3ac30b96bc97beb60f0568dc8ab178f59c3c4d4426bddfcffe137bf5b4be810c51540b78ae7a2282f1b934c79f5eb32ec877065c0d46599d94640c878cbf604979659ca317ea8450a5b30346d58b2e4a275411e54f5f1406a3b04ff37e83c17f67d7597c74a46074b2e881dc90e3750bc8d0d3383d9a8110044b834abf152f95204e3a2a02c5ff624550aa8d70477ed5a80a712028e9cf00c33e6875b04a1568b54e5d0d23f017f6411d14fea85cac9fbed6a85c12df0d622ab8e8aa3b54bab4de5231108489a9aee9dab88ba66fb9fb5789dff0cc34891f26c7c8dcc8c2b2835d0786c6d11da2379cd5735618b360408ed23c58146c16315be1da3d986fa834ebe4283e770e8b02689d632be3dfff7a8fbde777329ee730a4784dc3035f432eccaad52eacc883b4381a3d4681bb6422b7348c300fc74847f6ab187c07b207aad3adc028ffe93f0804faf21d638f06c22d32313c64b26a345483e5b788590fc88d0d2bd3a5be9c391cb263629d0f043dad444e9f581b81309f4c610ce214cdd98d7d326295ffecd5338657744aa8a83d38ea09880107f12d416f4b4334d47bbfa5c07b9966206590b5e392120b0f72056588a60059166d0034c7ca2ea8a6991b4d86e13989c6c7198cff498c0d9dc413dd6f51276071e8c05d708c98b638a3497b06d50fd99883c29e0e6dda221f8a7e1deba5bf37781bfbec19ee5a1e81ee3528665f57813cdbfdc67a186f93320246a035b11fe4f08e6924cff144014de521972d533563eceb5defb9a8103b38ad2bf656d561071adda40b91e9d72ca8529d198a3d05bf48e469d96d311f7df695a8529520766000fcdafc2b8ce61b743e408539c8edd322687939bc5f7069004fac04db525291858e9b4c97a818211f1b5692b8bdfc197a9d72e9d414016b9643965094d93fa9ee9d813a400ee334aaf121a2d48d2072865897e044b621cf631fa213b6a6cbf87b26084005d61096cd8fd9ddbf041ba4ba8b1fe8b6a45b111db262ec20be1ed40bd7cc65104a08a13c33e562179a53ec60d42e1008fefde0340e4c54ed27fdf8"}]}]}, 0xd04}}, 0x0) 21:59:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') io_setup(0xfff, &(0x7f0000000540)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0}]) 21:59:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 431.807119] audit: type=1326 audit(1603231168.312:46): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19241 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 21:59:28 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa967011aa4c8835e) 21:59:28 executing program 5: 21:59:28 executing program 1: 21:59:28 executing program 2: 21:59:28 executing program 0: 21:59:28 executing program 5: 21:59:28 executing program 1: 21:59:28 executing program 4: 21:59:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 432.166802] audit: type=1326 audit(1603231168.662:47): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19272 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 21:59:28 executing program 5: 21:59:28 executing program 1: 21:59:28 executing program 2: 21:59:28 executing program 0: 21:59:28 executing program 4: 21:59:28 executing program 1: 21:59:29 executing program 5: 21:59:29 executing program 4: 21:59:29 executing program 1: 21:59:29 executing program 0: 21:59:29 executing program 2: 21:59:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:29 executing program 5: 21:59:29 executing program 4: 21:59:29 executing program 1: 21:59:29 executing program 2: 21:59:29 executing program 0: 21:59:29 executing program 5: 21:59:29 executing program 4: 21:59:29 executing program 1: 21:59:29 executing program 2: 21:59:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:29 executing program 0: 21:59:29 executing program 5: 21:59:29 executing program 4: 21:59:29 executing program 1: 21:59:29 executing program 2: 21:59:29 executing program 5: 21:59:29 executing program 0: 21:59:29 executing program 4: 21:59:29 executing program 5: 21:59:29 executing program 1: 21:59:29 executing program 2: 21:59:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:29 executing program 4: 21:59:29 executing program 5: 21:59:29 executing program 0: 21:59:29 executing program 1: 21:59:29 executing program 2: 21:59:29 executing program 4: 21:59:29 executing program 5: 21:59:29 executing program 0: 21:59:29 executing program 1: 21:59:29 executing program 2: 21:59:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:29 executing program 4: 21:59:29 executing program 2: 21:59:30 executing program 5: 21:59:30 executing program 0: 21:59:30 executing program 1: 21:59:30 executing program 4: 21:59:30 executing program 0: 21:59:30 executing program 2: 21:59:30 executing program 1: 21:59:30 executing program 5: 21:59:30 executing program 0: 21:59:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:30 executing program 4: 21:59:30 executing program 2: 21:59:30 executing program 1: 21:59:30 executing program 5: 21:59:30 executing program 0: 21:59:30 executing program 2: 21:59:30 executing program 4: 21:59:30 executing program 5: 21:59:30 executing program 1: 21:59:30 executing program 2: 21:59:30 executing program 4: 21:59:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:30 executing program 5: 21:59:30 executing program 0: 21:59:30 executing program 1: 21:59:30 executing program 4: 21:59:30 executing program 0: 21:59:30 executing program 5: 21:59:30 executing program 2: 21:59:30 executing program 4: 21:59:30 executing program 1: 21:59:30 executing program 0: 21:59:30 executing program 5: 21:59:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:30 executing program 2: 21:59:30 executing program 4: 21:59:30 executing program 5: bpf$PROG_LOAD(0x2, &(0x7f0000000340)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:59:30 executing program 0: 21:59:30 executing program 1: 21:59:31 executing program 4: 21:59:31 executing program 1: 21:59:31 executing program 5: 21:59:31 executing program 2: 21:59:31 executing program 0: 21:59:31 executing program 4: 21:59:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:31 executing program 1: 21:59:31 executing program 5: 21:59:31 executing program 2: 21:59:31 executing program 0: 21:59:31 executing program 4: 21:59:31 executing program 0: 21:59:31 executing program 1: 21:59:31 executing program 4: 21:59:31 executing program 2: 21:59:31 executing program 5: 21:59:31 executing program 1: 21:59:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:31 executing program 0: 21:59:31 executing program 4: 21:59:31 executing program 5: 21:59:31 executing program 2: 21:59:31 executing program 1: 21:59:31 executing program 5: 21:59:31 executing program 4: 21:59:31 executing program 0: 21:59:31 executing program 2: 21:59:31 executing program 1: 21:59:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:31 executing program 5: 21:59:31 executing program 4: 21:59:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)='d', 0x7fffffffffffffff, 0x100000000}, {&(0x7f0000000380)="0e", 0x1, 0x3}, {&(0x7f0000000400)='\b', 0x1}, {&(0x7f0000000440)="fb", 0x1}]) 21:59:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="7b014e400d5195e487988305872280bfaeb9ee17eba1a8aaecf066076fbc9729", 0x20) 21:59:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001140)={0x0, 0x1000}, 0x4) 21:59:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0xfaff, 0x0, 0x12, r0, 0x0) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 21:59:31 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x35, 0x32]}}}}]}) 21:59:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x64}]}) 21:59:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-ssse3\x00'}, 0x58) [ 435.627045] tmpfs: Bad value 'interleave=relative:52' for mount option 'mpol' [ 435.653799] tmpfs: Bad value 'interleave=relative:52' for mount option 'mpol' 21:59:32 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'default', '=static', @val={0x3a, [0x2c, 0x33, 0x3a]}}}}]}) 21:59:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) 21:59:32 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000007c0)=ANY=[]) syz_mount_image$tmpfs(0x0, 0x0, 0x3, 0x2, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x0, &(0x7f0000000880)=ANY=[]) 21:59:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 435.922442] tmpfs: Bad value 'default=static:,3:' for mount option 'mpol' [ 435.939876] tmpfs: Bad value 'default=static:,3:' for mount option 'mpol' 21:59:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x7fffffff, &(0x7f0000000040)) 21:59:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) 21:59:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8906, 0x0) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x2, 0x0, &(0x7f0000000680)) 21:59:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000002e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 21:59:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0xb8) write$FUSE_INIT(r0, 0x0, 0x0) 21:59:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x88, 0x66, 0x0, &(0x7f0000000680)) 21:59:32 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 21:59:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x88, 0x0, 0x0, &(0x7f0000000680)) 21:59:32 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, &(0x7f0000000680)) 21:59:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:33 executing program 1: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x5, 0x0) 21:59:33 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 21:59:33 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x12, 0x0, &(0x7f0000000680)) 21:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) 21:59:33 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f0000000680)) 21:59:33 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000380)) 21:59:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) 21:59:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:33 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xf, 0x0, &(0x7f0000000680)) 21:59:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) 21:59:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="7b014e400d5195e487988305872280bfae", 0x5000) 21:59:33 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f0000000680)) 21:59:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:33 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RGETATTR(r0, &(0x7f0000000240)={0xa0}, 0xa0) write$P9_RGETATTR(r0, &(0x7f0000000300)={0xa0}, 0xfdef) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf}, 0xf) 21:59:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8983, 0x0) 21:59:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$unix(r0, 0x0, &(0x7f0000000180)) 21:59:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6f396a47d1775855bcdf7f"]) getgid() syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x7, &(0x7f00000006c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="72df99c6c43e5288d095da8c1f62b6151ac00a2403f16841900660a1da3685ee831494cb3d2ec362d81cde4f5de6a7ef22ef87ff23263986b3824d8845e2b1851342", 0x42}, {&(0x7f00000004c0)}, {&(0x7f00000005c0)="0f82e022a305b6878daa8b7ad534f1430119f5090eb5f717a58e547cf3c6dff47a1bf335984f4838637b64720152f5183e448cb4c430219a479bf2fb5a33deee6723a4875f6a9e2392eacf6fc67436f6f7c8ccd1526245ca86037a6313a10b50a196f2f2dfbe44be4efa317477185731c394c53c2a2c2d96c2d07b06d2acc2b12e9b329eb48cdd7a55f9446e1bd79b4fd6d7b6d5d6a3a7b3d569a906bda2a6f91ff2756f39699d9a", 0xa8, 0x40}, {&(0x7f00000002c0)="0aaaa74e930fb983771b93f4af95236e790207374a3375066ea592cf6efcdd6869c3d954d99750e66a270caced259ef7bb5b768bad03", 0x36, 0xffffffffffff4ddf}, {&(0x7f0000000680)="aa32a97213", 0x5}], 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='size=1g\x006xm,huge=adv', @ANYRESHEX, @ANYRESHEX, @ANYBLOB]) 21:59:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="71f5d7e825d7c79dd6b583a9711f5d", 0xf) 21:59:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:59:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(lrw(camellia))\x00'}, 0x58) 21:59:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="18", 0x1) [ 437.106734] FAT-fs (loop0): Unrecognized mount option "o9jGÑwXU¼ß" or missing value 21:59:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x64, 0x0, 0x0, 0x3ff}]}) 21:59:33 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x2, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="0e065fb597c86daccf2278837e283dc2a9de3a", 0x13, 0x3}, {&(0x7f0000000400), 0x0, 0xcae}]) 21:59:33 executing program 1: 21:59:33 executing program 2: 21:59:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 437.252878] FAT-fs (loop0): Unrecognized mount option "o9jGÑwXU¼ß" or missing value 21:59:33 executing program 4: 21:59:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000016c0)={&(0x7f0000001740)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xeb0, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x110, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast1}}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @dev}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "42c9694b97c3b10b496297dcb445b78154678243012ea3280c90e6ff7b5b04fe"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "194efb77698ef33b2c864c1658b0ed7c69fa2a2df3932e49ba41023f60730494"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}]}, {0x4b0, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4ac, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}]}, {0x674, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2106fcad90f38588d11ce15a42684aed732844e758c65613b04e13830a18d606"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x5b4, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d18446eb8ea1cf50d635511203a8bb9864fac12ebe758672a367603ac53c8c4e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @loopback}}]}, {0x248, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x244, 0x9, 0x0, 0x1, [{0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) 21:59:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x2, 0x9, 0x0, 0x17, 0x2}, 0x10}}, 0x0) 21:59:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0xfffffffffffffe4d) 21:59:34 executing program 4: 21:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:34 executing program 1: 21:59:34 executing program 5: 21:59:34 executing program 2: 21:59:34 executing program 0: 21:59:34 executing program 4: 21:59:34 executing program 1: 21:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:59:34 executing program 4: 21:59:34 executing program 0: 21:59:34 executing program 5: 21:59:34 executing program 2: 21:59:34 executing program 1: 21:59:34 executing program 5: 21:59:34 executing program 0: 21:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:59:34 executing program 1: 21:59:34 executing program 2: 21:59:34 executing program 4: 21:59:34 executing program 0: 21:59:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001fc0)={0x0, @l2tp, @nfc, @l2, 0xf436, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)='batadv_slave_1\x00'}) 21:59:34 executing program 5: 21:59:34 executing program 4: 21:59:34 executing program 1: 21:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:59:34 executing program 5: 21:59:34 executing program 4: 21:59:34 executing program 1: 21:59:34 executing program 0: 21:59:34 executing program 2: 21:59:34 executing program 5: 21:59:34 executing program 1: 21:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:34 executing program 4: 21:59:34 executing program 2: 21:59:34 executing program 5: 21:59:34 executing program 0: 21:59:34 executing program 4: 21:59:35 executing program 1: 21:59:35 executing program 2: 21:59:35 executing program 0: 21:59:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:35 executing program 5: 21:59:35 executing program 1: 21:59:35 executing program 4: 21:59:35 executing program 5: 21:59:35 executing program 2: 21:59:35 executing program 0: 21:59:35 executing program 1: 21:59:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:35 executing program 0: 21:59:35 executing program 4: 21:59:35 executing program 2: 21:59:35 executing program 1: 21:59:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x800) 21:59:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x48281, 0x0) write$binfmt_elf32(r0, 0x0, 0xde) 21:59:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={0x0}}, 0x80) 21:59:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, &(0x7f0000000000)) 21:59:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r0, 0x0, 0x0) 21:59:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) 21:59:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, 0x0, 0x0) 21:59:35 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000140)) 21:59:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000800) 21:59:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x5451, 0x0) 21:59:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000040)=""/3, 0xc, 0x40000020, 0x0, 0xffffffd8) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 21:59:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 21:59:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40) 21:59:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:35 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 21:59:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x4004800) 21:59:35 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, 0x0, 0x0) 21:59:35 executing program 5: r0 = memfd_create(&(0x7f0000000000)='/devhwrng\x00\x00', 0x0) fsync(r0) 21:59:35 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 21:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 21:59:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:36 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) 21:59:36 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) signalfd(r0, &(0x7f00000005c0), 0x8) 21:59:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 21:59:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4040000) 21:59:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xc054) 21:59:36 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000740)='ns/pid\x00') 21:59:36 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x70240, 0x102) 21:59:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x20000000) 21:59:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x6, 0x0) r1 = dup(r0) fsync(r1) 21:59:36 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 21:59:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x2c}}, 0x0) 21:59:36 executing program 4: r0 = eventfd(0x0) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:59:36 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x103000) 21:59:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x1000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 21:59:36 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcsa\x00', 0x200080, 0x0) 21:59:36 executing program 4: sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) 21:59:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40081) 21:59:36 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 21:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)) 21:59:36 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, 0x0, 0x0) 21:59:36 executing program 0: pipe2(&(0x7f0000000600)={0xffffffffffffffff}, 0x0) syncfs(r0) 21:59:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) signalfd(r0, 0x0, 0x0) 21:59:36 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40201, 0x0) write$selinux_attr(r0, 0x0, 0x0) 21:59:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x14) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 21:59:36 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, 0x0, 0x0) 21:59:36 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 21:59:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 21:59:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) 21:59:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) 21:59:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20000000) 21:59:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)={0x0}}, 0x44900) 21:59:36 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 21:59:36 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:59:36 executing program 1: sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) 21:59:36 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x408400, 0x0) 21:59:36 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:59:36 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) 21:59:37 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x12b8}, 0x4) 21:59:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x8000) 21:59:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x40008000) 21:59:37 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:59:37 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:59:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000080), 0x0, 0x12100, 0x0, 0x0) r2 = dup(r0) write$cgroup_freezer_state(r2, 0x0, 0x0) 21:59:37 executing program 1: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x189242, 0x0) 21:59:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$BLKDISCARD(r1, 0x1277, 0x0) 21:59:37 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x802, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x0) 21:59:37 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x40, 0x0) 21:59:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:37 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 21:59:37 executing program 4: getitimer(0x4, &(0x7f0000000040)) 21:59:37 executing program 5: r0 = memfd_create(&(0x7f0000000540)='/dev/hwrng\x00', 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) 21:59:37 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$TIPC_NL_NET_GET(r0, 0x0, 0x0) 21:59:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000240)) 21:59:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:37 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000016c0), 0x8, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 21:59:37 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 21:59:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 21:59:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000000) 21:59:37 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000016c0), 0x8, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, 0x0, 0x0) 21:59:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:37 executing program 1: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/ubi_ctrl\x00', 0x10000, 0x0) 21:59:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4004800) 21:59:37 executing program 5: sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) 21:59:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4008000) 21:59:37 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000005c0), 0x8) fstat(r0, 0x0) 21:59:37 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:59:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40000) 21:59:37 executing program 1: open(&(0x7f0000001400)='./file0\x00', 0x0, 0x0) 21:59:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20004004) 21:59:37 executing program 2: 21:59:37 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:59:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000810) 21:59:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x800) 21:59:37 executing program 2: socketpair(0x1, 0x1, 0x0, 0x0) 21:59:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x240140ec) 21:59:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x861) 21:59:38 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:59:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x40000) 21:59:38 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000005c0), 0x8) getsockname$unix(r0, 0x0, 0x0) 21:59:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x804) 21:59:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5451, 0x0) 21:59:38 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, 0x0, 0x0) 21:59:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) 21:59:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 21:59:38 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 21:59:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000840)={0x0, 0xfffffffffffffef6, &(0x7f0000000800)={0x0}}, 0x8010) 21:59:38 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) 21:59:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 21:59:38 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 21:59:38 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) 21:59:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x8852) 21:59:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x24000000) 21:59:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=ANY=[], 0x184}}, 0x80) 21:59:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000a40)) 21:59:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:38 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x80402, 0x0) 21:59:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={0x0}}, 0x0) 21:59:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x8040) 21:59:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x800) 21:59:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40040) 21:59:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 21:59:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:38 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x62000, 0x0) 21:59:38 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x600000, 0x0) 21:59:38 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x801, 0x0) 21:59:38 executing program 1: unshare(0x64040400) 21:59:38 executing program 5: open(&(0x7f0000000000)='.\x00', 0x0, 0x8) 21:59:38 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000400)) 21:59:38 executing program 0: syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x6, 0x101000) 21:59:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x840) [ 442.526849] IPVS: ftp: loaded support on port[0] = 21 21:59:39 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, 0x0, 0x0) 21:59:39 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000003040)='/dev/null\x00', 0x181000, 0x0) 21:59:39 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') 21:59:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x20000020) 21:59:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x4000) 21:59:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:39 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x200000, 0x0) 21:59:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x80) 21:59:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x4000) 21:59:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={0x0}}, 0x8000) 21:59:39 executing program 5: futex(&(0x7f0000000380), 0x3, 0x0, &(0x7f0000000440)={0x0, 0x3938700}, &(0x7f0000000480), 0x0) 21:59:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:39 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, 0x0, 0x0) 21:59:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 21:59:39 executing program 2: open(&(0x7f0000003fc0)='./file0\x00', 0xc0, 0x0) 21:59:39 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 21:59:39 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000280)) 21:59:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x40000) 21:59:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) 21:59:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20000800) 21:59:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x10) 21:59:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) fchmod(r0, 0x0) 21:59:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:39 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 21:59:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x20000000000000, 0x24002) write$binfmt_script(r0, 0x0, 0x0) 21:59:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x10) 21:59:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[], 0x194}}, 0x40) 21:59:40 executing program 2: newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x2000) 21:59:40 executing program 4: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x81fce66ee820fc26) 21:59:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20000000) 21:59:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$BLKRRPART(r1, 0x125f, 0x0) 21:59:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x101002) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 21:59:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007080)=[{0x0, 0x0, 0x0}], 0x1, 0x44) 21:59:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x0) 21:59:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007080)=[{&(0x7f0000000580)=@abs={0x1}, 0x6e, 0x0}], 0x1, 0x0) 21:59:40 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f0000000840)=0x6) 21:59:40 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') 21:59:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x0, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$HDIO_GETGEO(r1, 0x301, 0x0) 21:59:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x4000000) 21:59:40 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) fstat(r0, &(0x7f0000002340)) 21:59:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r1 = dup(r0) pread64(r1, 0x0, 0x0, 0x0) 21:59:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 21:59:40 executing program 2: futex(&(0x7f0000000040), 0x81, 0x0, &(0x7f0000000080), 0x0, 0x0) 21:59:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x80) 21:59:40 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 21:59:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x0, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40000) 21:59:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0x94}}, 0x94) 21:59:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0xd6a9711d643657ec) 21:59:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000080)=""/14, 0xf, 0x2000, 0x0, 0xffffffffffffff18) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 21:59:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) 21:59:40 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000006c0)='net_prio.ifpriomap\x00', 0x2, 0x0) 21:59:40 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') fchown(r0, 0xffffffffffffffff, 0xffffffffffffffff) 21:59:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r0, &(0x7f0000000040)) 21:59:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4044) 21:59:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x0, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:41 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = dup(r0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 21:59:41 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 21:59:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x20000000) 21:59:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 21:59:41 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') setns(r0, 0x20000000) 21:59:41 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000980), 0x8, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, 0x0, 0x0) 21:59:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:41 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 21:59:41 executing program 2: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x7d65e564b6711de9) 21:59:41 executing program 0: 21:59:41 executing program 4: 21:59:41 executing program 1: 21:59:41 executing program 2: 21:59:41 executing program 5: 21:59:41 executing program 0: 21:59:41 executing program 4: 21:59:41 executing program 2: 21:59:41 executing program 1: 21:59:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:41 executing program 5: 21:59:41 executing program 0: 21:59:41 executing program 4: 21:59:41 executing program 2: 21:59:41 executing program 1: 21:59:41 executing program 0: 21:59:41 executing program 5: 21:59:41 executing program 1: 21:59:41 executing program 4: 21:59:41 executing program 2: 21:59:41 executing program 5: 21:59:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:42 executing program 0: 21:59:42 executing program 2: 21:59:42 executing program 4: 21:59:42 executing program 1: 21:59:42 executing program 5: 21:59:42 executing program 2: 21:59:42 executing program 4: 21:59:42 executing program 1: 21:59:42 executing program 0: 21:59:42 executing program 5: 21:59:42 executing program 2: 21:59:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:42 executing program 4: 21:59:42 executing program 1: 21:59:42 executing program 5: 21:59:42 executing program 0: 21:59:42 executing program 2: 21:59:42 executing program 0: 21:59:42 executing program 5: 21:59:42 executing program 1: 21:59:42 executing program 2: 21:59:42 executing program 4: 21:59:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:42 executing program 0: 21:59:42 executing program 4: 21:59:42 executing program 5: 21:59:42 executing program 1: 21:59:42 executing program 2: 21:59:42 executing program 0: 21:59:42 executing program 4: 21:59:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000) 21:59:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:42 executing program 1: 21:59:42 executing program 2: 21:59:42 executing program 0: 21:59:43 executing program 4: 21:59:43 executing program 5: 21:59:43 executing program 2: 21:59:43 executing program 1: 21:59:43 executing program 0: 21:59:43 executing program 5: 21:59:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:43 executing program 4: 21:59:43 executing program 2: 21:59:43 executing program 1: 21:59:43 executing program 0: 21:59:43 executing program 5: 21:59:43 executing program 4: 21:59:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:43 executing program 2: 21:59:43 executing program 1: 21:59:43 executing program 5: 21:59:43 executing program 0: 21:59:43 executing program 4: 21:59:43 executing program 2: 21:59:43 executing program 1: 21:59:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:43 executing program 5: 21:59:43 executing program 0: 21:59:43 executing program 4: 21:59:43 executing program 1: 21:59:43 executing program 2: 21:59:43 executing program 0: 21:59:43 executing program 4: 21:59:43 executing program 1: 21:59:43 executing program 5: 21:59:43 executing program 2: 21:59:43 executing program 4: 21:59:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:43 executing program 0: 21:59:43 executing program 1: 21:59:43 executing program 2: 21:59:43 executing program 5: 21:59:43 executing program 4: 21:59:44 executing program 1: 21:59:44 executing program 0: 21:59:44 executing program 5: 21:59:44 executing program 2: 21:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:44 executing program 4: 21:59:44 executing program 0: 21:59:44 executing program 1: 21:59:44 executing program 5: 21:59:44 executing program 2: 21:59:44 executing program 0: 21:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:44 executing program 4: 21:59:44 executing program 1: 21:59:44 executing program 2: 21:59:44 executing program 5: 21:59:44 executing program 0: 21:59:44 executing program 1: 21:59:44 executing program 5: 21:59:44 executing program 4: 21:59:44 executing program 2: 21:59:44 executing program 0: 21:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:44 executing program 1: 21:59:44 executing program 2: 21:59:44 executing program 5: 21:59:44 executing program 4: 21:59:44 executing program 0: 21:59:44 executing program 1: 21:59:44 executing program 2: 21:59:44 executing program 5: 21:59:44 executing program 4: 21:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:44 executing program 0: 21:59:44 executing program 1: 21:59:44 executing program 5: 21:59:44 executing program 2: 21:59:44 executing program 4: 21:59:45 executing program 0: 21:59:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:45 executing program 1: 21:59:45 executing program 5: 21:59:45 executing program 2: 21:59:45 executing program 4: 21:59:45 executing program 0: 21:59:45 executing program 5: 21:59:45 executing program 1: 21:59:45 executing program 2: 21:59:45 executing program 4: 21:59:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:45 executing program 0: 21:59:45 executing program 1: 21:59:45 executing program 5: 21:59:45 executing program 2: 21:59:45 executing program 4: 21:59:45 executing program 0: 21:59:45 executing program 5: 21:59:45 executing program 2: 21:59:45 executing program 4: 21:59:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:45 executing program 1: 21:59:45 executing program 0: 21:59:45 executing program 5: 21:59:45 executing program 1: 21:59:45 executing program 4: 21:59:45 executing program 2: 21:59:45 executing program 5: 21:59:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:45 executing program 0: 21:59:45 executing program 1: 21:59:45 executing program 4: 21:59:45 executing program 2: 21:59:45 executing program 5: 21:59:45 executing program 4: 21:59:45 executing program 0: 21:59:45 executing program 1: 21:59:46 executing program 2: 21:59:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:46 executing program 5: 21:59:46 executing program 4: 21:59:46 executing program 0: 21:59:46 executing program 2: 21:59:46 executing program 1: 21:59:46 executing program 5: 21:59:46 executing program 4: 21:59:46 executing program 1: 21:59:46 executing program 0: 21:59:46 executing program 2: 21:59:46 executing program 5: 21:59:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:46 executing program 1: 21:59:46 executing program 0: 21:59:46 executing program 4: 21:59:46 executing program 2: 21:59:46 executing program 5: 21:59:46 executing program 1: 21:59:46 executing program 0: 21:59:46 executing program 4: 21:59:46 executing program 2: 21:59:46 executing program 5: 21:59:46 executing program 1: 21:59:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:46 executing program 4: 21:59:46 executing program 0: 21:59:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}], 0x2}, 0x60) 21:59:46 executing program 2: clone(0x4000000, 0x0, 0x0, 0x0, 0x0) 21:59:46 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') syz_open_procfs(0x0, &(0x7f0000000840)='net/ip_vs\x00') 21:59:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/2, 0x2}], 0x1}}], 0x4000120, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shutdown(r1, 0x1) 21:59:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 21:59:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:46 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x98000, 0x0) 21:59:46 executing program 2: clone(0x49880400, 0x0, 0x0, 0x0, 0x0) 21:59:46 executing program 5: clone(0xdf803000, 0x0, 0x0, 0x0, 0x0) 21:59:46 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) 21:59:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 450.532345] audit: type=1400 audit(1603231187.023:48): avc: denied { sys_admin } for pid=20726 comm="syz-executor.5" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 450.546344] IPVS: ftp: loaded support on port[0] = 21 21:59:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 450.594680] IPVS: ftp: loaded support on port[0] = 21 21:59:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, 0x0, 0x81) 21:59:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000013c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:59:47 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=ANY=[], 0x110) [ 450.944237] IPVS: ftp: loaded support on port[0] = 21 [ 450.948448] IPVS: ftp: loaded support on port[0] = 21 21:59:52 executing program 0: io_submit(0x0, 0x1, &(0x7f0000000580)=[0x0]) 21:59:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 21:59:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) ioctl$CHAR_RAW_ZEROOUT(0xffffffffffffffff, 0x127f, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) 21:59:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000000)=@generic={0x0, "365ebba914412d7d2bbc232ffee7732774f98aa622cce727f3693f1a58e38aed90549462b687fccc9d0f18e88b28ce438b8b3eb37c646ae9ea83e28feacdf243c2479c73cd83327f414adf0edc57167d3d0a33c87db7b5f5c39235c28241352fc908da77c0d8a64908dcac194e4b5a311c9b7ae207fdc612f28de2a2816a"}, 0x80, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000540)=[{0x10, 0x11}], 0x10}}], 0x1, 0x0) 21:59:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x90) 21:59:52 executing program 1: 21:59:52 executing program 5: 21:59:52 executing program 2: 21:59:52 executing program 4: 21:59:52 executing program 0: 21:59:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:52 executing program 1: 21:59:52 executing program 2: 21:59:52 executing program 5: 21:59:52 executing program 4: 21:59:52 executing program 0: 21:59:52 executing program 2: 21:59:52 executing program 1: 21:59:53 executing program 4: 21:59:53 executing program 1: 21:59:53 executing program 0: 21:59:53 executing program 5: 21:59:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:53 executing program 2: 21:59:53 executing program 4: 21:59:53 executing program 1: 21:59:53 executing program 5: 21:59:53 executing program 0: 21:59:53 executing program 2: 21:59:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:53 executing program 4: 21:59:53 executing program 1: 21:59:53 executing program 5: stat(&(0x7f0000000200)='./file0\x00', 0x0) 21:59:53 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x8) 21:59:53 executing program 2: socket$inet6(0x18, 0x0, 0x4) 21:59:53 executing program 4: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 21:59:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffff"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:53 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 21:59:53 executing program 5: socketpair(0x11, 0x3, 0x18, 0x0) 21:59:53 executing program 4: 21:59:53 executing program 0: 21:59:53 executing program 2: 21:59:53 executing program 5: 21:59:53 executing program 1: 21:59:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffff"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:53 executing program 4: 21:59:53 executing program 0: 21:59:53 executing program 5: 21:59:53 executing program 2: 21:59:53 executing program 1: 21:59:54 executing program 2: 21:59:54 executing program 1: 21:59:54 executing program 4: 21:59:54 executing program 5: 21:59:54 executing program 0: 21:59:54 executing program 2: 21:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffff"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:54 executing program 1: 21:59:54 executing program 4: 21:59:54 executing program 5: 21:59:54 executing program 0: 21:59:54 executing program 2: 21:59:54 executing program 1: 21:59:54 executing program 4: 21:59:54 executing program 0: 21:59:54 executing program 5: 21:59:54 executing program 2: 21:59:54 executing program 1: 21:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff07"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:54 executing program 4: 21:59:54 executing program 0: 21:59:54 executing program 5: 21:59:54 executing program 2: 21:59:54 executing program 4: 21:59:54 executing program 1: 21:59:54 executing program 0: 21:59:54 executing program 5: 21:59:54 executing program 2: 21:59:54 executing program 4: 21:59:54 executing program 5: 21:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff07"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:54 executing program 1: 21:59:54 executing program 0: 21:59:54 executing program 4: 21:59:54 executing program 2: 21:59:55 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 21:59:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') fcntl$F_GET_RW_HINT(r0, 0x40b, 0x0) 21:59:55 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x410040, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0, 0x0) 21:59:55 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x4100c2, 0x0) 21:59:55 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 21:59:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff07"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:55 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 21:59:55 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) bind$unix(r0, 0x0, 0x0) 21:59:55 executing program 1: pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 21:59:55 executing program 4: timer_delete(0x0) timer_getoverrun(0x0) 21:59:55 executing program 2: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 21:59:55 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 21:59:55 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x9a) 21:59:55 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10440, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 21:59:55 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 21:59:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:55 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x410440, 0x0) 21:59:55 executing program 2: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0xe) 21:59:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$CHAR_RAW_GETSIZE64(r0, 0x80081272, 0x0) 21:59:55 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x141240, 0x0) 21:59:55 executing program 0: statx(0xffffffffffffffff, &(0x7f0000001b80)='./file0\x00', 0x0, 0x0, 0x0) 21:59:55 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x410040, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 21:59:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 21:59:55 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/full\x00', 0x2002, 0x0) 21:59:55 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, 0x0) 21:59:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:55 executing program 0: pipe2(&(0x7f00000005c0), 0x800) 21:59:55 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 21:59:55 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 21:59:55 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 21:59:55 executing program 2: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$netlink(r0, 0x0, 0x0) 21:59:55 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000440)) 21:59:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:55 executing program 4: timer_create(0x0, 0x0, &(0x7f00000020c0)=0x0) timer_gettime(r0, &(0x7f0000002240)) 21:59:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) 21:59:55 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x191040, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) 21:59:55 executing program 1: rename(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') 21:59:56 executing program 0: rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:59:56 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$CHAR_RAW_IOMIN(r0, 0x1278, 0x0) 21:59:56 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$FIOCLEX(r0, 0x5451) 21:59:56 executing program 1: 21:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a000000"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:56 executing program 2: io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 21:59:56 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x482e42, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') 21:59:56 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 21:59:56 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r0, &(0x7f0000000180)) 21:59:56 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000400), 0x0, 0x0, 0x0) 21:59:56 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x410040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 21:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a000000"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:56 executing program 4: fchown(0xffffffffffffffff, 0xee00, 0xee00) 21:59:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 21:59:56 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 21:59:56 executing program 5: clock_getres(0x7, &(0x7f0000000140)) 21:59:56 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 21:59:56 executing program 2: pipe(&(0x7f00000015c0)={0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000001780)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:59:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x410040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x61) 21:59:56 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000000)) 21:59:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, 0x0) 21:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a000000"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:56 executing program 2: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) pread64(r0, 0x0, 0x0, 0x0) 21:59:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 21:59:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x3030c0, 0x0) 21:59:56 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) 21:59:56 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) sendmsg$sock(r0, 0x0, 0x0) 21:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:56 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) flock(r0, 0x0) 21:59:56 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 21:59:56 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 21:59:56 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x410040, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 21:59:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) utimensat(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0xea60}}, 0x0) 21:59:56 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101180, 0x0) 21:59:56 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4842, 0x0) 21:59:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, 0x0) 21:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:56 executing program 1: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) fchdir(r0) 21:59:56 executing program 0: pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r0) 21:59:57 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 21:59:57 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x410040, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 21:59:57 executing program 4: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) 21:59:57 executing program 1: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 21:59:57 executing program 0: lremovexattr(&(0x7f0000000080)='./file0\x00', 0x0) 21:59:57 executing program 5: r0 = eventfd2(0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) 21:59:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 21:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:57 executing program 4: setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 21:59:57 executing program 1: timer_create(0x0, 0x0, &(0x7f00000025c0)) 21:59:57 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001300)='/dev/null\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 21:59:57 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000001300)='/dev/null\x00', 0x4040, 0x0) 21:59:57 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(0x0) 21:59:57 executing program 4: syz_genetlink_get_family_id$devlink(0x0) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, 0x0, 0x0) 21:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:57 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000018c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 21:59:57 executing program 1: pipe(0x0) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 21:59:57 executing program 0: socket$inet6(0xa, 0x0, 0x8001) 21:59:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000001dc0)={&(0x7f0000001cc0), 0xc, &(0x7f0000001d80)={0x0}}, 0xc0001) 21:59:57 executing program 4: recvfrom$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:59:57 executing program 5: socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') syz_genetlink_get_family_id$ethtool(&(0x7f00000024c0)='ethtool\x00') 21:59:57 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r0, 0x0, 0x0, 0x0) 21:59:57 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000003340), 0x10) 21:59:57 executing program 4: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b00)='team\x00') 21:59:57 executing program 5: 21:59:57 executing program 2: 21:59:57 executing program 1: 21:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:57 executing program 4: 21:59:57 executing program 5: 21:59:57 executing program 2: 21:59:57 executing program 0: 21:59:58 executing program 1: 21:59:58 executing program 5: 21:59:58 executing program 4: 21:59:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:58 executing program 2: 21:59:58 executing program 1: 21:59:58 executing program 0: 21:59:58 executing program 4: 21:59:58 executing program 5: 21:59:58 executing program 1: 21:59:58 executing program 2: 21:59:58 executing program 0: 21:59:58 executing program 5: 21:59:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:58 executing program 4: 21:59:58 executing program 1: 21:59:58 executing program 2: 21:59:58 executing program 5: 21:59:58 executing program 0: 21:59:58 executing program 4: 21:59:58 executing program 1: 21:59:58 executing program 2: 21:59:58 executing program 5: 21:59:58 executing program 0: 21:59:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:58 executing program 4: 21:59:58 executing program 1: 21:59:58 executing program 5: 21:59:58 executing program 2: 21:59:58 executing program 0: 21:59:58 executing program 4: 21:59:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:58 executing program 5: 21:59:58 executing program 1: 21:59:58 executing program 2: 21:59:58 executing program 0: 21:59:58 executing program 4: 21:59:58 executing program 5: 21:59:58 executing program 1: 21:59:58 executing program 2: 21:59:58 executing program 0: 21:59:58 executing program 4: 21:59:58 executing program 5: 21:59:59 executing program 4: 21:59:59 executing program 1: 21:59:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:59 executing program 2: 21:59:59 executing program 0: 21:59:59 executing program 5: 21:59:59 executing program 1: 21:59:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:59 executing program 4: 21:59:59 executing program 2: 21:59:59 executing program 0: 21:59:59 executing program 5: 21:59:59 executing program 1: 21:59:59 executing program 0: 21:59:59 executing program 4: 21:59:59 executing program 2: 21:59:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:59 executing program 5: 21:59:59 executing program 1: 21:59:59 executing program 2: 21:59:59 executing program 0: 21:59:59 executing program 4: 21:59:59 executing program 5: 21:59:59 executing program 1: 21:59:59 executing program 0: 21:59:59 executing program 2: 21:59:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:59 executing program 4: 21:59:59 executing program 5: 21:59:59 executing program 1: 21:59:59 executing program 0: 21:59:59 executing program 2: 21:59:59 executing program 4: 21:59:59 executing program 5: 21:59:59 executing program 0: 21:59:59 executing program 2: 21:59:59 executing program 1: 21:59:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:59 executing program 5: 21:59:59 executing program 0: 21:59:59 executing program 2: 21:59:59 executing program 4: 21:59:59 executing program 1: 21:59:59 executing program 5: 22:00:00 executing program 4: 22:00:00 executing program 0: 22:00:00 executing program 2: 22:00:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:00 executing program 5: 22:00:00 executing program 1: 22:00:00 executing program 0: 22:00:00 executing program 4: 22:00:00 executing program 5: 22:00:00 executing program 2: 22:00:00 executing program 1: 22:00:00 executing program 0: 22:00:00 executing program 5: pipe2(&(0x7f00000005c0)={0xffffffffffffffff}, 0x0) flock(r0, 0x8) 22:00:00 executing program 4: 22:00:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:00 executing program 2: 22:00:00 executing program 1: 22:00:00 executing program 5: 22:00:00 executing program 0: 22:00:00 executing program 4: 22:00:00 executing program 2: 22:00:00 executing program 5: 22:00:00 executing program 1: 22:00:00 executing program 0: 22:00:00 executing program 4: 22:00:00 executing program 2: 22:00:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:00 executing program 1: 22:00:00 executing program 4: 22:00:00 executing program 5: 22:00:00 executing program 0: 22:00:00 executing program 2: 22:00:00 executing program 4: 22:00:00 executing program 0: 22:00:00 executing program 5: 22:00:00 executing program 1: 22:00:00 executing program 2: 22:00:01 executing program 4: 22:00:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:01 executing program 5: 22:00:01 executing program 0: 22:00:01 executing program 1: 22:00:01 executing program 2: 22:00:01 executing program 4: 22:00:01 executing program 0: 22:00:01 executing program 1: 22:00:01 executing program 5: 22:00:01 executing program 2: 22:00:01 executing program 4: 22:00:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:01 executing program 0: 22:00:01 executing program 5: 22:00:01 executing program 2: 22:00:01 executing program 1: 22:00:01 executing program 4: 22:00:01 executing program 2: 22:00:01 executing program 0: 22:00:01 executing program 5: 22:00:01 executing program 4: 22:00:01 executing program 1: 22:00:01 executing program 2: 22:00:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:01 executing program 4: 22:00:01 executing program 5: 22:00:01 executing program 2: 22:00:01 executing program 0: 22:00:01 executing program 1: 22:00:01 executing program 5: 22:00:01 executing program 4: setitimer(0x0, &(0x7f00000000c0)={{0x0, 0x10000}, {0x6}}, 0x0) 22:00:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r1, &(0x7f0000000200)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000140)={r2, 0x20}, 0x8) 22:00:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:01 executing program 1: futex(&(0x7f0000000000)=0x2, 0x81, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0xa28, &(0x7f0000000240)=0xffff, &(0x7f00000012c0)=0x1) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400004, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) 22:00:01 executing program 5 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:01 executing program 4 (fault-call:4 fault-nth:0): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:01 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 465.516972] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 465.532932] FAULT_INJECTION: forcing a failure. [ 465.532932] name failslab, interval 1, probability 0, space 0, times 1 [ 465.558196] CPU: 1 PID: 21579 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 [ 465.566171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.575553] Call Trace: [ 465.578285] dump_stack+0x22c/0x33e [ 465.581987] should_fail.cold+0xa/0x2f [ 465.585907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.591113] ? lock_acquire+0x170/0x3f0 [ 465.595164] __should_failslab+0x153/0x1b6 [ 465.599497] should_failslab+0x5/0xf [ 465.603281] __kmalloc+0x2dd/0x4f0 [ 465.606924] ? __se_sys_memfd_create+0xf8/0x440 [ 465.611753] __se_sys_memfd_create+0xf8/0x440 [ 465.616267] ? memfd_file_seals_ptr+0x150/0x150 [ 465.621046] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 465.626523] ? trace_hardirqs_off_caller+0x6e/0x210 [ 465.631625] ? do_syscall_64+0x21/0x670 [ 465.635673] do_syscall_64+0xf9/0x670 [ 465.639496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.640252] FAULT_INJECTION: forcing a failure. [ 465.640252] name failslab, interval 1, probability 0, space 0, times 1 [ 465.644737] RIP: 0033:0x45de59 [ 465.644754] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.644762] RSP: 002b:00007fbc6021da28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 465.644775] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000045de59 [ 465.644784] RDX: 00007fbc6021dae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 465.644791] RBP: 0000000000000000 R08: 00007fbc6021dad8 R09: 0000000000000000 [ 465.644814] R10: 00007fbc6021dadc R11: 0000000000000246 R12: 0000000000000000 [ 465.672983] FAULT_INJECTION: forcing a failure. [ 465.672983] name failslab, interval 1, probability 0, space 0, times 1 [ 465.678185] R13: 0000000020000100 R14: 0000000020000280 R15: 00000000200004c0 [ 465.752137] CPU: 0 PID: 21590 Comm: syz-executor.0 Not tainted 4.19.152-syzkaller #0 [ 465.760072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.769439] Call Trace: [ 465.772406] dump_stack+0x22c/0x33e [ 465.776059] should_fail.cold+0xa/0x2f [ 465.779965] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.785096] __should_failslab+0x153/0x1b6 [ 465.789614] should_failslab+0x5/0xf [ 465.793343] __kmalloc_track_caller+0x2d8/0x4e0 [ 465.798091] ? __sctp_setsockopt_connectx+0x3e/0x180 [ 465.803238] memdup_user+0x22/0xb0 [ 465.806800] __sctp_setsockopt_connectx+0x3e/0x180 [ 465.812103] sctp_getsockopt+0x1aa4/0x5fb3 [ 465.816357] ? mark_held_locks+0xf0/0xf0 [ 465.820482] ? lock_downgrade+0x750/0x750 [ 465.824650] ? sctp_getsockopt_peeloff_common+0x260/0x260 [ 465.830267] ? check_preemption_disabled+0x41/0x2b0 [ 465.835310] ? find_held_lock+0x2d/0x110 [ 465.839494] ? __fget+0x386/0x570 [ 465.842974] ? lock_downgrade+0x750/0x750 [ 465.847144] ? check_preemption_disabled+0x41/0x2b0 [ 465.852277] ? sock_has_perm+0x203/0x2c0 [ 465.856499] ? selinux_tun_dev_attach_queue+0x140/0x140 [ 465.861890] ? __fget+0x3ad/0x570 [ 465.865556] __sys_getsockopt+0x135/0x210 [ 465.869743] ? kernel_setsockopt+0x1c0/0x1c0 [ 465.874225] ? fput+0x2b/0x190 [ 465.877443] ? ksys_write+0x1c8/0x2a0 [ 465.881878] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 465.887270] __x64_sys_getsockopt+0xba/0x150 [ 465.891713] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 465.896324] do_syscall_64+0xf9/0x670 [ 465.900167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.905381] RIP: 0033:0x45de59 [ 465.908592] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.927516] RSP: 002b:00007f239393dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 465.935266] RAX: ffffffffffffffda RBX: 0000000000006d00 RCX: 000000000045de59 [ 465.942552] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000003 [ 465.949843] RBP: 00007f239393dca0 R08: 0000000020000200 R09: 0000000000000000 [ 465.957128] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000000 [ 465.964418] R13: 00007ffff42ed5af R14: 00007f239393e9c0 R15: 000000000118bf2c 22:00:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 466.096054] CPU: 1 PID: 21589 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 466.103999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.113374] Call Trace: [ 466.116002] dump_stack+0x22c/0x33e [ 466.119663] should_fail.cold+0xa/0x2f [ 466.123584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 466.128716] ? lock_acquire+0x170/0x3f0 [ 466.132713] __should_failslab+0x153/0x1b6 [ 466.136948] should_failslab+0x5/0xf [ 466.140659] kmem_cache_alloc+0x2b1/0x4a0 [ 466.144811] getname_flags+0xce/0x590 [ 466.148614] do_sys_open+0x26c/0x520 [ 466.152322] ? filp_open+0x70/0x70 [ 466.155858] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 466.161238] ? trace_hardirqs_off_caller+0x6e/0x210 [ 466.166391] ? do_syscall_64+0x21/0x670 [ 466.170408] do_syscall_64+0xf9/0x670 [ 466.174227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.179422] RIP: 0033:0x45de59 [ 466.182614] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.201508] RSP: 002b:00007f3722ee6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 466.209222] RAX: ffffffffffffffda RBX: 0000000000022a40 RCX: 000000000045de59 [ 466.216545] RDX: 0000000000410481 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 466.223823] RBP: 00007f3722ee6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 466.231084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 466.238367] R13: 00007fff0e0c6cdf R14: 00007f3722ee79c0 R15: 000000000118bf2c 22:00:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:02 executing program 1: futex(&(0x7f0000000000)=0x2, 0x81, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x1, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0xa28, &(0x7f0000000240)=0xffff, &(0x7f00000012c0)=0x1) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400004, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) [ 466.380511] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:03 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 466.550460] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:03 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x2) 22:00:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 466.780737] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:03 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x3) 22:00:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 467.060908] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:03 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x4) [ 467.286916] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 22:00:04 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:04 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x5) 22:00:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 467.677278] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 467.730578] FAULT_INJECTION: forcing a failure. [ 467.730578] name failslab, interval 1, probability 0, space 0, times 0 [ 467.766306] CPU: 0 PID: 21709 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 467.774259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.784504] Call Trace: [ 467.787130] dump_stack+0x22c/0x33e [ 467.790791] should_fail.cold+0xa/0x2f [ 467.794699] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.799846] __should_failslab+0x153/0x1b6 [ 467.804128] should_failslab+0x5/0xf [ 467.807887] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 467.812572] ? check_preemption_disabled+0x41/0x2b0 [ 467.817679] sctp_association_new+0x77/0x2000 [ 467.822297] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 467.827557] ? sctp_v6_scope+0x5a/0x70 [ 467.831463] __sctp_connect+0x6f2/0xd40 [ 467.835460] ? sctp_wfree+0x960/0x960 [ 467.839336] ? lock_sock_nested+0xa6/0x110 [ 467.843602] ? mark_held_locks+0xa6/0xf0 [ 467.847910] ? __local_bh_enable_ip+0x159/0x2a0 [ 467.852596] ? sctp_asconf_mgmt+0x380/0x380 [ 467.857023] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 467.862258] ? sctp_asconf_mgmt+0x380/0x380 [ 467.866590] sctp_inet_connect+0x14b/0x1b0 [ 467.870835] __sys_connect+0x265/0x2c0 [ 467.874724] ? __ia32_sys_accept+0xb0/0xb0 [ 467.880018] ? __mutex_add_waiter+0x160/0x160 [ 467.884531] ? vfs_write+0x393/0x540 [ 467.888247] ? fput+0x2b/0x190 [ 467.891451] ? ksys_write+0x1c8/0x2a0 [ 467.895249] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 467.900607] ? trace_hardirqs_off_caller+0x6e/0x210 [ 467.905621] __x64_sys_connect+0x6f/0xb0 [ 467.909840] do_syscall_64+0xf9/0x670 [ 467.913650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.918862] RIP: 0033:0x45de59 [ 467.922057] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.940959] RSP: 002b:00007f73b2186c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 467.949013] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 467.956452] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 467.963811] RBP: 00007f73b2186ca0 R08: 0000000000000000 R09: 0000000000000000 [ 467.971088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 22:00:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:04 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6) [ 467.978356] R13: 00007ffe89678f0f R14: 00007f73b21879c0 R15: 000000000118bfd4 22:00:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 468.090588] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:04 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x7) 22:00:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:04 executing program 1 (fault-call:4 fault-nth:1): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x3, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:04 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe) 22:00:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 468.414396] FAULT_INJECTION: forcing a failure. [ 468.414396] name failslab, interval 1, probability 0, space 0, times 0 [ 468.437733] CPU: 0 PID: 21757 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 468.445672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.455048] Call Trace: [ 468.457674] dump_stack+0x22c/0x33e [ 468.461334] should_fail.cold+0xa/0x2f [ 468.465261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 468.472845] __should_failslab+0x153/0x1b6 [ 468.477263] should_failslab+0x5/0xf [ 468.481063] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 468.485793] flex_array_alloc+0x1f4/0x2c0 [ 468.492891] sctp_stream_alloc_out+0x39/0x4c0 [ 468.497918] ? debug_object_destroy+0x240/0x240 [ 468.502613] sctp_stream_init+0x214/0x5a0 [ 468.506884] ? __raw_spin_lock_init+0x28/0x100 [ 468.511983] sctp_association_new+0x11cc/0x2000 [ 468.517012] ? sctp_v6_scope+0x5a/0x70 [ 468.521025] __sctp_connect+0x6f2/0xd40 [ 468.525020] ? sctp_wfree+0x960/0x960 [ 468.532843] ? lock_sock_nested+0xa6/0x110 [ 468.537086] ? mark_held_locks+0xa6/0xf0 [ 468.541241] ? __local_bh_enable_ip+0x159/0x2a0 [ 468.546038] ? sctp_asconf_mgmt+0x380/0x380 [ 468.550376] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 468.557755] ? sctp_asconf_mgmt+0x380/0x380 [ 468.562100] sctp_inet_connect+0x14b/0x1b0 [ 468.566422] __sys_connect+0x265/0x2c0 [ 468.571366] ? __ia32_sys_accept+0xb0/0xb0 [ 468.575613] ? __mutex_add_waiter+0x160/0x160 [ 468.580114] ? vfs_write+0x393/0x540 [ 468.583850] ? fput+0x2b/0x190 [ 468.587033] ? ksys_write+0x1c8/0x2a0 [ 468.590847] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 468.598656] ? trace_hardirqs_off_caller+0x6e/0x210 [ 468.603685] __x64_sys_connect+0x6f/0xb0 [ 468.607762] do_syscall_64+0xf9/0x670 [ 468.611566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.616853] RIP: 0033:0x45de59 [ 468.620230] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.639505] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 468.647210] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 468.654762] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 22:00:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x4, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 468.662035] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 468.670347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.677610] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:05 executing program 1 (fault-call:4 fault-nth:2): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 468.748611] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:05 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x300) 22:00:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 468.871464] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 468.920466] FAULT_INJECTION: forcing a failure. [ 468.920466] name failslab, interval 1, probability 0, space 0, times 0 22:00:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x5, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 469.005868] CPU: 1 PID: 21788 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 469.013908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.023286] Call Trace: [ 469.025914] dump_stack+0x22c/0x33e [ 469.029575] should_fail.cold+0xa/0x2f [ 469.033493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.038715] __should_failslab+0x153/0x1b6 [ 469.042977] should_failslab+0x5/0xf [ 469.046709] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 469.051408] sctp_auth_shkey_create+0x65/0x190 22:00:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:05 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x480) 22:00:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 469.056011] sctp_auth_asoc_copy_shkeys+0x1fb/0x2d0 [ 469.061063] sctp_association_new+0x1623/0x2000 [ 469.065764] ? sctp_v6_scope+0x5a/0x70 [ 469.069676] __sctp_connect+0x6f2/0xd40 [ 469.073704] ? sctp_wfree+0x960/0x960 [ 469.077615] ? lock_sock_nested+0xa6/0x110 [ 469.081879] ? mark_held_locks+0xa6/0xf0 [ 469.085961] ? __local_bh_enable_ip+0x159/0x2a0 [ 469.090847] ? sctp_asconf_mgmt+0x380/0x380 [ 469.095608] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 469.100817] ? sctp_asconf_mgmt+0x380/0x380 [ 469.105174] sctp_inet_connect+0x14b/0x1b0 [ 469.109441] __sys_connect+0x265/0x2c0 [ 469.113332] ? __ia32_sys_accept+0xb0/0xb0 [ 469.117570] ? __mutex_add_waiter+0x160/0x160 [ 469.122063] ? vfs_write+0x393/0x540 [ 469.125770] ? fput+0x2b/0x190 [ 469.128965] ? ksys_write+0x1c8/0x2a0 [ 469.132771] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 469.138133] ? trace_hardirqs_off_caller+0x6e/0x210 [ 469.143149] __x64_sys_connect+0x6f/0xb0 [ 469.147235] do_syscall_64+0xf9/0x670 [ 469.151032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.156317] RIP: 0033:0x45de59 [ 469.159541] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.178435] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 469.186136] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 469.193415] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 469.200737] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 469.208547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 469.216830] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 469.298214] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:05 executing program 1 (fault-call:4 fault-nth:3): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x8, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:05 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x500) [ 469.486778] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 469.531765] FAULT_INJECTION: forcing a failure. [ 469.531765] name failslab, interval 1, probability 0, space 0, times 0 [ 469.572756] CPU: 0 PID: 21833 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 469.580700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.590083] Call Trace: [ 469.592718] dump_stack+0x22c/0x33e [ 469.597447] should_fail.cold+0xa/0x2f [ 469.601378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.606513] ? find_held_lock+0x2d/0x110 [ 469.610604] ? sctp_bind_addr_state+0x1db/0x380 [ 469.615307] __should_failslab+0x153/0x1b6 [ 469.619560] should_failslab+0x5/0xf [ 469.623297] kmem_cache_alloc_trace+0x46/0x4b0 [ 469.627917] sctp_add_bind_addr+0x77/0x370 [ 469.633154] sctp_copy_local_addr_list+0x35b/0x520 [ 469.638123] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 469.642916] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 469.648324] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 469.653551] sctp_bind_addr_copy+0xde/0x470 [ 469.657909] __sctp_connect+0x713/0xd40 [ 469.661932] ? sctp_wfree+0x960/0x960 [ 469.665766] ? lock_sock_nested+0xa6/0x110 22:00:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 469.670040] ? mark_held_locks+0xa6/0xf0 [ 469.674128] ? __local_bh_enable_ip+0x159/0x2a0 [ 469.678818] ? sctp_asconf_mgmt+0x380/0x380 [ 469.683266] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 469.688495] ? sctp_asconf_mgmt+0x380/0x380 [ 469.692838] sctp_inet_connect+0x14b/0x1b0 [ 469.697115] __sys_connect+0x265/0x2c0 [ 469.701033] ? __ia32_sys_accept+0xb0/0xb0 [ 469.705329] ? __mutex_add_waiter+0x160/0x160 [ 469.709851] ? vfs_write+0x393/0x540 [ 469.713697] ? fput+0x2b/0x190 [ 469.716911] ? ksys_write+0x1c8/0x2a0 [ 469.720738] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 469.726242] ? trace_hardirqs_off_caller+0x6e/0x210 [ 469.731278] __x64_sys_connect+0x6f/0xb0 [ 469.735543] do_syscall_64+0xf9/0x670 [ 469.739380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.744595] RIP: 0033:0x45de59 [ 469.747934] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.766847] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 469.774553] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 469.781822] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 469.789098] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 469.796367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 469.803654] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 469.861565] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 469.878087] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:06 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x600) 22:00:06 executing program 1 (fault-call:4 fault-nth:4): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:06 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x700) 22:00:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 470.083358] FAULT_INJECTION: forcing a failure. [ 470.083358] name failslab, interval 1, probability 0, space 0, times 0 [ 470.156767] CPU: 0 PID: 21865 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 470.164715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.174874] Call Trace: [ 470.177492] dump_stack+0x22c/0x33e [ 470.181185] should_fail.cold+0xa/0x2f [ 470.185121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.190856] ? find_held_lock+0x2d/0x110 [ 470.194942] ? sctp_bind_addr_state+0x1db/0x380 [ 470.199641] __should_failslab+0x153/0x1b6 [ 470.203902] should_failslab+0x5/0xf [ 470.207637] kmem_cache_alloc_trace+0x46/0x4b0 [ 470.212248] sctp_add_bind_addr+0x77/0x370 [ 470.216516] sctp_copy_local_addr_list+0x35b/0x520 [ 470.221477] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 470.226271] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 470.231494] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 470.236729] sctp_bind_addr_copy+0xde/0x470 [ 470.241124] __sctp_connect+0x713/0xd40 [ 470.245228] ? sctp_wfree+0x960/0x960 [ 470.249051] ? lock_sock_nested+0xa6/0x110 [ 470.253319] ? mark_held_locks+0xa6/0xf0 [ 470.257402] ? __local_bh_enable_ip+0x159/0x2a0 [ 470.262092] ? sctp_asconf_mgmt+0x380/0x380 [ 470.266433] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 470.271652] ? sctp_asconf_mgmt+0x380/0x380 [ 470.275993] sctp_inet_connect+0x14b/0x1b0 [ 470.280258] __sys_connect+0x265/0x2c0 [ 470.284173] ? __ia32_sys_accept+0xb0/0xb0 [ 470.288439] ? __mutex_add_waiter+0x160/0x160 [ 470.292965] ? vfs_write+0x393/0x540 [ 470.296710] ? fput+0x2b/0x190 [ 470.299921] ? ksys_write+0x1c8/0x2a0 [ 470.303746] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 470.309140] ? trace_hardirqs_off_caller+0x6e/0x210 [ 470.312756] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 470.314180] __x64_sys_connect+0x6f/0xb0 [ 470.327943] do_syscall_64+0xf9/0x670 [ 470.331765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.337016] RIP: 0033:0x45de59 [ 470.340245] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.359169] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 470.366906] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 470.374282] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 470.381577] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 470.382041] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 470.388868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:00:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xc, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 470.388877] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:06 executing program 1 (fault-call:4 fault-nth:5): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:07 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe00) [ 470.577160] FAULT_INJECTION: forcing a failure. [ 470.577160] name failslab, interval 1, probability 0, space 0, times 0 [ 470.620396] CPU: 0 PID: 21901 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 470.626413] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 470.628326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.628334] Call Trace: [ 470.628364] dump_stack+0x22c/0x33e [ 470.628388] should_fail.cold+0xa/0x2f [ 470.659079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.664180] ? find_held_lock+0x2d/0x110 [ 470.671742] ? sctp_bind_addr_state+0x1db/0x380 [ 470.676458] __should_failslab+0x153/0x1b6 [ 470.680729] should_failslab+0x5/0xf [ 470.684455] kmem_cache_alloc_trace+0x46/0x4b0 [ 470.689169] sctp_add_bind_addr+0x77/0x370 [ 470.693450] sctp_copy_local_addr_list+0x35b/0x520 [ 470.698598] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 470.703375] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 470.708566] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 470.713755] sctp_bind_addr_copy+0xde/0x470 [ 470.718076] __sctp_connect+0x713/0xd40 [ 470.722042] ? sctp_wfree+0x960/0x960 [ 470.725878] ? lock_sock_nested+0xa6/0x110 [ 470.730116] ? mark_held_locks+0xa6/0xf0 [ 470.734183] ? __local_bh_enable_ip+0x159/0x2a0 [ 470.738841] ? sctp_asconf_mgmt+0x380/0x380 [ 470.743160] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 470.748345] ? sctp_asconf_mgmt+0x380/0x380 [ 470.752671] sctp_inet_connect+0x14b/0x1b0 [ 470.756924] __sys_connect+0x265/0x2c0 [ 470.760814] ? __ia32_sys_accept+0xb0/0xb0 [ 470.765205] ? __mutex_add_waiter+0x160/0x160 [ 470.769792] ? vfs_write+0x393/0x540 [ 470.773596] ? fput+0x2b/0x190 [ 470.776957] ? ksys_write+0x1c8/0x2a0 [ 470.780772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 470.787187] ? trace_hardirqs_off_caller+0x6e/0x210 [ 470.792217] __x64_sys_connect+0x6f/0xb0 [ 470.796276] do_syscall_64+0xf9/0x670 [ 470.800085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.805264] RIP: 0033:0x45de59 [ 470.808461] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.827395] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 470.835114] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 470.842407] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 470.849668] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 470.856945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 470.864223] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xd, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:07 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x8004) 22:00:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x7, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:07 executing program 1 (fault-call:4 fault-nth:6): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 470.901152] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:07 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6b6b6b) [ 471.028991] FAULT_INJECTION: forcing a failure. [ 471.028991] name failslab, interval 1, probability 0, space 0, times 0 [ 471.080831] CPU: 0 PID: 21925 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 471.088760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.098130] Call Trace: [ 471.100768] dump_stack+0x22c/0x33e [ 471.104424] should_fail.cold+0xa/0x2f [ 471.108336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.111348] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 471.113885] ? find_held_lock+0x2d/0x110 [ 471.113910] ? sctp_bind_addr_state+0x1db/0x380 [ 471.133658] __should_failslab+0x153/0x1b6 [ 471.137920] should_failslab+0x5/0xf [ 471.141651] kmem_cache_alloc_trace+0x46/0x4b0 [ 471.146293] sctp_add_bind_addr+0x77/0x370 [ 471.150545] sctp_copy_local_addr_list+0x35b/0x520 [ 471.155493] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 471.160269] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 471.165522] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 471.170728] sctp_bind_addr_copy+0xde/0x470 [ 471.175056] __sctp_connect+0x713/0xd40 [ 471.179033] ? sctp_wfree+0x960/0x960 [ 471.182837] ? lock_sock_nested+0xa6/0x110 [ 471.187076] ? mark_held_locks+0xa6/0xf0 [ 471.191131] ? __local_bh_enable_ip+0x159/0x2a0 [ 471.195823] ? sctp_asconf_mgmt+0x380/0x380 [ 471.200152] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 471.205351] ? sctp_asconf_mgmt+0x380/0x380 [ 471.209661] sctp_inet_connect+0x14b/0x1b0 [ 471.213918] __sys_connect+0x265/0x2c0 [ 471.217794] ? __ia32_sys_accept+0xb0/0xb0 [ 471.222023] ? __mutex_add_waiter+0x160/0x160 [ 471.226517] ? vfs_write+0x393/0x540 [ 471.230221] ? fput+0x2b/0x190 [ 471.233400] ? ksys_write+0x1c8/0x2a0 [ 471.237212] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 471.242581] ? trace_hardirqs_off_caller+0x6e/0x210 [ 471.247591] __x64_sys_connect+0x6f/0xb0 [ 471.251648] do_syscall_64+0xf9/0x670 [ 471.255465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.260653] RIP: 0033:0x45de59 22:00:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 471.263843] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.282827] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 471.290528] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 471.297787] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 471.306272] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 471.315365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 471.323319] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 471.369164] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 471.369425] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:07 executing program 1 (fault-call:4 fault-nth:7): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x22, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:08 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1000000) [ 471.558644] FAULT_INJECTION: forcing a failure. [ 471.558644] name failslab, interval 1, probability 0, space 0, times 0 [ 471.617808] CPU: 1 PID: 21963 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 471.626059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.636215] Call Trace: [ 471.638872] dump_stack+0x22c/0x33e [ 471.642633] should_fail.cold+0xa/0x2f [ 471.646906] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.652036] ? find_held_lock+0x2d/0x110 [ 471.656122] ? sctp_bind_addr_state+0x1db/0x380 [ 471.660835] __should_failslab+0x153/0x1b6 [ 471.665093] should_failslab+0x5/0xf [ 471.668893] kmem_cache_alloc_trace+0x46/0x4b0 [ 471.673549] sctp_add_bind_addr+0x77/0x370 [ 471.677799] sctp_copy_local_addr_list+0x35b/0x520 [ 471.682743] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 471.687526] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 471.692736] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 471.697946] sctp_bind_addr_copy+0xde/0x470 [ 471.702287] __sctp_connect+0x713/0xd40 [ 471.706289] ? sctp_wfree+0x960/0x960 [ 471.710194] ? lock_sock_nested+0xa6/0x110 [ 471.715310] ? mark_held_locks+0xa6/0xf0 [ 471.719399] ? __local_bh_enable_ip+0x159/0x2a0 [ 471.724281] ? sctp_asconf_mgmt+0x380/0x380 [ 471.728607] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 471.734317] ? sctp_asconf_mgmt+0x380/0x380 [ 471.738634] sctp_inet_connect+0x14b/0x1b0 [ 471.742870] __sys_connect+0x265/0x2c0 [ 471.746931] ? __ia32_sys_accept+0xb0/0xb0 [ 471.751508] ? __mutex_add_waiter+0x160/0x160 [ 471.756007] ? vfs_write+0x393/0x540 [ 471.764599] ? fput+0x2b/0x190 [ 471.767809] ? ksys_write+0x1c8/0x2a0 [ 471.772981] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 471.778484] ? trace_hardirqs_off_caller+0x6e/0x210 [ 471.783721] __x64_sys_connect+0x6f/0xb0 [ 471.787795] do_syscall_64+0xf9/0x670 [ 471.791596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.796807] RIP: 0033:0x45de59 [ 471.800015] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x10, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 471.818908] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 471.826623] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 471.833970] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 471.841233] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 471.848509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 471.855933] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 471.979079] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 472.000547] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:08 executing program 1 (fault-call:4 fault-nth:8): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 472.163863] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x12, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2c, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 472.261415] FAULT_INJECTION: forcing a failure. [ 472.261415] name failslab, interval 1, probability 0, space 0, times 0 [ 472.304731] CPU: 0 PID: 22009 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 472.312689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.322065] Call Trace: [ 472.324708] dump_stack+0x22c/0x33e [ 472.328391] should_fail.cold+0xa/0x2f [ 472.332323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.337459] ? find_held_lock+0x2d/0x110 [ 472.341542] ? sctp_bind_addr_state+0x1db/0x380 [ 472.346224] __should_failslab+0x153/0x1b6 [ 472.350462] should_failslab+0x5/0xf [ 472.354179] kmem_cache_alloc_trace+0x46/0x4b0 [ 472.358767] sctp_add_bind_addr+0x77/0x370 [ 472.363009] sctp_copy_local_addr_list+0x35b/0x520 [ 472.367966] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 472.372724] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 472.377913] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 472.384434] sctp_bind_addr_copy+0xde/0x470 [ 472.388767] __sctp_connect+0x713/0xd40 [ 472.392773] ? sctp_wfree+0x960/0x960 [ 472.396577] ? lock_sock_nested+0xa6/0x110 [ 472.400919] ? mark_held_locks+0xa6/0xf0 [ 472.405015] ? __local_bh_enable_ip+0x159/0x2a0 [ 472.409714] ? sctp_asconf_mgmt+0x380/0x380 [ 472.414043] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 472.419264] ? sctp_asconf_mgmt+0x380/0x380 [ 472.423594] sctp_inet_connect+0x14b/0x1b0 [ 472.427858] __sys_connect+0x265/0x2c0 [ 472.431751] ? __ia32_sys_accept+0xb0/0xb0 [ 472.435986] ? __mutex_add_waiter+0x160/0x160 [ 472.440484] ? vfs_write+0x393/0x540 [ 472.444192] ? fput+0x2b/0x190 [ 472.447383] ? ksys_write+0x1c8/0x2a0 [ 472.451265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 472.456647] ? trace_hardirqs_off_caller+0x6e/0x210 [ 472.461826] __x64_sys_connect+0x6f/0xb0 [ 472.465940] do_syscall_64+0xf9/0x670 [ 472.469784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.474985] RIP: 0033:0x45de59 [ 472.478178] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.497364] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 472.505083] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 472.512357] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 472.519651] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 472.526931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 472.534229] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 472.553565] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:09 executing program 1 (fault-call:4 fault-nth:9): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:09 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x2000000) 22:00:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 472.764641] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 472.776865] FAULT_INJECTION: forcing a failure. [ 472.776865] name failslab, interval 1, probability 0, space 0, times 0 [ 472.813708] CPU: 0 PID: 22031 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 472.821751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.831128] Call Trace: [ 472.833767] dump_stack+0x22c/0x33e [ 472.837444] should_fail.cold+0xa/0x2f [ 472.841455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.846722] ? find_held_lock+0x2d/0x110 [ 472.850831] ? sctp_bind_addr_state+0x1db/0x380 [ 472.855656] __should_failslab+0x153/0x1b6 [ 472.859923] should_failslab+0x5/0xf [ 472.863662] kmem_cache_alloc_trace+0x46/0x4b0 [ 472.868270] sctp_add_bind_addr+0x77/0x370 [ 472.872631] sctp_copy_local_addr_list+0x35b/0x520 [ 472.877593] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 472.882370] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 472.889252] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 472.894467] sctp_bind_addr_copy+0xde/0x470 [ 472.898825] __sctp_connect+0x713/0xd40 [ 472.902808] ? sctp_wfree+0x960/0x960 [ 472.906810] ? lock_sock_nested+0xa6/0x110 [ 472.911047] ? mark_held_locks+0xa6/0xf0 [ 472.915104] ? __local_bh_enable_ip+0x159/0x2a0 [ 472.919772] ? sctp_asconf_mgmt+0x380/0x380 [ 472.924089] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 472.929282] ? sctp_asconf_mgmt+0x380/0x380 [ 472.933594] sctp_inet_connect+0x14b/0x1b0 [ 472.937829] __sys_connect+0x265/0x2c0 [ 472.941730] ? __ia32_sys_accept+0xb0/0xb0 [ 472.945965] ? __mutex_add_waiter+0x160/0x160 [ 472.950472] ? vfs_write+0x393/0x540 [ 472.954199] ? fput+0x2b/0x190 [ 472.957439] ? ksys_write+0x1c8/0x2a0 [ 472.961262] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 472.966760] ? trace_hardirqs_off_caller+0x6e/0x210 [ 472.971791] __x64_sys_connect+0x6f/0xb0 [ 472.975890] do_syscall_64+0xf9/0x670 [ 472.979688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.984892] RIP: 0033:0x45de59 [ 472.988077] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.006980] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x14, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 473.014700] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 473.021979] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 473.029240] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 473.036559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 473.043955] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 473.088479] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 473.088867] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x48, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:09 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x3000000) 22:00:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x15, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:09 executing program 1 (fault-call:4 fault-nth:10): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 473.362367] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 473.376436] FAULT_INJECTION: forcing a failure. [ 473.376436] name failslab, interval 1, probability 0, space 0, times 0 22:00:09 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x4000000) 22:00:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x16, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 473.423284] CPU: 0 PID: 22072 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 473.431232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.440610] Call Trace: [ 473.443238] dump_stack+0x22c/0x33e [ 473.446911] should_fail.cold+0xa/0x2f [ 473.450835] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.455963] ? find_held_lock+0x2d/0x110 [ 473.460225] ? sctp_bind_addr_state+0x1db/0x380 [ 473.464937] __should_failslab+0x153/0x1b6 [ 473.469205] should_failslab+0x5/0xf [ 473.472949] kmem_cache_alloc_trace+0x46/0x4b0 [ 473.477560] sctp_add_bind_addr+0x77/0x370 [ 473.481834] sctp_copy_local_addr_list+0x35b/0x520 [ 473.486780] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 473.491778] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 473.496998] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 473.502253] sctp_bind_addr_copy+0xde/0x470 [ 473.506611] __sctp_connect+0x713/0xd40 [ 473.510712] ? sctp_wfree+0x960/0x960 [ 473.514542] ? lock_sock_nested+0xa6/0x110 [ 473.518820] ? mark_held_locks+0xa6/0xf0 [ 473.522913] ? __local_bh_enable_ip+0x159/0x2a0 [ 473.527591] ? sctp_asconf_mgmt+0x380/0x380 [ 473.531925] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 473.537114] ? sctp_asconf_mgmt+0x380/0x380 [ 473.541436] sctp_inet_connect+0x14b/0x1b0 [ 473.545669] __sys_connect+0x265/0x2c0 [ 473.549573] ? __ia32_sys_accept+0xb0/0xb0 [ 473.553846] ? __mutex_add_waiter+0x160/0x160 [ 473.558606] ? vfs_write+0x393/0x540 [ 473.562348] ? fput+0x2b/0x190 [ 473.565534] ? ksys_write+0x1c8/0x2a0 [ 473.569332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 473.575383] ? trace_hardirqs_off_caller+0x6e/0x210 [ 473.580412] __x64_sys_connect+0x6f/0xb0 [ 473.584496] do_syscall_64+0xf9/0x670 [ 473.588294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.593474] RIP: 0033:0x45de59 [ 473.596673] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.615573] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 473.623569] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 473.630861] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 473.638246] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 473.646473] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 473.653768] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:10 executing program 1 (fault-call:4 fault-nth:11): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 473.734548] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 473.759422] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x17, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4c, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 473.877185] FAULT_INJECTION: forcing a failure. [ 473.877185] name failslab, interval 1, probability 0, space 0, times 0 22:00:10 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x5000000) [ 473.946769] CPU: 0 PID: 22102 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 473.954704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.964070] Call Trace: [ 473.966673] dump_stack+0x22c/0x33e [ 473.970328] should_fail.cold+0xa/0x2f [ 473.974240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.979347] ? find_held_lock+0x2d/0x110 [ 473.983413] ? sctp_bind_addr_state+0x1db/0x380 [ 473.988090] __should_failslab+0x153/0x1b6 [ 473.992330] should_failslab+0x5/0xf [ 473.996043] kmem_cache_alloc_trace+0x46/0x4b0 [ 474.000622] sctp_add_bind_addr+0x77/0x370 [ 474.004873] sctp_copy_local_addr_list+0x35b/0x520 [ 474.009808] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 474.014563] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 474.019844] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 474.025033] sctp_bind_addr_copy+0xde/0x470 [ 474.029377] __sctp_connect+0x713/0xd40 [ 474.033353] ? sctp_wfree+0x960/0x960 [ 474.037204] ? lock_sock_nested+0xa6/0x110 [ 474.041633] ? mark_held_locks+0xa6/0xf0 [ 474.045702] ? __local_bh_enable_ip+0x159/0x2a0 [ 474.050387] ? sctp_asconf_mgmt+0x380/0x380 [ 474.054758] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 474.060013] ? sctp_asconf_mgmt+0x380/0x380 [ 474.064804] sctp_inet_connect+0x14b/0x1b0 [ 474.069187] __sys_connect+0x265/0x2c0 [ 474.073112] ? __ia32_sys_accept+0xb0/0xb0 [ 474.077358] ? __mutex_add_waiter+0x160/0x160 [ 474.081865] ? vfs_write+0x393/0x540 [ 474.085598] ? fput+0x2b/0x190 [ 474.088809] ? ksys_write+0x1c8/0x2a0 [ 474.092625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 474.098180] ? trace_hardirqs_off_caller+0x6e/0x210 [ 474.103249] __x64_sys_connect+0x6f/0xb0 [ 474.107319] do_syscall_64+0xf9/0x670 [ 474.111122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.116328] RIP: 0033:0x45de59 [ 474.119527] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.138432] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 474.146142] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 474.153648] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 474.161029] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 474.168326] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 474.175595] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:10 executing program 1 (fault-call:4 fault-nth:12): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 474.234491] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 474.347877] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x19, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 474.443340] FAULT_INJECTION: forcing a failure. [ 474.443340] name failslab, interval 1, probability 0, space 0, times 0 [ 474.479512] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 474.510634] CPU: 0 PID: 22134 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 474.518649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.528144] Call Trace: [ 474.530771] dump_stack+0x22c/0x33e [ 474.534811] should_fail.cold+0xa/0x2f [ 474.538732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.543859] ? find_held_lock+0x2d/0x110 [ 474.547992] ? sctp_bind_addr_state+0x1db/0x380 [ 474.552708] __should_failslab+0x153/0x1b6 [ 474.556969] should_failslab+0x5/0xf [ 474.560702] kmem_cache_alloc_trace+0x46/0x4b0 [ 474.565309] sctp_add_bind_addr+0x77/0x370 [ 474.569570] sctp_copy_local_addr_list+0x35b/0x520 [ 474.574519] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 474.579302] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 474.584528] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 474.589753] sctp_bind_addr_copy+0xde/0x470 [ 474.594126] __sctp_connect+0x713/0xd40 [ 474.598138] ? sctp_wfree+0x960/0x960 [ 474.601962] ? lock_sock_nested+0xa6/0x110 [ 474.606236] ? mark_held_locks+0xa6/0xf0 [ 474.610320] ? __local_bh_enable_ip+0x159/0x2a0 [ 474.615017] ? sctp_asconf_mgmt+0x380/0x380 [ 474.619371] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 474.624594] ? sctp_asconf_mgmt+0x380/0x380 [ 474.628933] sctp_inet_connect+0x14b/0x1b0 [ 474.633218] __sys_connect+0x265/0x2c0 [ 474.637122] ? __ia32_sys_accept+0xb0/0xb0 [ 474.641366] ? __mutex_add_waiter+0x160/0x160 [ 474.645949] ? vfs_write+0x393/0x540 [ 474.649665] ? fput+0x2b/0x190 [ 474.652868] ? ksys_write+0x1c8/0x2a0 [ 474.656671] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 474.662052] ? trace_hardirqs_off_caller+0x6e/0x210 [ 474.667088] __x64_sys_connect+0x6f/0xb0 [ 474.671179] do_syscall_64+0xf9/0x670 [ 474.675020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.680245] RIP: 0033:0x45de59 [ 474.683455] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.702369] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:11 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6000000) [ 474.710084] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 474.717354] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 474.724616] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 474.731905] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 474.739190] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x55, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:11 executing program 1 (fault-call:4 fault-nth:13): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 474.828553] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1c, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 475.037464] FAULT_INJECTION: forcing a failure. [ 475.037464] name failslab, interval 1, probability 0, space 0, times 0 [ 475.043528] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 475.106597] CPU: 0 PID: 22176 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 475.114542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.123918] Call Trace: [ 475.126547] dump_stack+0x22c/0x33e [ 475.130225] should_fail.cold+0xa/0x2f [ 475.134167] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.139307] ? find_held_lock+0x2d/0x110 [ 475.143496] ? sctp_bind_addr_state+0x1db/0x380 [ 475.148199] __should_failslab+0x153/0x1b6 [ 475.152463] should_failslab+0x5/0xf [ 475.156225] kmem_cache_alloc_trace+0x46/0x4b0 [ 475.160839] sctp_add_bind_addr+0x77/0x370 [ 475.165106] sctp_copy_local_addr_list+0x35b/0x520 [ 475.170344] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 475.175239] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 475.180564] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 475.185789] sctp_bind_addr_copy+0xde/0x470 [ 475.190149] __sctp_connect+0x713/0xd40 [ 475.194172] ? sctp_wfree+0x960/0x960 [ 475.197995] ? lock_sock_nested+0xa6/0x110 [ 475.202261] ? mark_held_locks+0xa6/0xf0 22:00:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 475.206352] ? __local_bh_enable_ip+0x159/0x2a0 [ 475.211042] ? sctp_asconf_mgmt+0x380/0x380 [ 475.215394] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 475.220774] ? sctp_asconf_mgmt+0x380/0x380 [ 475.225107] sctp_inet_connect+0x14b/0x1b0 [ 475.229368] __sys_connect+0x265/0x2c0 [ 475.233289] ? __ia32_sys_accept+0xb0/0xb0 [ 475.237536] ? __mutex_add_waiter+0x160/0x160 [ 475.242207] ? vfs_write+0x393/0x540 [ 475.245938] ? fput+0x2b/0x190 [ 475.249167] ? ksys_write+0x1c8/0x2a0 [ 475.252985] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 475.258368] ? trace_hardirqs_off_caller+0x6e/0x210 [ 475.263408] __x64_sys_connect+0x6f/0xb0 [ 475.267494] do_syscall_64+0xf9/0x670 [ 475.271307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.277241] RIP: 0033:0x45de59 [ 475.280434] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1d, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:11 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x7000000) [ 475.299977] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 475.307688] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 475.315050] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 475.322312] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 475.329579] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 475.338848] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:11 executing program 1 (fault-call:4 fault-nth:14): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1e, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 475.437967] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 475.450585] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 475.526846] FAULT_INJECTION: forcing a failure. [ 475.526846] name failslab, interval 1, probability 0, space 0, times 0 [ 475.547228] CPU: 0 PID: 22206 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 475.555157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.564602] Call Trace: [ 475.567203] dump_stack+0x22c/0x33e [ 475.570844] should_fail.cold+0xa/0x2f [ 475.574724] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.579847] ? find_held_lock+0x2d/0x110 [ 475.583900] ? sctp_bind_addr_state+0x1db/0x380 [ 475.589013] __should_failslab+0x153/0x1b6 [ 475.593269] should_failslab+0x5/0xf [ 475.596993] kmem_cache_alloc_trace+0x46/0x4b0 [ 475.601590] sctp_add_bind_addr+0x77/0x370 [ 475.605979] sctp_copy_local_addr_list+0x35b/0x520 [ 475.610912] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 475.615783] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 475.620968] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 475.626165] sctp_bind_addr_copy+0xde/0x470 [ 475.630480] __sctp_connect+0x713/0xd40 [ 475.634480] ? sctp_wfree+0x960/0x960 [ 475.638312] ? lock_sock_nested+0xa6/0x110 [ 475.642567] ? mark_held_locks+0xa6/0xf0 [ 475.646653] ? __local_bh_enable_ip+0x159/0x2a0 [ 475.651334] ? sctp_asconf_mgmt+0x380/0x380 [ 475.655673] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 475.661270] ? sctp_asconf_mgmt+0x380/0x380 [ 475.665710] sctp_inet_connect+0x14b/0x1b0 [ 475.669979] __sys_connect+0x265/0x2c0 [ 475.673868] ? __ia32_sys_accept+0xb0/0xb0 [ 475.678196] ? __mutex_add_waiter+0x160/0x160 [ 475.682746] ? vfs_write+0x393/0x540 [ 475.686465] ? fput+0x2b/0x190 [ 475.689798] ? ksys_write+0x1c8/0x2a0 [ 475.693797] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 475.699172] ? trace_hardirqs_off_caller+0x6e/0x210 [ 475.704200] __x64_sys_connect+0x6f/0xb0 [ 475.708385] do_syscall_64+0xf9/0x670 [ 475.712194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.717394] RIP: 0033:0x45de59 [ 475.720683] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.739949] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 475.747650] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 475.754909] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 475.762165] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 475.769594] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e 22:00:12 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe000000) 22:00:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x60, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 475.776850] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:12 executing program 1 (fault-call:4 fault-nth:15): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x21, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 476.011557] FAULT_INJECTION: forcing a failure. [ 476.011557] name failslab, interval 1, probability 0, space 0, times 0 [ 476.062361] CPU: 0 PID: 22226 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 476.070324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.079716] Call Trace: [ 476.082344] dump_stack+0x22c/0x33e [ 476.086103] should_fail.cold+0xa/0x2f [ 476.090137] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.095267] ? find_held_lock+0x2d/0x110 [ 476.099350] ? sctp_bind_addr_state+0x1db/0x380 [ 476.104049] __should_failslab+0x153/0x1b6 [ 476.108299] should_failslab+0x5/0xf [ 476.112016] kmem_cache_alloc_trace+0x46/0x4b0 [ 476.116623] sctp_add_bind_addr+0x77/0x370 [ 476.120860] sctp_copy_local_addr_list+0x35b/0x520 [ 476.125786] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 476.130539] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 476.135737] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 476.140923] sctp_bind_addr_copy+0xde/0x470 [ 476.145245] __sctp_connect+0x713/0xd40 [ 476.149219] ? sctp_wfree+0x960/0x960 [ 476.153028] ? lock_sock_nested+0xa6/0x110 [ 476.157266] ? mark_held_locks+0xa6/0xf0 [ 476.161328] ? __local_bh_enable_ip+0x159/0x2a0 [ 476.166990] ? sctp_asconf_mgmt+0x380/0x380 [ 476.171321] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 476.176520] ? sctp_asconf_mgmt+0x380/0x380 [ 476.180843] sctp_inet_connect+0x14b/0x1b0 [ 476.185434] __sys_connect+0x265/0x2c0 [ 476.189341] ? __ia32_sys_accept+0xb0/0xb0 [ 476.193576] ? __mutex_add_waiter+0x160/0x160 [ 476.198074] ? vfs_write+0x393/0x540 [ 476.201788] ? fput+0x2b/0x190 [ 476.204974] ? ksys_write+0x1c8/0x2a0 [ 476.208771] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 476.214151] ? trace_hardirqs_off_caller+0x6e/0x210 [ 476.219169] __x64_sys_connect+0x6f/0xb0 [ 476.223242] do_syscall_64+0xf9/0x670 [ 476.227047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.232274] RIP: 0033:0x45de59 [ 476.235604] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.255466] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:12 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6b6b6b00) [ 476.263173] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 476.270434] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 476.277695] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 476.284957] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 476.292234] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 476.301474] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:12 executing program 1 (fault-call:4 fault-nth:16): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 476.391602] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 476.440621] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x66, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x23, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:13 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x80040000) [ 476.585808] FAULT_INJECTION: forcing a failure. [ 476.585808] name failslab, interval 1, probability 0, space 0, times 0 [ 476.642462] CPU: 1 PID: 22263 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 476.650398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.659783] Call Trace: [ 476.662406] dump_stack+0x22c/0x33e [ 476.666188] should_fail.cold+0xa/0x2f [ 476.670123] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.675767] ? find_held_lock+0x2d/0x110 [ 476.680019] ? sctp_bind_addr_state+0x1db/0x380 [ 476.684898] __should_failslab+0x153/0x1b6 [ 476.689320] should_failslab+0x5/0xf [ 476.693060] kmem_cache_alloc_trace+0x46/0x4b0 [ 476.697685] sctp_add_bind_addr+0x77/0x370 [ 476.701949] sctp_copy_local_addr_list+0x35b/0x520 [ 476.706907] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 476.722505] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 476.727738] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 476.732998] sctp_bind_addr_copy+0xde/0x470 [ 476.737360] __sctp_connect+0x713/0xd40 [ 476.741382] ? sctp_wfree+0x960/0x960 [ 476.745209] ? lock_sock_nested+0xa6/0x110 [ 476.749481] ? mark_held_locks+0xa6/0xf0 [ 476.753831] ? __local_bh_enable_ip+0x159/0x2a0 [ 476.759487] ? sctp_asconf_mgmt+0x380/0x380 [ 476.763967] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 476.769377] ? sctp_asconf_mgmt+0x380/0x380 [ 476.774507] sctp_inet_connect+0x14b/0x1b0 [ 476.778866] __sys_connect+0x265/0x2c0 [ 476.782773] ? __ia32_sys_accept+0xb0/0xb0 [ 476.787032] ? __mutex_add_waiter+0x160/0x160 [ 476.791727] ? vfs_write+0x393/0x540 [ 476.795470] ? fput+0x2b/0x190 [ 476.798777] ? ksys_write+0x1c8/0x2a0 [ 476.802700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 476.808301] ? trace_hardirqs_off_caller+0x6e/0x210 [ 476.813348] __x64_sys_connect+0x6f/0xb0 [ 476.817525] do_syscall_64+0xf9/0x670 [ 476.821354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.826654] RIP: 0033:0x45de59 [ 476.829874] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.849610] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 476.857435] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 476.865075] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 476.872992] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 476.881085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 476.888637] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x24, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 476.959478] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:13 executing program 1 (fault-call:4 fault-nth:17): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 477.085178] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x68, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 477.148030] FAULT_INJECTION: forcing a failure. [ 477.148030] name failslab, interval 1, probability 0, space 0, times 0 [ 477.183618] CPU: 0 PID: 22310 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 22:00:13 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa1ffffff) [ 477.191700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.201074] Call Trace: [ 477.203687] dump_stack+0x22c/0x33e [ 477.207334] should_fail.cold+0xa/0x2f [ 477.211235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.216344] ? find_held_lock+0x2d/0x110 [ 477.220403] ? sctp_bind_addr_state+0x1db/0x380 [ 477.225063] __should_failslab+0x153/0x1b6 [ 477.229302] should_failslab+0x5/0xf [ 477.233005] kmem_cache_alloc_trace+0x46/0x4b0 [ 477.237575] sctp_add_bind_addr+0x77/0x370 [ 477.241795] sctp_copy_local_addr_list+0x35b/0x520 [ 477.246709] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 477.251476] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 477.256687] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 477.261867] sctp_bind_addr_copy+0xde/0x470 [ 477.266191] __sctp_connect+0x713/0xd40 [ 477.270164] ? sctp_wfree+0x960/0x960 [ 477.273980] ? lock_sock_nested+0xa6/0x110 [ 477.278207] ? mark_held_locks+0xa6/0xf0 [ 477.282431] ? __local_bh_enable_ip+0x159/0x2a0 [ 477.287106] ? sctp_asconf_mgmt+0x380/0x380 [ 477.291555] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 477.296768] ? sctp_asconf_mgmt+0x380/0x380 [ 477.301780] sctp_inet_connect+0x14b/0x1b0 [ 477.306271] __sys_connect+0x265/0x2c0 [ 477.310160] ? __ia32_sys_accept+0xb0/0xb0 [ 477.314387] ? __mutex_add_waiter+0x160/0x160 [ 477.318962] ? vfs_write+0x393/0x540 [ 477.322801] ? fput+0x2b/0x190 [ 477.326002] ? ksys_write+0x1c8/0x2a0 [ 477.329988] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 477.335360] ? trace_hardirqs_off_caller+0x6e/0x210 [ 477.340700] __x64_sys_connect+0x6f/0xb0 [ 477.344780] do_syscall_64+0xf9/0x670 [ 477.348636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.353817] RIP: 0033:0x45de59 [ 477.356998] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.375932] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 477.383813] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 477.391085] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 477.398447] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 477.405711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 477.412990] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:14 executing program 1 (fault-call:4 fault-nth:18): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 477.529831] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 477.609668] FAULT_INJECTION: forcing a failure. [ 477.609668] name failslab, interval 1, probability 0, space 0, times 0 22:00:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 477.688602] CPU: 1 PID: 22330 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 477.696784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.706156] Call Trace: [ 477.708776] dump_stack+0x22c/0x33e [ 477.712437] should_fail.cold+0xa/0x2f [ 477.716367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.721500] ? find_held_lock+0x2d/0x110 [ 477.725600] ? sctp_bind_addr_state+0x1db/0x380 [ 477.730426] __should_failslab+0x153/0x1b6 [ 477.734706] should_failslab+0x5/0xf 22:00:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x70, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 477.738623] kmem_cache_alloc_trace+0x46/0x4b0 [ 477.743231] sctp_add_bind_addr+0x77/0x370 [ 477.747505] sctp_copy_local_addr_list+0x35b/0x520 [ 477.754559] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 477.759363] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 477.764593] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 477.769815] sctp_bind_addr_copy+0xde/0x470 [ 477.774170] __sctp_connect+0x713/0xd40 [ 477.778207] ? sctp_wfree+0x960/0x960 [ 477.783355] ? lock_sock_nested+0xa6/0x110 [ 477.787798] ? mark_held_locks+0xa6/0xf0 [ 477.791877] ? __local_bh_enable_ip+0x159/0x2a0 [ 477.796585] ? sctp_asconf_mgmt+0x380/0x380 [ 477.800930] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 477.806148] ? sctp_asconf_mgmt+0x380/0x380 [ 477.810491] sctp_inet_connect+0x14b/0x1b0 [ 477.814750] __sys_connect+0x265/0x2c0 [ 477.818668] ? __ia32_sys_accept+0xb0/0xb0 [ 477.822954] ? __mutex_add_waiter+0x160/0x160 [ 477.827479] ? vfs_write+0x393/0x540 [ 477.831391] ? fput+0x2b/0x190 [ 477.834606] ? ksys_write+0x1c8/0x2a0 22:00:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 477.838866] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 477.844253] ? trace_hardirqs_off_caller+0x6e/0x210 [ 477.849301] __x64_sys_connect+0x6f/0xb0 [ 477.853389] do_syscall_64+0xf9/0x670 [ 477.857218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.863034] RIP: 0033:0x45de59 [ 477.867203] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 22:00:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xf6ffffff) [ 477.886126] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 477.893869] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 477.901198] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 477.908502] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 477.915799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 477.923097] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:14 executing program 1 (fault-call:4 fault-nth:19): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 477.954090] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 477.972394] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 478.149946] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 478.176455] FAULT_INJECTION: forcing a failure. [ 478.176455] name failslab, interval 1, probability 0, space 0, times 0 [ 478.205563] CPU: 0 PID: 22375 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 478.213610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.223510] Call Trace: [ 478.226137] dump_stack+0x22c/0x33e [ 478.229796] should_fail.cold+0xa/0x2f [ 478.233720] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.238854] ? find_held_lock+0x2d/0x110 [ 478.242949] ? sctp_bind_addr_state+0x1db/0x380 [ 478.247647] __should_failslab+0x153/0x1b6 [ 478.251911] should_failslab+0x5/0xf [ 478.255654] kmem_cache_alloc_trace+0x46/0x4b0 [ 478.260268] sctp_add_bind_addr+0x77/0x370 [ 478.264696] sctp_copy_local_addr_list+0x35b/0x520 [ 478.269651] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 478.274438] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 478.279650] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 478.284853] sctp_bind_addr_copy+0xde/0x470 [ 478.289182] __sctp_connect+0x713/0xd40 [ 478.293155] ? sctp_wfree+0x960/0x960 [ 478.296958] ? lock_sock_nested+0xa6/0x110 [ 478.301197] ? mark_held_locks+0xa6/0xf0 [ 478.305267] ? __local_bh_enable_ip+0x159/0x2a0 [ 478.309932] ? sctp_asconf_mgmt+0x380/0x380 [ 478.314272] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 478.319460] ? sctp_asconf_mgmt+0x380/0x380 [ 478.323775] sctp_inet_connect+0x14b/0x1b0 [ 478.328013] __sys_connect+0x265/0x2c0 [ 478.331898] ? __ia32_sys_accept+0xb0/0xb0 [ 478.336134] ? __mutex_add_waiter+0x160/0x160 [ 478.340626] ? vfs_write+0x393/0x540 [ 478.344353] ? fput+0x2b/0x190 [ 478.347541] ? ksys_write+0x1c8/0x2a0 [ 478.351336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 478.356700] ? trace_hardirqs_off_caller+0x6e/0x210 [ 478.361716] __x64_sys_connect+0x6f/0xb0 [ 478.365777] do_syscall_64+0xf9/0x670 [ 478.369576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.374763] RIP: 0033:0x45de59 [ 478.377955] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.396849] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6a, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 22:00:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x74, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfeffffff) [ 478.404553] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 478.412609] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 478.419869] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 478.427329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 478.435548] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:15 executing program 1 (fault-call:4 fault-nth:20): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 478.604889] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 478.615763] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 478.652893] FAULT_INJECTION: forcing a failure. [ 478.652893] name failslab, interval 1, probability 0, space 0, times 0 [ 478.715425] CPU: 1 PID: 22402 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 478.723369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.732745] Call Trace: [ 478.735393] dump_stack+0x22c/0x33e [ 478.739055] should_fail.cold+0xa/0x2f [ 478.742970] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.748358] ? find_held_lock+0x2d/0x110 [ 478.753155] ? sctp_bind_addr_state+0x1db/0x380 [ 478.757853] __should_failslab+0x153/0x1b6 [ 478.762112] should_failslab+0x5/0xf [ 478.765889] kmem_cache_alloc_trace+0x46/0x4b0 [ 478.774421] sctp_add_bind_addr+0x77/0x370 [ 478.778883] sctp_copy_local_addr_list+0x35b/0x520 [ 478.783848] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 478.788754] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 478.794072] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 478.799291] sctp_bind_addr_copy+0xde/0x470 [ 478.803736] __sctp_connect+0x713/0xd40 [ 478.807832] ? sctp_wfree+0x960/0x960 [ 478.811716] ? lock_sock_nested+0xa6/0x110 [ 478.815987] ? mark_held_locks+0xa6/0xf0 [ 478.820162] ? __local_bh_enable_ip+0x159/0x2a0 [ 478.825168] ? sctp_asconf_mgmt+0x380/0x380 [ 478.830262] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 478.835924] ? sctp_asconf_mgmt+0x380/0x380 [ 478.845250] sctp_inet_connect+0x14b/0x1b0 [ 478.849622] __sys_connect+0x265/0x2c0 [ 478.850956] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 478.853628] ? __ia32_sys_accept+0xb0/0xb0 [ 478.853649] ? __mutex_add_waiter+0x160/0x160 [ 478.853668] ? vfs_write+0x393/0x540 [ 478.853686] ? fput+0x2b/0x190 [ 478.880152] ? ksys_write+0x1c8/0x2a0 [ 478.884000] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 478.889427] ? trace_hardirqs_off_caller+0x6e/0x210 [ 478.894653] __x64_sys_connect+0x6f/0xb0 [ 478.899093] do_syscall_64+0xf9/0x670 [ 478.903108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.908936] RIP: 0033:0x45de59 22:00:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7a, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 478.912158] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.931711] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 478.940430] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 478.948060] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 478.956302] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:15 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffffa1) [ 478.964581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 478.975064] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 479.042281] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6b, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:15 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x3000000) 22:00:15 executing program 1 (fault-call:4 fault-nth:21): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:15 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfffffff6) 22:00:15 executing program 3 (fault-call:11 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 479.243743] FAULT_INJECTION: forcing a failure. [ 479.243743] name failslab, interval 1, probability 0, space 0, times 0 22:00:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 479.297728] CPU: 1 PID: 22444 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 479.305672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.315046] Call Trace: [ 479.315579] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 479.317659] dump_stack+0x22c/0x33e [ 479.317683] should_fail.cold+0xa/0x2f [ 479.317702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.342170] ? find_held_lock+0x2d/0x110 [ 479.346278] ? sctp_bind_addr_state+0x1db/0x380 [ 479.351077] __should_failslab+0x153/0x1b6 [ 479.355740] should_failslab+0x5/0xf [ 479.359728] kmem_cache_alloc_trace+0x46/0x4b0 [ 479.364361] sctp_add_bind_addr+0x77/0x370 [ 479.368638] sctp_copy_local_addr_list+0x35b/0x520 [ 479.373646] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 479.379492] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 479.384985] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 479.390226] sctp_bind_addr_copy+0xde/0x470 22:00:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7d, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 479.394588] __sctp_connect+0x713/0xd40 [ 479.399057] ? sctp_wfree+0x960/0x960 [ 479.402984] ? lock_sock_nested+0xa6/0x110 [ 479.407953] ? mark_held_locks+0xa6/0xf0 [ 479.412027] ? __local_bh_enable_ip+0x159/0x2a0 [ 479.416717] ? sctp_asconf_mgmt+0x380/0x380 [ 479.421765] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 479.427096] ? sctp_asconf_mgmt+0x380/0x380 [ 479.431440] sctp_inet_connect+0x14b/0x1b0 [ 479.436166] __sys_connect+0x265/0x2c0 [ 479.441403] ? __ia32_sys_accept+0xb0/0xb0 [ 479.445659] ? __mutex_add_waiter+0x160/0x160 [ 479.450157] ? vfs_write+0x393/0x540 [ 479.454403] ? fput+0x2b/0x190 [ 479.457588] ? ksys_write+0x1c8/0x2a0 [ 479.461568] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 479.468695] ? trace_hardirqs_off_caller+0x6e/0x210 [ 479.474450] __x64_sys_connect+0x6f/0xb0 [ 479.479981] do_syscall_64+0xf9/0x670 [ 479.483796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.489232] RIP: 0033:0x45de59 [ 479.492485] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.513213] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 479.520923] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 479.528210] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 479.536409] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfffffffe) [ 479.544021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 479.552095] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 479.607245] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 479.620258] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:16 executing program 1 (fault-call:4 fault-nth:22): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6c, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1000000000000) 22:00:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x17, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6b6b6b00000000) [ 479.850053] FAULT_INJECTION: forcing a failure. [ 479.850053] name failslab, interval 1, probability 0, space 0, times 0 [ 479.910983] CPU: 0 PID: 22484 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 479.919449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.931636] Call Trace: [ 479.934305] dump_stack+0x22c/0x33e [ 479.937979] should_fail.cold+0xa/0x2f [ 479.941912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.947067] ? find_held_lock+0x2d/0x110 [ 479.951344] ? sctp_bind_addr_state+0x1db/0x380 [ 479.957335] __should_failslab+0x153/0x1b6 [ 479.961583] should_failslab+0x5/0xf [ 479.965309] kmem_cache_alloc_trace+0x46/0x4b0 [ 479.969911] sctp_add_bind_addr+0x77/0x370 [ 479.975561] sctp_copy_local_addr_list+0x35b/0x520 [ 479.981880] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 479.986668] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 479.994253] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 479.999477] sctp_bind_addr_copy+0xde/0x470 [ 480.003918] __sctp_connect+0x713/0xd40 [ 480.008982] ? sctp_wfree+0x960/0x960 [ 480.012892] ? lock_sock_nested+0xa6/0x110 [ 480.017869] ? mark_held_locks+0xa6/0xf0 [ 480.021952] ? __local_bh_enable_ip+0x159/0x2a0 [ 480.026644] ? sctp_asconf_mgmt+0x380/0x380 [ 480.030993] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 480.036255] ? sctp_asconf_mgmt+0x380/0x380 [ 480.040596] sctp_inet_connect+0x14b/0x1b0 [ 480.042591] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 480.044842] __sys_connect+0x265/0x2c0 [ 480.044855] ? __ia32_sys_accept+0xb0/0xb0 [ 480.044870] ? __mutex_add_waiter+0x160/0x160 [ 480.044887] ? vfs_write+0x393/0x540 [ 480.044901] ? fput+0x2b/0x190 [ 480.044912] ? ksys_write+0x1c8/0x2a0 [ 480.044928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 480.044947] ? trace_hardirqs_off_caller+0x6e/0x210 [ 480.086314] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 480.088647] __x64_sys_connect+0x6f/0xb0 [ 480.088675] do_syscall_64+0xf9/0x670 [ 480.107322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.112606] RIP: 0033:0x45de59 [ 480.115812] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.134925] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 480.142644] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 480.149929] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 22:00:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x20002a1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 480.158413] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 480.165690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 480.173080] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:16 executing program 1 (fault-call:4 fault-nth:23): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x100000000000000) 22:00:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 480.268159] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 480.308676] FAULT_INJECTION: forcing a failure. [ 480.308676] name failslab, interval 1, probability 0, space 0, times 0 [ 480.349577] CPU: 0 PID: 22515 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 480.357521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.367242] Call Trace: [ 480.369840] dump_stack+0x22c/0x33e [ 480.373466] should_fail.cold+0xa/0x2f [ 480.377363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.383887] ? find_held_lock+0x2d/0x110 [ 480.387941] ? sctp_bind_addr_state+0x1db/0x380 [ 480.392699] __should_failslab+0x153/0x1b6 [ 480.396925] should_failslab+0x5/0xf [ 480.400625] kmem_cache_alloc_trace+0x46/0x4b0 [ 480.405200] sctp_add_bind_addr+0x77/0x370 [ 480.409436] sctp_copy_local_addr_list+0x35b/0x520 [ 480.414357] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 480.419104] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 480.425023] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 480.430204] sctp_bind_addr_copy+0xde/0x470 [ 480.434515] __sctp_connect+0x713/0xd40 [ 480.438482] ? sctp_wfree+0x960/0x960 [ 480.442367] ? lock_sock_nested+0xa6/0x110 [ 480.446605] ? mark_held_locks+0xa6/0xf0 [ 480.450677] ? __local_bh_enable_ip+0x159/0x2a0 [ 480.455340] ? sctp_asconf_mgmt+0x380/0x380 [ 480.459652] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 480.464834] ? sctp_asconf_mgmt+0x380/0x380 [ 480.469142] sctp_inet_connect+0x14b/0x1b0 [ 480.473367] __sys_connect+0x265/0x2c0 [ 480.477242] ? __ia32_sys_accept+0xb0/0xb0 [ 480.481482] ? __mutex_add_waiter+0x160/0x160 [ 480.486081] ? vfs_write+0x393/0x540 [ 480.490913] ? fput+0x2b/0x190 [ 480.494128] ? ksys_write+0x1c8/0x2a0 [ 480.497926] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 480.503280] ? trace_hardirqs_off_caller+0x6e/0x210 [ 480.509505] __x64_sys_connect+0x6f/0xb0 [ 480.513580] do_syscall_64+0xf9/0x670 [ 480.517386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.522566] RIP: 0033:0x45de59 [ 480.525749] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.545194] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 480.552903] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 480.560162] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 480.567420] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 480.574677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 480.581941] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x2, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:17 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x200000000000000) 22:00:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x74, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:17 executing program 1 (fault-call:4 fault-nth:24): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x3, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 480.735208] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x1000000) 22:00:17 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x300000000000000) 22:00:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 480.863172] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x4, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 480.960782] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 480.975739] FAULT_INJECTION: forcing a failure. [ 480.975739] name failslab, interval 1, probability 0, space 0, times 0 [ 481.007311] CPU: 0 PID: 22556 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 481.015250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.024613] Call Trace: [ 481.027217] dump_stack+0x22c/0x33e [ 481.030943] should_fail.cold+0xa/0x2f [ 481.035006] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.040096] ? find_held_lock+0x2d/0x110 [ 481.044323] ? sctp_bind_addr_state+0x1db/0x380 [ 481.049177] __should_failslab+0x153/0x1b6 [ 481.054531] should_failslab+0x5/0xf [ 481.058265] kmem_cache_alloc_trace+0x46/0x4b0 [ 481.063077] sctp_add_bind_addr+0x77/0x370 [ 481.067499] sctp_copy_local_addr_list+0x35b/0x520 [ 481.072528] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 481.077535] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 481.082729] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 481.088081] sctp_bind_addr_copy+0xde/0x470 [ 481.092583] __sctp_connect+0x713/0xd40 [ 481.096550] ? sctp_wfree+0x960/0x960 [ 481.101212] ? lock_sock_nested+0xa6/0x110 [ 481.105455] ? mark_held_locks+0xa6/0xf0 [ 481.109753] ? __local_bh_enable_ip+0x159/0x2a0 [ 481.115394] ? sctp_asconf_mgmt+0x380/0x380 [ 481.119744] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 481.125767] ? sctp_asconf_mgmt+0x380/0x380 [ 481.130087] sctp_inet_connect+0x14b/0x1b0 [ 481.134328] __sys_connect+0x265/0x2c0 [ 481.138210] ? __ia32_sys_accept+0xb0/0xb0 [ 481.142580] ? __mutex_add_waiter+0x160/0x160 [ 481.147095] ? vfs_write+0x393/0x540 [ 481.150827] ? fput+0x2b/0x190 [ 481.154041] ? ksys_write+0x1c8/0x2a0 [ 481.158038] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 481.163401] ? trace_hardirqs_off_caller+0x6e/0x210 [ 481.169024] __x64_sys_connect+0x6f/0xb0 [ 481.173228] do_syscall_64+0xf9/0x670 [ 481.177059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.182259] RIP: 0033:0x45de59 [ 481.185548] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x100000000000000) [ 481.205226] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 481.212953] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 481.220734] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 481.228033] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 481.235921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 481.243198] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:17 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x400000000000000) 22:00:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x7a, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x5, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 481.395391] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000480)={{0x0, 0xaaa9, 0xfffffffffffffff9, 0xffff, 0x2, 0x400000000000007, 0x2, 0x0, 0x1, 0x0, 0x80000001, 0x4, 0xffffffffffffff80, 0x7, 0x29be}}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000001480)={r2, 0x7}) r3 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) prctl$PR_SET_PTRACER(0x59616d61, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000001c0)=@v1={0x0, @aes256, 0x0, "666894f3b73e2328"}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000043ca8900f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a000000724478d2659fe47236eb55809df3678876839858bb97d0cae482be92eb"]) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x2000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 22:00:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:18 executing program 1 (fault-call:4 fault-nth:25): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x6, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 481.580788] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 481.658173] FAULT_INJECTION: forcing a failure. [ 481.658173] name failslab, interval 1, probability 0, space 0, times 0 [ 481.677890] CPU: 1 PID: 22610 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 481.686260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.695717] Call Trace: [ 481.698688] dump_stack+0x22c/0x33e [ 481.702352] should_fail.cold+0xa/0x2f [ 481.706282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.711505] ? find_held_lock+0x2d/0x110 [ 481.716301] ? sctp_bind_addr_state+0x1db/0x380 [ 481.720995] __should_failslab+0x153/0x1b6 [ 481.725240] should_failslab+0x5/0xf [ 481.728952] kmem_cache_alloc_trace+0x46/0x4b0 [ 481.733635] sctp_add_bind_addr+0x77/0x370 [ 481.737890] sctp_copy_local_addr_list+0x35b/0x520 [ 481.742826] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 481.747619] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 481.752806] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 481.758002] sctp_bind_addr_copy+0xde/0x470 [ 481.762323] __sctp_connect+0x713/0xd40 [ 481.766292] ? sctp_wfree+0x960/0x960 [ 481.770269] ? lock_sock_nested+0xa6/0x110 [ 481.774514] ? mark_held_locks+0xa6/0xf0 [ 481.778664] ? __local_bh_enable_ip+0x159/0x2a0 [ 481.785955] ? sctp_asconf_mgmt+0x380/0x380 [ 481.790289] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 481.795566] ? sctp_asconf_mgmt+0x380/0x380 [ 481.799877] sctp_inet_connect+0x14b/0x1b0 [ 481.804669] __sys_connect+0x265/0x2c0 [ 481.808992] ? __ia32_sys_accept+0xb0/0xb0 [ 481.813243] ? __mutex_add_waiter+0x160/0x160 [ 481.817837] ? vfs_write+0x393/0x540 [ 481.821538] ? fput+0x2b/0x190 [ 481.824724] ? ksys_write+0x1c8/0x2a0 [ 481.828530] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 481.834097] ? trace_hardirqs_off_caller+0x6e/0x210 [ 481.839470] __x64_sys_connect+0x6f/0xb0 [ 481.843537] do_syscall_64+0xf9/0x670 [ 481.847337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.852538] RIP: 0033:0x45de59 [ 481.855726] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.874710] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 481.882432] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 481.889708] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 481.897427] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:18 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x500000000000000) [ 481.904802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 481.912238] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 481.920137] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x92, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x7, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:18 executing program 1 (fault-call:4 fault-nth:26): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 482.011886] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:18 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x600000000000000) 22:00:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x8, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 482.178802] FAULT_INJECTION: forcing a failure. [ 482.178802] name failslab, interval 1, probability 0, space 0, times 0 [ 482.238540] CPU: 1 PID: 22637 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 482.246487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.255880] Call Trace: [ 482.258497] dump_stack+0x22c/0x33e [ 482.262155] should_fail.cold+0xa/0x2f [ 482.266160] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.271278] ? find_held_lock+0x2d/0x110 [ 482.275355] ? sctp_bind_addr_state+0x1db/0x380 [ 482.280081] __should_failslab+0x153/0x1b6 [ 482.284337] should_failslab+0x5/0xf [ 482.288069] kmem_cache_alloc_trace+0x46/0x4b0 [ 482.292675] sctp_add_bind_addr+0x77/0x370 [ 482.296929] sctp_copy_local_addr_list+0x35b/0x520 [ 482.301890] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 482.306685] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 482.311910] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 482.317134] sctp_bind_addr_copy+0xde/0x470 [ 482.322115] __sctp_connect+0x713/0xd40 [ 482.326128] ? sctp_wfree+0x960/0x960 [ 482.329949] ? lock_sock_nested+0xa6/0x110 [ 482.334210] ? mark_held_locks+0xa6/0xf0 [ 482.338289] ? __local_bh_enable_ip+0x159/0x2a0 [ 482.342999] ? sctp_asconf_mgmt+0x380/0x380 [ 482.347344] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 482.352561] ? sctp_asconf_mgmt+0x380/0x380 [ 482.356932] sctp_inet_connect+0x14b/0x1b0 [ 482.361192] __sys_connect+0x265/0x2c0 [ 482.365108] ? __ia32_sys_accept+0xb0/0xb0 [ 482.369362] ? __mutex_add_waiter+0x160/0x160 [ 482.373883] ? vfs_write+0x393/0x540 [ 482.377617] ? fput+0x2b/0x190 [ 482.380826] ? ksys_write+0x1c8/0x2a0 [ 482.384648] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 482.390030] ? trace_hardirqs_off_caller+0x6e/0x210 [ 482.395071] __x64_sys_connect+0x6f/0xb0 [ 482.399161] do_syscall_64+0xf9/0x670 [ 482.403012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.408216] RIP: 0033:0x45de59 [ 482.411424] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.430347] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 482.438122] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 482.445411] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 482.452703] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 482.459995] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 482.467376] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x9, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 482.516841] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 482.660949] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 482.687950] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xb, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:19 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x700000000000000) 22:00:19 executing program 1 (fault-call:4 fault-nth:27): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0xfffffffffffffffd], 0x3000}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xcb, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:19 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe00000000000000) [ 482.863786] FAULT_INJECTION: forcing a failure. [ 482.863786] name failslab, interval 1, probability 0, space 0, times 0 [ 482.915809] CPU: 0 PID: 22688 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 482.924264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.933639] Call Trace: [ 482.936256] dump_stack+0x22c/0x33e [ 482.939906] should_fail.cold+0xa/0x2f [ 482.943905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.949023] ? find_held_lock+0x2d/0x110 [ 482.953105] ? sctp_bind_addr_state+0x1db/0x380 [ 482.957802] __should_failslab+0x153/0x1b6 [ 482.962056] should_failslab+0x5/0xf [ 482.965788] kmem_cache_alloc_trace+0x46/0x4b0 [ 482.970391] sctp_add_bind_addr+0x77/0x370 [ 482.974651] sctp_copy_local_addr_list+0x35b/0x520 [ 482.979598] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 482.984377] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 482.989593] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 482.994808] sctp_bind_addr_copy+0xde/0x470 [ 482.999156] __sctp_connect+0x713/0xd40 [ 483.003154] ? sctp_wfree+0x960/0x960 [ 483.006979] ? lock_sock_nested+0xa6/0x110 [ 483.011238] ? mark_held_locks+0xa6/0xf0 [ 483.015321] ? __local_bh_enable_ip+0x159/0x2a0 [ 483.019996] ? sctp_asconf_mgmt+0x380/0x380 [ 483.024346] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 483.029541] ? sctp_asconf_mgmt+0x380/0x380 [ 483.033857] sctp_inet_connect+0x14b/0x1b0 [ 483.038108] __sys_connect+0x265/0x2c0 [ 483.041999] ? __ia32_sys_accept+0xb0/0xb0 [ 483.046227] ? __mutex_add_waiter+0x160/0x160 [ 483.050719] ? vfs_write+0x393/0x540 [ 483.054430] ? fput+0x2b/0x190 [ 483.057619] ? ksys_write+0x1c8/0x2a0 [ 483.061432] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 483.066802] ? trace_hardirqs_off_caller+0x6e/0x210 [ 483.071839] __x64_sys_connect+0x6f/0xb0 [ 483.075907] do_syscall_64+0xf9/0x670 [ 483.079709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.084893] RIP: 0033:0x45de59 [ 483.088102] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.107354] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 483.115100] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 483.123084] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 483.130362] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 483.137723] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 483.144995] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x10, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 483.162355] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0x14, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 483.189790] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:19 executing program 1 (fault-call:4 fault-nth:28): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 483.313870] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:19 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x8004000000000000) 22:00:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x44088, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x8, 0x0, 0xe0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvme-fabrics\x00', 0x202000, 0x0) ioctl$SNDCTL_TMR_CONTINUE(r3, 0x5404) 22:00:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xd8, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 483.451789] FAULT_INJECTION: forcing a failure. [ 483.451789] name failslab, interval 1, probability 0, space 0, times 0 [ 483.507967] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 483.513823] CPU: 0 PID: 22727 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 483.525566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.535218] Call Trace: [ 483.537841] dump_stack+0x22c/0x33e [ 483.541470] should_fail.cold+0xa/0x2f [ 483.545356] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.550632] ? find_held_lock+0x2d/0x110 [ 483.554700] ? sctp_bind_addr_state+0x1db/0x380 [ 483.559394] __should_failslab+0x153/0x1b6 [ 483.563621] should_failslab+0x5/0xf [ 483.567343] kmem_cache_alloc_trace+0x46/0x4b0 [ 483.572214] sctp_add_bind_addr+0x77/0x370 [ 483.576554] sctp_copy_local_addr_list+0x35b/0x520 [ 483.581783] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 483.586658] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 483.592148] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 483.597345] sctp_bind_addr_copy+0xde/0x470 [ 483.601755] __sctp_connect+0x713/0xd40 [ 483.606137] ? sctp_wfree+0x960/0x960 [ 483.609947] ? lock_sock_nested+0xa6/0x110 [ 483.614187] ? mark_held_locks+0xa6/0xf0 [ 483.618240] ? __local_bh_enable_ip+0x159/0x2a0 [ 483.622924] ? sctp_asconf_mgmt+0x380/0x380 [ 483.627238] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 483.633158] ? sctp_asconf_mgmt+0x380/0x380 [ 483.637776] sctp_inet_connect+0x14b/0x1b0 [ 483.642017] __sys_connect+0x265/0x2c0 [ 483.645983] ? __ia32_sys_accept+0xb0/0xb0 [ 483.651252] ? __mutex_add_waiter+0x160/0x160 [ 483.656624] ? vfs_write+0x393/0x540 [ 483.660505] ? fput+0x2b/0x190 [ 483.663698] ? ksys_write+0x1c8/0x2a0 [ 483.667674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 483.674024] ? trace_hardirqs_off_caller+0x6e/0x210 [ 483.679091] __x64_sys_connect+0x6f/0xb0 [ 483.683183] do_syscall_64+0xf9/0x670 [ 483.687249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.693126] RIP: 0033:0x45de59 [ 483.696934] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.715924] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 483.723632] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 483.732313] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 483.739594] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 483.747098] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c [ 483.755312] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:20 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa1ffffff00000000) 22:00:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:20 executing program 1 (fault-call:4 fault-nth:29): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x800, 0x0) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x438}}, 0x400c080) read$rfkill(r2, &(0x7f0000000240), 0x8) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 483.988836] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 484.003748] FAULT_INJECTION: forcing a failure. [ 484.003748] name failslab, interval 1, probability 0, space 0, times 0 [ 484.034163] CPU: 0 PID: 22756 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 484.042208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.052529] Call Trace: [ 484.055127] dump_stack+0x22c/0x33e [ 484.062602] should_fail.cold+0xa/0x2f [ 484.066510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.071621] ? find_held_lock+0x2d/0x110 [ 484.075699] ? sctp_bind_addr_state+0x1db/0x380 [ 484.080393] __should_failslab+0x153/0x1b6 [ 484.085273] should_failslab+0x5/0xf [ 484.089076] kmem_cache_alloc_trace+0x46/0x4b0 [ 484.093671] sctp_add_bind_addr+0x77/0x370 [ 484.097924] sctp_copy_local_addr_list+0x35b/0x520 [ 484.102959] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 484.107797] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 484.112993] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 484.118196] sctp_bind_addr_copy+0xde/0x470 [ 484.123440] __sctp_connect+0x713/0xd40 [ 484.127544] ? sctp_wfree+0x960/0x960 [ 484.132272] ? lock_sock_nested+0xa6/0x110 [ 484.136536] ? mark_held_locks+0xa6/0xf0 [ 484.140606] ? __local_bh_enable_ip+0x159/0x2a0 [ 484.145277] ? sctp_asconf_mgmt+0x380/0x380 [ 484.149868] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 484.155318] ? sctp_asconf_mgmt+0x380/0x380 [ 484.159648] sctp_inet_connect+0x14b/0x1b0 [ 484.163883] __sys_connect+0x265/0x2c0 [ 484.167773] ? __ia32_sys_accept+0xb0/0xb0 [ 484.172153] ? __mutex_add_waiter+0x160/0x160 [ 484.176821] ? vfs_write+0x393/0x540 [ 484.180549] ? fput+0x2b/0x190 [ 484.183736] ? ksys_write+0x1c8/0x2a0 [ 484.187768] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 484.193919] ? trace_hardirqs_off_caller+0x6e/0x210 [ 484.199220] __x64_sys_connect+0x6f/0xb0 [ 484.203301] do_syscall_64+0xf9/0x670 [ 484.207125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.212394] RIP: 0033:0x45de59 [ 484.215580] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:20 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xf6ffffff00000000) [ 484.235532] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 484.243996] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 484.252599] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 484.259890] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 484.267193] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 484.274483] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x2, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 484.316333] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:20 executing program 1 (fault-call:4 fault-nth:30): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 484.369052] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xdc, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfeffffff00000000) 22:00:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r1]) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) inotify_init1(0x80800) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000240)=0x9, 0x4) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) exit_group(0x5) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 484.573354] FAULT_INJECTION: forcing a failure. [ 484.573354] name failslab, interval 1, probability 0, space 0, times 0 [ 484.620435] CPU: 1 PID: 22787 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 484.628407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.637832] Call Trace: [ 484.640486] dump_stack+0x22c/0x33e [ 484.644149] should_fail.cold+0xa/0x2f [ 484.648244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.653377] ? find_held_lock+0x2d/0x110 [ 484.657465] ? sctp_bind_addr_state+0x1db/0x380 [ 484.662908] __should_failslab+0x153/0x1b6 [ 484.667161] should_failslab+0x5/0xf [ 484.671841] kmem_cache_alloc_trace+0x46/0x4b0 [ 484.676463] sctp_add_bind_addr+0x77/0x370 [ 484.680789] sctp_copy_local_addr_list+0x35b/0x520 [ 484.685720] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 484.690637] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 484.695874] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 484.701098] sctp_bind_addr_copy+0xde/0x470 [ 484.705460] __sctp_connect+0x713/0xd40 [ 484.709470] ? sctp_wfree+0x960/0x960 [ 484.713271] ? lock_sock_nested+0xa6/0x110 [ 484.717511] ? mark_held_locks+0xa6/0xf0 [ 484.721576] ? __local_bh_enable_ip+0x159/0x2a0 [ 484.726592] ? sctp_asconf_mgmt+0x380/0x380 [ 484.730920] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 484.736263] ? sctp_asconf_mgmt+0x380/0x380 [ 484.740585] sctp_inet_connect+0x14b/0x1b0 [ 484.745775] __sys_connect+0x265/0x2c0 [ 484.751395] ? __ia32_sys_accept+0xb0/0xb0 [ 484.755713] ? __mutex_add_waiter+0x160/0x160 [ 484.760224] ? vfs_write+0x393/0x540 [ 484.763972] ? fput+0x2b/0x190 [ 484.767177] ? ksys_write+0x1c8/0x2a0 [ 484.770976] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 484.776334] ? trace_hardirqs_off_caller+0x6e/0x210 [ 484.781358] __x64_sys_connect+0x6f/0xb0 [ 484.785416] do_syscall_64+0xf9/0x670 [ 484.789245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.794539] RIP: 0033:0x45de59 [ 484.797738] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.816716] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 484.824413] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 484.831675] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 484.838954] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 484.846228] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 484.853493] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 484.890181] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 484.902454] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:21 executing program 1 (fault-call:4 fault-nth:31): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1a, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000080)={0x4, 0x403}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x10002, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000580)=ANY=[@ANYBLOB="03087d3100020000090400000000000000f6ffffffa6067dd7e4e85895464d72735b01000000f2ff00000000000000000000000000002aeb2a0763021e849b7cad3040c33812f9960e832ad83a5e3eba8994d359e7d6db47ba859bc7354836c2f4bb7ba390f24b61a72e1be3470cd849c314c9edbb707da653a48d9695703c5d2393e2b102816b00e7357bfcf8480842a950bcdbbe45611042b8a6d8d7d7f4ca1326bc9d21fae8f0d2f10b062e6ee01db4f1cc74edf2b890b29e369f7111f0e7f40a775495000000002c9c8561cb964e8690ecb6c194c1d708db4d7da8b30f2e2aa4eaaa33babb771e40d72e9b2579bbe11c9ef5248b7b74ed5f0000000000000000"]) sync() ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x0, 0xf1, 0xbc, 0xfffffffffffffffe, 0x0, 0x20000004cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], 0x4000}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r4 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r4, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_STAT(r4, 0xd, &(0x7f00000001c0)=""/45) r5 = openat(r3, &(0x7f0000000240)='./file0\x00', 0x5011c0, 0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r5, 0xc0405519, &(0x7f0000000380)={0x6, 0x0, 0x80, 0x7, '\x00', 0x7}) [ 485.063982] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 485.107851] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x114, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 485.180085] FAULT_INJECTION: forcing a failure. [ 485.180085] name failslab, interval 1, probability 0, space 0, times 0 [ 485.202720] CPU: 0 PID: 22824 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 485.210751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.220112] Call Trace: [ 485.222769] dump_stack+0x22c/0x33e [ 485.226413] should_fail.cold+0xa/0x2f 22:00:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffffff00000000) [ 485.230328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.235456] ? find_held_lock+0x2d/0x110 [ 485.239533] ? sctp_bind_addr_state+0x1db/0x380 [ 485.244223] __should_failslab+0x153/0x1b6 [ 485.248471] should_failslab+0x5/0xf [ 485.252199] kmem_cache_alloc_trace+0x46/0x4b0 [ 485.256815] sctp_add_bind_addr+0x77/0x370 [ 485.261053] sctp_copy_local_addr_list+0x35b/0x520 [ 485.265993] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 485.270771] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 485.275975] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 485.281200] sctp_bind_addr_copy+0xde/0x470 [ 485.285534] __sctp_connect+0x713/0xd40 [ 485.289527] ? sctp_wfree+0x960/0x960 [ 485.293325] ? lock_sock_nested+0xa6/0x110 [ 485.297586] ? mark_held_locks+0xa6/0xf0 [ 485.301658] ? __local_bh_enable_ip+0x159/0x2a0 [ 485.306325] ? sctp_asconf_mgmt+0x380/0x380 [ 485.310644] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 485.315837] ? sctp_asconf_mgmt+0x380/0x380 [ 485.320197] sctp_inet_connect+0x14b/0x1b0 [ 485.324621] __sys_connect+0x265/0x2c0 [ 485.328507] ? __ia32_sys_accept+0xb0/0xb0 [ 485.332742] ? __mutex_add_waiter+0x160/0x160 [ 485.337237] ? vfs_write+0x393/0x540 [ 485.340959] ? fput+0x2b/0x190 [ 485.344147] ? ksys_write+0x1c8/0x2a0 [ 485.347944] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 485.353324] ? trace_hardirqs_off_caller+0x6e/0x210 [ 485.358483] __x64_sys_connect+0x6f/0xb0 [ 485.362655] do_syscall_64+0xf9/0x670 [ 485.366473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.371684] RIP: 0033:0x45de59 [ 485.374871] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.393761] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 485.401460] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 485.408724] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 485.415986] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 485.423243] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 485.430501] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x4, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 485.517458] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:22 executing program 1 (fault-call:4 fault-nth:32): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 485.634979] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 485.647317] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x10, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x40000000003}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 485.686654] FAULT_INJECTION: forcing a failure. [ 485.686654] name failslab, interval 1, probability 0, space 0, times 0 22:00:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x116, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:22 executing program 4: ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000100)) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffff0e, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="687567653d616fc78d2a6100000000494376653d000000000000d4e174cf76a400"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xf7e15224be1ba49d, 0x108) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') [ 485.771333] CPU: 0 PID: 22862 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 485.779275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.788644] Call Trace: [ 485.791250] dump_stack+0x22c/0x33e [ 485.794883] should_fail.cold+0xa/0x2f [ 485.798773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.803871] ? find_held_lock+0x2d/0x110 [ 485.807926] ? sctp_bind_addr_state+0x1db/0x380 [ 485.812590] __should_failslab+0x153/0x1b6 [ 485.816819] should_failslab+0x5/0xf [ 485.820656] kmem_cache_alloc_trace+0x46/0x4b0 [ 485.825279] sctp_add_bind_addr+0x77/0x370 [ 485.829563] sctp_copy_local_addr_list+0x35b/0x520 [ 485.834502] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 485.839275] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 485.844471] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 485.849659] sctp_bind_addr_copy+0xde/0x470 [ 485.854088] __sctp_connect+0x713/0xd40 [ 485.858423] ? sctp_wfree+0x960/0x960 [ 485.862220] ? lock_sock_nested+0xa6/0x110 [ 485.866477] ? mark_held_locks+0xa6/0xf0 [ 485.870570] ? __local_bh_enable_ip+0x159/0x2a0 [ 485.875255] ? sctp_asconf_mgmt+0x380/0x380 [ 485.879570] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 485.884768] ? sctp_asconf_mgmt+0x380/0x380 [ 485.889075] sctp_inet_connect+0x14b/0x1b0 [ 485.893303] __sys_connect+0x265/0x2c0 [ 485.897192] ? __ia32_sys_accept+0xb0/0xb0 [ 485.901417] ? __mutex_add_waiter+0x160/0x160 [ 485.905906] ? vfs_write+0x393/0x540 [ 485.909606] ? fput+0x2b/0x190 [ 485.912802] ? ksys_write+0x1c8/0x2a0 [ 485.916594] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 485.921966] ? trace_hardirqs_off_caller+0x6e/0x210 [ 485.926989] __x64_sys_connect+0x6f/0xb0 [ 485.931045] do_syscall_64+0xf9/0x670 [ 485.934838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.940139] RIP: 0033:0x45de59 [ 485.943341] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.962254] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 485.969953] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 485.977908] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 485.985182] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 485.992458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 [ 485.999733] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:22 executing program 1 (fault-call:4 fault-nth:33): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 486.137196] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 486.157209] tmpfs: Bad value 'aoÇ*a' for mount option 'huge' [ 486.170777] FAULT_INJECTION: forcing a failure. [ 486.170777] name failslab, interval 1, probability 0, space 0, times 0 [ 486.191850] tmpfs: Bad value 'aoÇ*a' for mount option 'huge' [ 486.203438] CPU: 0 PID: 22887 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 486.211378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.220753] Call Trace: [ 486.223368] dump_stack+0x22c/0x33e [ 486.227197] should_fail.cold+0xa/0x2f [ 486.231087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.236198] ? find_held_lock+0x2d/0x110 [ 486.240433] ? sctp_bind_addr_state+0x1db/0x380 [ 486.245373] __should_failslab+0x153/0x1b6 [ 486.249608] should_failslab+0x5/0xf [ 486.253321] kmem_cache_alloc_trace+0x46/0x4b0 [ 486.257937] sctp_add_bind_addr+0x77/0x370 [ 486.262175] sctp_copy_local_addr_list+0x35b/0x520 [ 486.267105] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 486.271863] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 486.277060] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 486.282265] sctp_bind_addr_copy+0xde/0x470 [ 486.286590] __sctp_connect+0x713/0xd40 [ 486.290567] ? sctp_wfree+0x960/0x960 [ 486.294380] ? lock_sock_nested+0xa6/0x110 [ 486.298620] ? mark_held_locks+0xa6/0xf0 [ 486.302688] ? __local_bh_enable_ip+0x159/0x2a0 [ 486.307351] ? sctp_asconf_mgmt+0x380/0x380 [ 486.311674] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 486.316873] ? sctp_asconf_mgmt+0x380/0x380 [ 486.321185] sctp_inet_connect+0x14b/0x1b0 [ 486.325424] __sys_connect+0x265/0x2c0 [ 486.329306] ? __ia32_sys_accept+0xb0/0xb0 [ 486.333554] ? __mutex_add_waiter+0x160/0x160 [ 486.338095] ? vfs_write+0x393/0x540 [ 486.341808] ? fput+0x2b/0x190 [ 486.345005] ? ksys_write+0x1c8/0x2a0 [ 486.348811] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 486.354185] ? trace_hardirqs_off_caller+0x6e/0x210 [ 486.359219] __x64_sys_connect+0x6f/0xb0 [ 486.363283] do_syscall_64+0xf9/0x670 [ 486.367088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.372269] RIP: 0033:0x45de59 [ 486.375451] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.394379] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 486.402100] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 486.409369] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 486.416639] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 486.423895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 486.431168] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xa, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000400)=[{{r5, r6/1000+60000}, 0x14, 0x1}, {{0x0, 0xea60}, 0x17, 0xe70}], 0x30) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000380)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xc, 0x8, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x12d, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="70010c3441c2361699a524a87ea47690", 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockname$netlink(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 22:00:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:23 executing program 1 (fault-call:4 fault-nth:34): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 486.672624] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 486.774596] FAULT_INJECTION: forcing a failure. [ 486.774596] name failslab, interval 1, probability 0, space 0, times 0 [ 486.799419] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 486.808439] CPU: 0 PID: 22926 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 486.818119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.827478] Call Trace: [ 486.830078] dump_stack+0x22c/0x33e [ 486.833707] should_fail.cold+0xa/0x2f [ 486.837733] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.842842] ? find_held_lock+0x2d/0x110 [ 486.846914] ? sctp_bind_addr_state+0x1db/0x380 [ 486.851596] __should_failslab+0x153/0x1b6 [ 486.855858] should_failslab+0x5/0xf [ 486.859598] kmem_cache_alloc_trace+0x46/0x4b0 [ 486.864219] sctp_add_bind_addr+0x77/0x370 [ 486.868483] sctp_copy_local_addr_list+0x35b/0x520 [ 486.873507] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 486.878272] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 486.883483] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 486.888671] sctp_bind_addr_copy+0xde/0x470 [ 486.893183] __sctp_connect+0x713/0xd40 [ 486.897161] ? sctp_wfree+0x960/0x960 [ 486.900985] ? lock_sock_nested+0xa6/0x110 [ 486.905228] ? mark_held_locks+0xa6/0xf0 [ 486.909284] ? __local_bh_enable_ip+0x159/0x2a0 [ 486.913947] ? sctp_asconf_mgmt+0x380/0x380 [ 486.918261] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 486.923456] ? sctp_asconf_mgmt+0x380/0x380 [ 486.927783] sctp_inet_connect+0x14b/0x1b0 [ 486.932039] __sys_connect+0x265/0x2c0 [ 486.935922] ? __ia32_sys_accept+0xb0/0xb0 [ 486.940153] ? __mutex_add_waiter+0x160/0x160 [ 486.944662] ? vfs_write+0x393/0x540 [ 486.948371] ? fput+0x2b/0x190 [ 486.951643] ? ksys_write+0x1c8/0x2a0 [ 486.955446] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 486.960810] ? trace_hardirqs_off_caller+0x6e/0x210 [ 486.965825] __x64_sys_connect+0x6f/0xb0 [ 486.969883] do_syscall_64+0xf9/0x670 [ 486.973681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.978868] RIP: 0033:0x45de59 [ 486.982056] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.001824] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 487.009527] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 487.016795] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 22:00:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="687e733e6bc67567653d612c6d706f6c3d696e7465f26c65617665"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 487.024073] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 487.031335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 487.040508] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000001c0)={r2, 0x6be2, 0x4, 0x6}) ioctl$VFIO_IOMMU_UNMAP_DMA(r3, 0x3b72, &(0x7f0000000480)={0xeb, 0x2, 0x100000000, 0x8, "0c40a9eaf1de98c2fa074fd4974ff8f2a8421d02cb658c67a0d6f89c83887d6f0b0fd73575892d2d1dc37956c46b836fe1f7dbbc821a2c731f116f0b00c7bfa9ce30697d38567e326441b11aa79be5387f5b63de0b46e4bffc2f839b2e14f60b61229c0b6fa28a88e72e56bcbdf915d34b94f3e45eb6f7a7f91283b8fe707e21739ca78c193c4445ddeb77c3dc1846afc409733df3f628ecfea1fc77637fd620050525949bd8ddf8cee3be1e0af386fc8dc8777df0ecfcc23754b0a09c74e681b4f36ab695e2bcf125625650a5afae0197868b"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:23 executing program 1 (fault-call:4 fault-nth:35): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x137, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 487.196607] tmpfs: Bad mount option h~s>kÆuge [ 487.209077] tmpfs: Bad mount option h~s>kÆuge [ 487.303073] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 487.329105] FAULT_INJECTION: forcing a failure. [ 487.329105] name failslab, interval 1, probability 0, space 0, times 0 [ 487.368240] CPU: 0 PID: 22960 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 487.376341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.385825] Call Trace: [ 487.388542] dump_stack+0x22c/0x33e [ 487.392171] should_fail.cold+0xa/0x2f [ 487.396054] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.401146] ? find_held_lock+0x2d/0x110 [ 487.405258] ? sctp_bind_addr_state+0x1db/0x380 [ 487.409964] __should_failslab+0x153/0x1b6 [ 487.414217] should_failslab+0x5/0xf [ 487.418062] kmem_cache_alloc_trace+0x46/0x4b0 [ 487.422669] sctp_add_bind_addr+0x77/0x370 [ 487.426914] sctp_copy_local_addr_list+0x35b/0x520 [ 487.431850] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 487.436607] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 487.441827] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 487.447012] sctp_bind_addr_copy+0xde/0x470 [ 487.451333] __sctp_connect+0x713/0xd40 [ 487.455318] ? sctp_wfree+0x960/0x960 [ 487.459110] ? lock_sock_nested+0xa6/0x110 [ 487.463377] ? mark_held_locks+0xa6/0xf0 [ 487.467475] ? __local_bh_enable_ip+0x159/0x2a0 [ 487.472302] ? sctp_asconf_mgmt+0x380/0x380 [ 487.476637] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 487.481844] ? sctp_asconf_mgmt+0x380/0x380 [ 487.486179] sctp_inet_connect+0x14b/0x1b0 [ 487.490448] __sys_connect+0x265/0x2c0 [ 487.494341] ? __ia32_sys_accept+0xb0/0xb0 [ 487.498582] ? __mutex_add_waiter+0x160/0x160 [ 487.503273] ? vfs_write+0x393/0x540 [ 487.506981] ? fput+0x2b/0x190 [ 487.510187] ? ksys_write+0x1c8/0x2a0 [ 487.513992] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 487.519379] ? trace_hardirqs_off_caller+0x6e/0x210 [ 487.524432] __x64_sys_connect+0x6f/0xb0 [ 487.528527] do_syscall_64+0xf9/0x670 [ 487.532378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.537579] RIP: 0033:0x45de59 [ 487.540778] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.560126] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xfc, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410681, 0x0) [ 487.567845] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 487.575143] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 487.582417] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 487.589678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 487.596937] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:24 executing program 1 (fault-call:4 fault-nth:36): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 487.731243] FAULT_INJECTION: forcing a failure. [ 487.731243] name failslab, interval 1, probability 0, space 0, times 0 [ 487.742867] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 487.754364] CPU: 0 PID: 22987 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 487.762272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.771842] Call Trace: [ 487.774475] dump_stack+0x22c/0x33e [ 487.778154] should_fail.cold+0xa/0x2f [ 487.782079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.787305] ? find_held_lock+0x2d/0x110 [ 487.791404] ? sctp_bind_addr_state+0x1db/0x380 [ 487.796115] __should_failslab+0x153/0x1b6 [ 487.800380] should_failslab+0x5/0xf [ 487.804127] kmem_cache_alloc_trace+0x46/0x4b0 [ 487.808747] sctp_add_bind_addr+0x77/0x370 [ 487.813015] sctp_copy_local_addr_list+0x35b/0x520 [ 487.817972] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 487.822747] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 487.827970] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 487.833222] sctp_bind_addr_copy+0xde/0x470 [ 487.838381] __sctp_connect+0x713/0xd40 [ 487.842373] ? sctp_wfree+0x960/0x960 [ 487.846171] ? lock_sock_nested+0xa6/0x110 [ 487.850497] ? mark_held_locks+0xa6/0xf0 [ 487.854694] ? __local_bh_enable_ip+0x159/0x2a0 [ 487.859526] ? sctp_asconf_mgmt+0x380/0x380 [ 487.863854] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 487.869047] ? sctp_asconf_mgmt+0x380/0x380 [ 487.873376] sctp_inet_connect+0x14b/0x1b0 [ 487.877609] __sys_connect+0x265/0x2c0 [ 487.881496] ? __ia32_sys_accept+0xb0/0xb0 [ 487.885753] ? __mutex_add_waiter+0x160/0x160 [ 487.890270] ? vfs_write+0x393/0x540 [ 487.894329] ? fput+0x2b/0x190 [ 487.897529] ? ksys_write+0x1c8/0x2a0 [ 487.901322] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 487.908082] ? trace_hardirqs_off_caller+0x6e/0x210 [ 487.913100] __x64_sys_connect+0x6f/0xb0 [ 487.917341] do_syscall_64+0xf9/0x670 [ 487.921153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.927570] RIP: 0033:0x45de59 [ 487.930770] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.950296] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 487.958970] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 487.966249] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 487.973513] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hu=always,mpol=interleave\x00\x00']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 487.980767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 487.988020] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:24 executing program 1 (fault-call:4 fault-nth:37): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1b4, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 488.121596] tmpfs: Bad mount option hu 22:00:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000640)='/dev/vcsu#\x00', 0x5, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={&(0x7f0000000380)="c52a006a594c8b899f9bc287a43c89ecaae35f027be056f1c2eb3d3b23a078c7e4d2fa6082615f6a706faf5c93d74f5169474f847f5fcb90076675a16354fdd7ba3325f150bdaefb5e6b837b8af0fa0e492ec937d19510c092d0de0172629f401f96c6721ca951ef19f184e927c323bfed8252ebdc20de2d89bf7a3c2243dd5959c7c030f8732a2c396e828f52d3cbe144f4e8cdc8e32ee9", &(0x7f0000000480)=""/66, &(0x7f0000000500)="b4ac6182a70ad711c1678fd1ee46b35c6a49669746dbb71673410b1beccd17a3dd8d97c734b9186502d4542021ea03e9e387ce9c6dff563c24d62a166175406d128ffed134d058d7c68df450ab97e230618e55ca74c86cf826a20604b695c715eba8b6130952f741e15ffb8d795be3e540c9c2e120c547fc43016d925454693794e4ca29836212bdf3c0b065603c354e277ac31e9fa72b32c692077c4beb3864a3f8aca4527efd9dd5da4bc7a9d05f6e274c141324e1c45dfe57", &(0x7f00000005c0)="1c3d84f84ae2e07ec22a79d72dc25d356b69133897dda21e43e128b928258e7ab11744869c16b1edd65bbe18b9e90bdaa6af42554d655a8f80dac6a394aa72c400c1b6147dfbec8fce", 0x70, r2}, 0x38) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x52881, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000240)={0x6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 488.150063] tmpfs: Bad mount option hu [ 488.157403] FAULT_INJECTION: forcing a failure. [ 488.157403] name failslab, interval 1, probability 0, space 0, times 0 [ 488.186021] CPU: 0 PID: 23002 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 488.194681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.204960] Call Trace: [ 488.207587] dump_stack+0x22c/0x33e [ 488.211286] should_fail.cold+0xa/0x2f [ 488.215197] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.220339] ? find_held_lock+0x2d/0x110 [ 488.224424] ? sctp_bind_addr_state+0x1db/0x380 [ 488.229125] __should_failslab+0x153/0x1b6 [ 488.233382] should_failslab+0x5/0xf [ 488.237115] kmem_cache_alloc_trace+0x46/0x4b0 [ 488.237667] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 488.241714] sctp_add_bind_addr+0x77/0x370 [ 488.241735] sctp_copy_local_addr_list+0x35b/0x520 [ 488.241756] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 488.266528] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 488.271752] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 488.276974] sctp_bind_addr_copy+0xde/0x470 [ 488.281338] __sctp_connect+0x713/0xd40 [ 488.285443] ? sctp_wfree+0x960/0x960 [ 488.289273] ? lock_sock_nested+0xa6/0x110 [ 488.293543] ? mark_held_locks+0xa6/0xf0 [ 488.297673] ? __local_bh_enable_ip+0x159/0x2a0 [ 488.302808] ? sctp_asconf_mgmt+0x380/0x380 [ 488.307283] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 488.312502] ? sctp_asconf_mgmt+0x380/0x380 [ 488.317018] sctp_inet_connect+0x14b/0x1b0 [ 488.321275] __sys_connect+0x265/0x2c0 [ 488.325180] ? __ia32_sys_accept+0xb0/0xb0 [ 488.329433] ? __mutex_add_waiter+0x160/0x160 [ 488.333943] ? vfs_write+0x393/0x540 [ 488.337666] ? fput+0x2b/0x190 [ 488.340869] ? ksys_write+0x1c8/0x2a0 [ 488.344695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 488.350077] ? trace_hardirqs_off_caller+0x6e/0x210 [ 488.355154] __x64_sys_connect+0x6f/0xb0 [ 488.359232] do_syscall_64+0xf9/0x670 [ 488.363048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.368245] RIP: 0033:0x45de59 [ 488.371449] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.390362] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x2098042, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000180)={{0x9, 0x0, 0x5, 0xec96, '\x00', 0x3}, 0x2, 0x40, 0x7fff, 0x0, 0x3, 0x1, 'syz0\x00', &(0x7f0000000080)=['\x00', '/-\'}\xce\\\x00', '-*\x00'], 0xb, [], [0x142, 0x75, 0xfff, 0x2a0]}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f00000000c0)=@routing={0x5b, 0xa, 0x1, 0x5, 0x0, [@dev={0xfe, 0x80, [], 0x15}, @mcast2, @mcast2, @empty, @ipv4={[], [], @broadcast}]}, 0x58) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000002c0)={0x1, 0x1}, 0x8) [ 488.398076] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 488.405352] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 488.412630] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 488.420043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 488.427319] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:25 executing program 1 (fault-call:4 fault-nth:38): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xa00, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 488.559294] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:25 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x5, &(0x7f00000000c0)=[{0x0, 0xfff}, {0x7, 0x9}, {0x7, 0xb6}, {0x101, 0x7}, {0x2, 0x5}]}) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRES16=r0]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) [ 488.612228] FAULT_INJECTION: forcing a failure. [ 488.612228] name failslab, interval 1, probability 0, space 0, times 0 [ 488.640319] CPU: 0 PID: 23038 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 488.648265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.657650] Call Trace: [ 488.660272] dump_stack+0x22c/0x33e [ 488.663930] should_fail.cold+0xa/0x2f [ 488.667838] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.672950] ? find_held_lock+0x2d/0x110 [ 488.677100] ? sctp_bind_addr_state+0x1db/0x380 [ 488.681924] __should_failslab+0x153/0x1b6 [ 488.686163] should_failslab+0x5/0xf [ 488.689882] kmem_cache_alloc_trace+0x46/0x4b0 [ 488.694486] sctp_add_bind_addr+0x77/0x370 [ 488.698739] sctp_copy_local_addr_list+0x35b/0x520 [ 488.703676] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 488.708465] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 488.713686] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 488.718896] sctp_bind_addr_copy+0xde/0x470 [ 488.723241] __sctp_connect+0x713/0xd40 [ 488.727241] ? sctp_wfree+0x960/0x960 [ 488.731049] ? lock_sock_nested+0xa6/0x110 [ 488.735299] ? mark_held_locks+0xa6/0xf0 [ 488.739366] ? __local_bh_enable_ip+0x159/0x2a0 [ 488.744049] ? sctp_asconf_mgmt+0x380/0x380 [ 488.748410] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 488.753637] ? sctp_asconf_mgmt+0x380/0x380 [ 488.757989] sctp_inet_connect+0x14b/0x1b0 [ 488.762230] __sys_connect+0x265/0x2c0 [ 488.766136] ? __ia32_sys_accept+0xb0/0xb0 [ 488.770397] ? __mutex_add_waiter+0x160/0x160 [ 488.774909] ? vfs_write+0x393/0x540 [ 488.778643] ? fput+0x2b/0x190 [ 488.781836] ? ksys_write+0x1c8/0x2a0 [ 488.785652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 488.791024] ? trace_hardirqs_off_caller+0x6e/0x210 [ 488.796048] __x64_sys_connect+0x6f/0xb0 [ 488.800108] do_syscall_64+0xf9/0x670 [ 488.803902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.809079] RIP: 0033:0x45de59 [ 488.812274] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.831189] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 488.839034] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 488.846313] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 488.853596] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000580)=ANY=[@ANYBLOB="03000000000020c306613100020000090400000000000000f6ffffffa6067d5b01000400000000ffffffffffffffe2100000f2ffff0700000a00000072b661459637b2da8b01a9616e5c662fe0d55b4aabb4b4ae1a4598131e0c89623f0f0f076250d73c5eddeb219029898fb11320ad60bdfbc4f9c19e1ff7f0b358fe699c495387f0d3ac354b16906f354c0947971a6791cfc6df83cffcc908c495bf7061c0ecf003ba67b971f62849ba075e27a9a9caa5460b16e31697a3b00de23978857e84df6c6c44ceb354b41b422b3f069df2a8d8ed59c771a22d41e3f9a2816b9a19ffa0a541922997d5ea0d886696f0e465366d36264e1f1f5fad3dfaac190f808b4bdf3d88c102ff2eee4ef1bcc45dabc52461631608"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 488.860886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 488.868168] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1f6, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) r3 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x9, 0x402) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x80000000, 0x835, 0x0, 0x0, 0x20000004cb], 0x0, 0x1201}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:25 executing program 1 (fault-call:4 fault-nth:39): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 489.069154] tmpfs: No value for mount option '' 22:00:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 489.137593] FAULT_INJECTION: forcing a failure. [ 489.137593] name failslab, interval 1, probability 0, space 0, times 0 [ 489.168207] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 489.181411] CPU: 1 PID: 23070 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 489.189327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.198683] Call Trace: [ 489.201303] dump_stack+0x22c/0x33e [ 489.204923] should_fail.cold+0xa/0x2f [ 489.209668] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.214844] ? find_held_lock+0x2d/0x110 [ 489.218908] ? sctp_bind_addr_state+0x1db/0x380 [ 489.223573] __should_failslab+0x153/0x1b6 [ 489.227800] should_failslab+0x5/0xf [ 489.231505] kmem_cache_alloc_trace+0x46/0x4b0 [ 489.236091] sctp_add_bind_addr+0x77/0x370 [ 489.240319] sctp_copy_local_addr_list+0x35b/0x520 [ 489.245246] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 489.249998] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 489.255184] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 489.260370] sctp_bind_addr_copy+0xde/0x470 [ 489.264697] __sctp_connect+0x713/0xd40 [ 489.268667] ? sctp_wfree+0x960/0x960 [ 489.272544] ? lock_sock_nested+0xa6/0x110 [ 489.276787] ? mark_held_locks+0xa6/0xf0 [ 489.280849] ? __local_bh_enable_ip+0x159/0x2a0 [ 489.285510] ? sctp_asconf_mgmt+0x380/0x380 [ 489.289824] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 489.295110] ? sctp_asconf_mgmt+0x380/0x380 [ 489.299423] sctp_inet_connect+0x14b/0x1b0 [ 489.303652] __sys_connect+0x265/0x2c0 [ 489.307529] ? __ia32_sys_accept+0xb0/0xb0 [ 489.311784] ? __mutex_add_waiter+0x160/0x160 [ 489.316309] ? vfs_write+0x393/0x540 [ 489.320037] ? fput+0x2b/0x190 [ 489.323233] ? ksys_write+0x1c8/0x2a0 [ 489.327041] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 489.332406] ? trace_hardirqs_off_caller+0x6e/0x210 [ 489.337491] __x64_sys_connect+0x6f/0xb0 [ 489.341560] do_syscall_64+0xf9/0x670 [ 489.345500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.350694] RIP: 0033:0x45de59 [ 489.353971] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.372974] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 489.380686] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 489.387956] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 489.395214] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 489.402468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 489.409743] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 489.430939] tmpfs: No value for mount option '' 22:00:26 executing program 1 (fault-call:4 fault-nth:40): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 489.564905] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:26 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast2, 0x7}}, [0x6, 0x653, 0xffffffff, 0x3, 0x4, 0x400, 0x4, 0x9, 0xffffffffffffff7f, 0x7fffffff, 0x8, 0x8, 0x6de, 0x0, 0x3]}, &(0x7f0000000080)=0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 489.613134] FAULT_INJECTION: forcing a failure. [ 489.613134] name failslab, interval 1, probability 0, space 0, times 0 [ 489.630534] CPU: 0 PID: 23091 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 489.638485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.647840] Call Trace: [ 489.650436] dump_stack+0x22c/0x33e [ 489.654068] should_fail.cold+0xa/0x2f [ 489.657973] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.663093] ? find_held_lock+0x2d/0x110 [ 489.667163] ? sctp_bind_addr_state+0x1db/0x380 [ 489.671828] __should_failslab+0x153/0x1b6 [ 489.676054] should_failslab+0x5/0xf [ 489.679968] kmem_cache_alloc_trace+0x46/0x4b0 [ 489.684579] sctp_add_bind_addr+0x77/0x370 [ 489.688893] sctp_copy_local_addr_list+0x35b/0x520 [ 489.693831] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 489.698859] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 489.704090] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 489.709320] sctp_bind_addr_copy+0xde/0x470 [ 489.713683] __sctp_connect+0x713/0xd40 [ 489.717703] ? sctp_wfree+0x960/0x960 [ 489.721516] ? lock_sock_nested+0xa6/0x110 [ 489.725776] ? mark_held_locks+0xa6/0xf0 [ 489.729965] ? __local_bh_enable_ip+0x159/0x2a0 [ 489.734667] ? sctp_asconf_mgmt+0x380/0x380 [ 489.739017] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 489.744233] ? sctp_asconf_mgmt+0x380/0x380 [ 489.748576] sctp_inet_connect+0x14b/0x1b0 [ 489.752980] __sys_connect+0x265/0x2c0 [ 489.756880] ? __ia32_sys_accept+0xb0/0xb0 [ 489.761134] ? __mutex_add_waiter+0x160/0x160 [ 489.765650] ? vfs_write+0x393/0x540 [ 489.769385] ? fput+0x2b/0x190 [ 489.772571] ? ksys_write+0x1c8/0x2a0 [ 489.776389] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 489.781769] ? trace_hardirqs_off_caller+0x6e/0x210 [ 489.786786] __x64_sys_connect+0x6f/0xb0 [ 489.790854] do_syscall_64+0xf9/0x670 [ 489.794662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.799855] RIP: 0033:0x45de59 [ 489.803136] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.822216] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 489.829964] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 489.837244] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 489.844637] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 489.852018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 22:00:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x80fe, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 489.859313] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x212, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:26 executing program 1 (fault-call:4 fault-nth:41): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = getpid() tkill(r2, 0x3d) fcntl$setownex(r0, 0xf, &(0x7f0000000440)={0x2, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000004c0)=ANY=[@ANYBLOB="03000000000020c306c123722c5e42947d31000200b2e49c72000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r4, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '@'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2b}]}, 0x54}, 0x1, 0x0, 0x0, 0x4044880}, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 490.057388] FAULT_INJECTION: forcing a failure. [ 490.057388] name failslab, interval 1, probability 0, space 0, times 0 [ 490.065326] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 490.089264] CPU: 0 PID: 23115 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 490.097199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.106573] Call Trace: [ 490.109210] dump_stack+0x22c/0x33e [ 490.112884] should_fail.cold+0xa/0x2f [ 490.117061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.122185] ? find_held_lock+0x2d/0x110 [ 490.126274] ? sctp_bind_addr_state+0x1db/0x380 [ 490.130975] __should_failslab+0x153/0x1b6 [ 490.135235] should_failslab+0x5/0xf [ 490.138970] kmem_cache_alloc_trace+0x46/0x4b0 [ 490.143579] sctp_add_bind_addr+0x77/0x370 [ 490.147933] sctp_copy_local_addr_list+0x35b/0x520 [ 490.152881] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 490.157656] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 490.162906] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 490.168207] sctp_bind_addr_copy+0xde/0x470 [ 490.172564] __sctp_connect+0x713/0xd40 [ 490.176568] ? sctp_wfree+0x960/0x960 [ 490.180396] ? lock_sock_nested+0xa6/0x110 [ 490.184660] ? mark_held_locks+0xa6/0xf0 [ 490.189261] ? __local_bh_enable_ip+0x159/0x2a0 [ 490.194037] ? sctp_asconf_mgmt+0x380/0x380 [ 490.198415] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 490.203626] ? sctp_asconf_mgmt+0x380/0x380 [ 490.207960] sctp_inet_connect+0x14b/0x1b0 [ 490.212209] __sys_connect+0x265/0x2c0 [ 490.216109] ? __ia32_sys_accept+0xb0/0xb0 [ 490.220356] ? __mutex_add_waiter+0x160/0x160 [ 490.224878] ? vfs_write+0x393/0x540 [ 490.228607] ? fput+0x2b/0x190 [ 490.231813] ? ksys_write+0x1c8/0x2a0 [ 490.235631] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 490.241011] ? trace_hardirqs_off_caller+0x6e/0x210 [ 490.246042] __x64_sys_connect+0x6f/0xb0 [ 490.250126] do_syscall_64+0xf9/0x670 [ 490.253944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.259140] RIP: 0033:0x45de59 [ 490.262339] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.281255] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 490.288997] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 490.296719] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 490.304270] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 490.311558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 490.318880] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:26 executing program 1 (fault-call:4 fault-nth:42): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 490.436285] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 490.472071] FAULT_INJECTION: forcing a failure. [ 490.472071] name failslab, interval 1, probability 0, space 0, times 0 [ 490.508233] CPU: 0 PID: 23143 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 490.516170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.525632] Call Trace: [ 490.528276] dump_stack+0x22c/0x33e [ 490.531953] should_fail.cold+0xa/0x2f [ 490.535885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.541019] ? find_held_lock+0x2d/0x110 [ 490.545114] ? sctp_bind_addr_state+0x1db/0x380 [ 490.549822] __should_failslab+0x153/0x1b6 [ 490.554092] should_failslab+0x5/0xf [ 490.557838] kmem_cache_alloc_trace+0x46/0x4b0 [ 490.562547] sctp_add_bind_addr+0x77/0x370 [ 490.566814] sctp_copy_local_addr_list+0x35b/0x520 [ 490.571779] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 490.576571] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 490.581801] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 490.587026] sctp_bind_addr_copy+0xde/0x470 [ 490.591384] __sctp_connect+0x713/0xd40 [ 490.595926] ? sctp_wfree+0x960/0x960 [ 490.599752] ? lock_sock_nested+0xa6/0x110 [ 490.604023] ? mark_held_locks+0xa6/0xf0 22:00:27 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="697567653d616c3d696e7465726c656176fa913e29ef61a6b1df479e362ff9a19f467f39e5525132b9828f4eba8346a4f1fb2e49598c230fb3e036e5924130d0a4640d7ed381209578ee87167577c6d3c4222a8f41af9f01a2dcd5b63f08e877def4ca6be52c7567c89f6ecb1973e4d4c2c26c3a14e591b51b71aa39dc484f4ff255d960a0c46c711b8dc806a0fe26aaeee051bffc7e60cb24d7e39d2d2aad508b496a560e4726816ad89e08da95e92f5b7afccc06eab9a335aed32e7b8bf385fc1e30447906bc7c521b651fbd72ac7c227b1d2538b653cd813af63ac50490bf82d0b49ba5ad519bc657b3a974d3"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 490.608120] ? __local_bh_enable_ip+0x159/0x2a0 [ 490.612823] ? sctp_asconf_mgmt+0x380/0x380 [ 490.617180] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 490.622504] ? sctp_asconf_mgmt+0x380/0x380 [ 490.626865] sctp_inet_connect+0x14b/0x1b0 [ 490.631135] __sys_connect+0x265/0x2c0 [ 490.635056] ? __ia32_sys_accept+0xb0/0xb0 [ 490.639323] ? __mutex_add_waiter+0x160/0x160 [ 490.643854] ? vfs_write+0x393/0x540 [ 490.647603] ? fput+0x2b/0x190 [ 490.650827] ? ksys_write+0x1c8/0x2a0 [ 490.654759] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 490.660151] ? trace_hardirqs_off_caller+0x6e/0x210 [ 490.665207] __x64_sys_connect+0x6f/0xb0 [ 490.669301] do_syscall_64+0xf9/0x670 [ 490.673137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.678346] RIP: 0033:0x45de59 [ 490.681558] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.701168] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2c0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 490.708893] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 490.716159] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 490.723432] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 490.730719] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 490.738014] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xc0fe, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x15) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f00000001c0)) 22:00:27 executing program 1 (fault-call:4 fault-nth:43): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 490.862119] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 490.962214] tmpfs: Bad mount option iuge 22:00:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 490.995806] tmpfs: Bad mount option iuge [ 491.001422] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 491.024950] FAULT_INJECTION: forcing a failure. [ 491.024950] name failslab, interval 1, probability 0, space 0, times 0 [ 491.044671] CPU: 1 PID: 23178 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 491.052623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.061995] Call Trace: [ 491.064604] dump_stack+0x22c/0x33e [ 491.068316] should_fail.cold+0xa/0x2f [ 491.072266] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.077395] ? find_held_lock+0x2d/0x110 [ 491.081454] ? sctp_bind_addr_state+0x1db/0x380 [ 491.086123] __should_failslab+0x153/0x1b6 [ 491.090379] should_failslab+0x5/0xf [ 491.094088] kmem_cache_alloc_trace+0x46/0x4b0 [ 491.099371] sctp_add_bind_addr+0x77/0x370 [ 491.103601] sctp_copy_local_addr_list+0x35b/0x520 [ 491.108538] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 491.113328] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 491.118565] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 491.123774] sctp_bind_addr_copy+0xde/0x470 [ 491.128111] __sctp_connect+0x713/0xd40 [ 491.132082] ? sctp_wfree+0x960/0x960 [ 491.135897] ? lock_sock_nested+0xa6/0x110 [ 491.140132] ? mark_held_locks+0xa6/0xf0 [ 491.144214] ? __local_bh_enable_ip+0x159/0x2a0 [ 491.148890] ? sctp_asconf_mgmt+0x380/0x380 [ 491.153234] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 491.158426] ? sctp_asconf_mgmt+0x380/0x380 [ 491.162750] sctp_inet_connect+0x14b/0x1b0 [ 491.166997] __sys_connect+0x265/0x2c0 [ 491.170891] ? __ia32_sys_accept+0xb0/0xb0 [ 491.175123] ? __mutex_add_waiter+0x160/0x160 [ 491.179617] ? vfs_write+0x393/0x540 [ 491.183325] ? fput+0x2b/0x190 [ 491.186509] ? ksys_write+0x1c8/0x2a0 [ 491.190320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 491.195693] ? trace_hardirqs_off_caller+0x6e/0x210 [ 491.200709] __x64_sys_connect+0x6f/0xb0 [ 491.204771] do_syscall_64+0xf9/0x670 [ 491.208569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.213751] RIP: 0033:0x45de59 [ 491.216939] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.235849] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:27 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_DO_IT(r1, 0xab03) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 491.243575] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 491.250844] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 491.258108] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 491.265371] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 491.272638] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2e2, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:27 executing program 1 (fault-call:4 fault-nth:44): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 22:00:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = dup2(r1, r3) read$fb(r4, &(0x7f0000000480)=""/248, 0xf8) 22:00:27 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$TCSBRKP(r1, 0x5425, 0x19) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 491.418836] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 491.456572] FAULT_INJECTION: forcing a failure. [ 491.456572] name failslab, interval 1, probability 0, space 0, times 0 [ 491.470870] CPU: 0 PID: 23199 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 491.478806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.488170] Call Trace: [ 491.490767] dump_stack+0x22c/0x33e [ 491.494443] should_fail.cold+0xa/0x2f [ 491.498359] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.503475] ? find_held_lock+0x2d/0x110 [ 491.508521] ? sctp_bind_addr_state+0x1db/0x380 [ 491.513212] __should_failslab+0x153/0x1b6 [ 491.517459] should_failslab+0x5/0xf [ 491.521288] kmem_cache_alloc_trace+0x46/0x4b0 [ 491.525900] sctp_add_bind_addr+0x77/0x370 [ 491.530150] sctp_copy_local_addr_list+0x35b/0x520 [ 491.535104] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 491.539902] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 491.545117] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 491.550337] sctp_bind_addr_copy+0xde/0x470 [ 491.554689] __sctp_connect+0x713/0xd40 [ 491.558680] ? sctp_wfree+0x960/0x960 [ 491.562483] ? lock_sock_nested+0xa6/0x110 [ 491.566766] ? mark_held_locks+0xa6/0xf0 [ 491.571268] ? __local_bh_enable_ip+0x159/0x2a0 [ 491.575973] ? sctp_asconf_mgmt+0x380/0x380 [ 491.580416] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 491.585609] ? sctp_asconf_mgmt+0x380/0x380 [ 491.589940] sctp_inet_connect+0x14b/0x1b0 [ 491.594190] __sys_connect+0x265/0x2c0 [ 491.598083] ? __ia32_sys_accept+0xb0/0xb0 [ 491.602311] ? __mutex_add_waiter+0x160/0x160 [ 491.606823] ? vfs_write+0x393/0x540 [ 491.610796] ? fput+0x2b/0x190 [ 491.614005] ? ksys_write+0x1c8/0x2a0 [ 491.617825] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 491.623475] ? trace_hardirqs_off_caller+0x6e/0x210 [ 491.628514] __x64_sys_connect+0x6f/0xb0 [ 491.632795] do_syscall_64+0xf9/0x670 [ 491.636730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.643533] RIP: 0033:0x45de59 [ 491.646731] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.666035] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 491.673745] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 491.681024] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 491.688306] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 491.695578] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 491.702849] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 22:00:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xfc00, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:28 executing program 1 (fault-call:4 fault-nth:45): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 491.806977] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x300, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 491.916739] FAULT_INJECTION: forcing a failure. [ 491.916739] name failslab, interval 1, probability 0, space 0, times 0 [ 491.956769] CPU: 1 PID: 23223 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 491.964708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.974088] Call Trace: [ 491.976727] dump_stack+0x22c/0x33e [ 491.980392] should_fail.cold+0xa/0x2f [ 491.984316] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.989444] ? find_held_lock+0x2d/0x110 [ 491.993655] ? sctp_bind_addr_state+0x1db/0x380 [ 491.998366] __should_failslab+0x153/0x1b6 [ 492.003189] should_failslab+0x5/0xf [ 492.006941] kmem_cache_alloc_trace+0x46/0x4b0 [ 492.011555] sctp_add_bind_addr+0x77/0x370 22:00:28 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180)='net_prio.ifpriomap\x00', 0x2, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10100, &(0x7f0000000140)=ANY=[]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0xc0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f00005e0000/0x4000)=nil, 0x4000, 0x2, 0x28011, r3, 0x5b4f3000) ioctl$VT_WAITACTIVE(r3, 0x5607) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fc) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000040)=0x80) [ 492.015857] sctp_copy_local_addr_list+0x35b/0x520 [ 492.020818] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 492.025601] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 492.030822] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 492.036029] sctp_bind_addr_copy+0xde/0x470 [ 492.040960] __sctp_connect+0x713/0xd40 [ 492.044935] ? sctp_wfree+0x960/0x960 [ 492.048733] ? lock_sock_nested+0xa6/0x110 [ 492.052969] ? mark_held_locks+0xa6/0xf0 [ 492.057040] ? __local_bh_enable_ip+0x159/0x2a0 [ 492.061712] ? sctp_asconf_mgmt+0x380/0x380 [ 492.066030] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 492.071212] ? sctp_asconf_mgmt+0x380/0x380 [ 492.075526] sctp_inet_connect+0x14b/0x1b0 [ 492.079757] __sys_connect+0x265/0x2c0 [ 492.083636] ? __ia32_sys_accept+0xb0/0xb0 [ 492.087864] ? __mutex_add_waiter+0x160/0x160 [ 492.092355] ? vfs_write+0x393/0x540 [ 492.096064] ? fput+0x2b/0x190 [ 492.099248] ? ksys_write+0x1c8/0x2a0 [ 492.103044] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 492.108402] ? trace_hardirqs_off_caller+0x6e/0x210 [ 492.113417] __x64_sys_connect+0x6f/0xb0 [ 492.117487] do_syscall_64+0xf9/0x670 [ 492.121285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.126483] RIP: 0033:0x45de59 [ 492.129670] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.148647] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 492.156345] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 492.163690] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 492.171473] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 492.178736] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 492.186001] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:28 executing program 1 (fault-call:4 fault-nth:46): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) [ 492.263038] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a000000720ad6b502980546ede210cd5303472205e661f156ab26d4cd1baeda1500068b08a9dbb4ab42f89f274c203dc9dc93f112872d09d519ae039f3089309fc612d109d0"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f00000001c0)={0x9, 0x976}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 492.323644] tmpfs: No value for mount option './file0' [ 492.338128] FAULT_INJECTION: forcing a failure. [ 492.338128] name failslab, interval 1, probability 0, space 0, times 0 [ 492.377783] CPU: 1 PID: 23243 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 492.385732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.395107] Call Trace: [ 492.397731] dump_stack+0x22c/0x33e [ 492.401400] should_fail.cold+0xa/0x2f [ 492.405505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.410643] ? find_held_lock+0x2d/0x110 [ 492.414733] ? sctp_bind_addr_state+0x1db/0x380 [ 492.419433] __should_failslab+0x153/0x1b6 [ 492.423697] should_failslab+0x5/0xf [ 492.427433] kmem_cache_alloc_trace+0x46/0x4b0 [ 492.432045] sctp_add_bind_addr+0x77/0x370 [ 492.436310] sctp_copy_local_addr_list+0x35b/0x520 [ 492.441269] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 492.446060] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 492.451288] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 492.456515] sctp_bind_addr_copy+0xde/0x470 [ 492.460947] __sctp_connect+0x713/0xd40 [ 492.464948] ? sctp_wfree+0x960/0x960 [ 492.468760] ? lock_sock_nested+0xa6/0x110 [ 492.473031] ? mark_held_locks+0xa6/0xf0 [ 492.477126] ? __local_bh_enable_ip+0x159/0x2a0 [ 492.481830] ? sctp_asconf_mgmt+0x380/0x380 [ 492.486694] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 492.492098] ? sctp_asconf_mgmt+0x380/0x380 [ 492.496445] sctp_inet_connect+0x14b/0x1b0 [ 492.500708] __sys_connect+0x265/0x2c0 [ 492.504616] ? __ia32_sys_accept+0xb0/0xb0 [ 492.508873] ? __mutex_add_waiter+0x160/0x160 [ 492.513387] ? vfs_write+0x393/0x540 [ 492.517106] ? fput+0x2b/0x190 [ 492.520300] ? ksys_write+0x1c8/0x2a0 [ 492.524111] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 492.529486] ? trace_hardirqs_off_caller+0x6e/0x210 [ 492.534515] __x64_sys_connect+0x6f/0xb0 [ 492.538573] do_syscall_64+0xf9/0x670 [ 492.542368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.547560] RIP: 0033:0x45de59 [ 492.550755] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.569665] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:29 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="687567654f616c776179d708000000000000732c6d706f6c3d696e7465726c6561"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 492.577364] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 492.584618] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 492.591871] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 492.599127] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 492.606500] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xfe80, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 492.638728] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 492.719836] tmpfs: No value for mount option 'hugeOalway×' 22:00:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x314, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:29 executing program 1 (fault-call:4 fault-nth:47): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[]) [ 492.768383] tmpfs: No value for mount option 'hugeOalway×' 22:00:29 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x4], 0x1, 0x800}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 492.847306] FAULT_INJECTION: forcing a failure. [ 492.847306] name failslab, interval 1, probability 0, space 0, times 0 [ 492.905893] CPU: 1 PID: 23278 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 492.913861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.923232] Call Trace: [ 492.925962] dump_stack+0x22c/0x33e [ 492.929617] should_fail.cold+0xa/0x2f [ 492.933528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.938649] ? find_held_lock+0x2d/0x110 [ 492.942726] ? sctp_bind_addr_state+0x1db/0x380 [ 492.947418] __should_failslab+0x153/0x1b6 [ 492.951785] should_failslab+0x5/0xf [ 492.955512] kmem_cache_alloc_trace+0x46/0x4b0 [ 492.960097] sctp_add_bind_addr+0x77/0x370 [ 492.964333] sctp_copy_local_addr_list+0x35b/0x520 [ 492.969260] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 492.974010] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 492.979196] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 492.984406] sctp_bind_addr_copy+0xde/0x470 [ 492.988741] __sctp_connect+0x713/0xd40 [ 492.992746] ? sctp_wfree+0x960/0x960 [ 492.996563] ? lock_sock_nested+0xa6/0x110 [ 493.000809] ? mark_held_locks+0xa6/0xf0 [ 493.004874] ? __local_bh_enable_ip+0x159/0x2a0 [ 493.009570] ? sctp_asconf_mgmt+0x380/0x380 [ 493.014892] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 493.020097] ? sctp_asconf_mgmt+0x380/0x380 [ 493.024421] sctp_inet_connect+0x14b/0x1b0 [ 493.029877] __sys_connect+0x265/0x2c0 [ 493.033796] ? __ia32_sys_accept+0xb0/0xb0 [ 493.038032] ? __mutex_add_waiter+0x160/0x160 [ 493.042542] ? vfs_write+0x393/0x540 [ 493.046258] ? fput+0x2b/0x190 [ 493.049462] ? ksys_write+0x1c8/0x2a0 [ 493.053718] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 493.059086] ? trace_hardirqs_off_caller+0x6e/0x210 [ 493.064104] __x64_sys_connect+0x6f/0xb0 [ 493.068184] do_syscall_64+0xf9/0x670 [ 493.071982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.077288] RIP: 0033:0x45de59 [ 493.080495] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.099401] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 493.107106] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 493.114367] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 493.121627] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 493.128899] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 493.136173] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 493.164312] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 493.187735] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:29 executing program 1 (fault-call:4 fault-nth:48): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[]) 22:00:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffff834dc9c84a4ba6067d5b01000000000000ffffffffffffffe2100000f2ffff07ab000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f00000001c0)=0x5, 0x4) 22:00:29 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0xec, "d06272b73427c437d4f9e5df38f93446439fe2925ed9fa5fc921fb68cb0abb53a927d6423c35ba6ced6c9c9167574e7589bb11ae361bb0ce51f9b3de3829bdd0c91f669bc13a4c6a2aaeee2f87cac27b94334d87882fdf454d5b1ce10545d61aedb71f60a032b528ddfe0bf2307ace53bd04378038d41fbff43bb6f7c5f33e83d62111905ebb7e74bef69b40ee59b8e13b8df45659a58a0f540624911f506d16af9404566162b3ac40d639d4f52b6c4aae53918f4c7953daee2faffc257ed250ff253a5b46f20db3d26814a748ddb72fbb0ebccfce58a107967e41bf695f2b57e173fec4d6b62b5a16cb3dc0"}, &(0x7f00000002c0)=0xf4) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r3, 0x1f}, &(0x7f0000000340)=0x8) r4 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x5, 0x3}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x8001, 0x1, 0x401, r5}, &(0x7f0000000180)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1aa) [ 493.299283] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 493.342790] FAULT_INJECTION: forcing a failure. [ 493.342790] name failslab, interval 1, probability 0, space 0, times 0 [ 493.367171] CPU: 0 PID: 23311 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 493.375139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.384510] Call Trace: [ 493.387117] dump_stack+0x22c/0x33e [ 493.390752] should_fail.cold+0xa/0x2f [ 493.394649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.399751] ? find_held_lock+0x2d/0x110 [ 493.403811] ? sctp_bind_addr_state+0x1db/0x380 [ 493.408477] __should_failslab+0x153/0x1b6 [ 493.412709] should_failslab+0x5/0xf [ 493.416417] kmem_cache_alloc_trace+0x46/0x4b0 [ 493.420999] sctp_add_bind_addr+0x77/0x370 [ 493.425251] sctp_copy_local_addr_list+0x35b/0x520 [ 493.430326] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 493.435105] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 493.440305] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 493.445493] sctp_bind_addr_copy+0xde/0x470 [ 493.449825] __sctp_connect+0x713/0xd40 [ 493.453793] ? sctp_wfree+0x960/0x960 [ 493.457588] ? lock_sock_nested+0xa6/0x110 [ 493.461822] ? mark_held_locks+0xa6/0xf0 [ 493.465890] ? __local_bh_enable_ip+0x159/0x2a0 [ 493.470578] ? sctp_asconf_mgmt+0x380/0x380 [ 493.474932] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 493.480134] ? sctp_asconf_mgmt+0x380/0x380 [ 493.484585] sctp_inet_connect+0x14b/0x1b0 [ 493.489239] __sys_connect+0x265/0x2c0 [ 493.493121] ? __ia32_sys_accept+0xb0/0xb0 [ 493.497374] ? __mutex_add_waiter+0x160/0x160 [ 493.501861] ? vfs_write+0x393/0x540 [ 493.505564] ? fput+0x2b/0x190 [ 493.508758] ? ksys_write+0x1c8/0x2a0 [ 493.512551] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 493.518166] ? trace_hardirqs_off_caller+0x6e/0x210 [ 493.523193] __x64_sys_connect+0x6f/0xb0 [ 493.527710] do_syscall_64+0xf9/0x670 [ 493.531523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.536803] RIP: 0033:0x45de59 [ 493.539995] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.559265] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 493.567006] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 493.574283] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 493.581561] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 493.588841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 493.596297] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x330, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xfec0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 493.653492] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_GET_API_VERSION(r3, 0xae00, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000001c0)='./file0\x00', 0xee01, r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[]) 22:00:30 executing program 1 (fault-call:4 fault-nth:49): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:30 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567726c65617665000000000000001e0000000000000000"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 493.829341] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 493.888594] FAULT_INJECTION: forcing a failure. [ 493.888594] name failslab, interval 1, probability 0, space 0, times 0 [ 493.913026] CPU: 1 PID: 23347 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 493.920989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.930365] Call Trace: [ 493.932999] dump_stack+0x22c/0x33e [ 493.936672] should_fail.cold+0xa/0x2f [ 493.940599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.945736] ? find_held_lock+0x2d/0x110 [ 493.949831] ? sctp_bind_addr_state+0x1db/0x380 [ 493.954536] __should_failslab+0x153/0x1b6 [ 493.958803] should_failslab+0x5/0xf [ 493.962547] kmem_cache_alloc_trace+0x46/0x4b0 [ 493.967285] sctp_add_bind_addr+0x77/0x370 [ 493.971550] sctp_copy_local_addr_list+0x35b/0x520 [ 493.976517] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 493.981310] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 493.986537] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 493.991757] sctp_bind_addr_copy+0xde/0x470 [ 493.996135] __sctp_connect+0x713/0xd40 [ 494.000228] ? sctp_wfree+0x960/0x960 [ 494.004056] ? lock_sock_nested+0xa6/0x110 [ 494.008458] ? mark_held_locks+0xa6/0xf0 [ 494.012637] ? __local_bh_enable_ip+0x159/0x2a0 [ 494.017332] ? sctp_asconf_mgmt+0x380/0x380 [ 494.021702] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 494.027112] ? sctp_asconf_mgmt+0x380/0x380 [ 494.031471] sctp_inet_connect+0x14b/0x1b0 [ 494.035746] __sys_connect+0x265/0x2c0 [ 494.039667] ? __ia32_sys_accept+0xb0/0xb0 [ 494.043936] ? __mutex_add_waiter+0x160/0x160 [ 494.048460] ? vfs_write+0x393/0x540 [ 494.052200] ? fput+0x2b/0x190 [ 494.055414] ? ksys_write+0x1c8/0x2a0 [ 494.059363] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 494.064766] ? trace_hardirqs_off_caller+0x6e/0x210 [ 494.069904] __x64_sys_connect+0x6f/0xb0 [ 494.074021] do_syscall_64+0xf9/0x670 [ 494.077889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.083098] RIP: 0033:0x45de59 [ 494.086310] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.105230] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 494.113058] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 494.120352] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 494.127644] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 494.134981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 494.142394] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 494.171656] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x33a, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB]) [ 494.249636] tmpfs: No value for mount option 'hugrleave' 22:00:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYRES32=r0]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) write$char_raw(r1, &(0x7f0000000200)={"b78f1e6b77fde78681ed75207f365c5dd5ea5e6ea73613306a26f22dd221d57195ccc6a14cd70816e6fde00f8bb3f2a5a2f07d3fad4dabe80ba0be83f06df8f95a763327c2a9a3cb4e0038a84e1f6873b63408ee7cdb09036deace77935dc7f73ba3cec38b41665a51574dd18fbd168b729fabe27fd2d293b2570406fb2be183f9ba9e50a9f88442807936c38ced07ca95469e5d4698e59dbaf47a1290a7dd2a9513f258cdddce95e4ddef287718c9705153c6fefd96c428b129d2a77118f43b5b982a494a2fc3e5c8979acf6b8938b98df887ae01af04a6769ca4ba3d0868595c3b39788660aa159c9b0c23adb5c7b4fff2ff1401e9b948ded2b9aa832b5403c33ad15b7c31abafd124fc87a553501958ec498a58e49a79eed83beaaa3b480b93f09b2dbfa0e9f26893e3c3f7f1887132cf1830cbfbc5379eb0c05ba3be00792ed1d0c28c096a8ced5176d970a88c59998d2b5b04c0b496fbc8cf8b665256e9ac8b53c7e3b79200c86029514eb56e5756f722428182dca649ab102e0d1cb26de4172abb3785f664b302c51bb5903037e45c6e4a907f325938ace68072e07f96170e9a794b7547e2c239c7ca11b5e239718821a52a35f276dec2941ee385d4993faaf5cd957bd8849111552a88e416b81212c3855f156c83aa9124b095f983a61edbce3de6b9e2c9d5ec3e1863874bed1fa4cd783c2a74190591be61e2f0bc530d1bdf25d25f86cbd25d77ea02eb80185fcd2ea70fca1476d8698f1569a64e4d37d86a273c2e14c0e6623f1b40bca892b553dd47b71d9c9324a0703618f4bd53ac0ffc090435a19ebc02f04bcd142361502984e072d30f84cd214da25247c343e8b7f8a359ec47368370e84ec2c2af2cd30bf9fafef7e8fc26bb8efb73242603241d986e198999c3a429ba9be1ffc2545d6157d809e26d02047286b688ae898bae188330f4334a805a715434a0db5435ca1ffd16555479b5cc91b15a27d8ad1edc3f4bace6919043cd2b9423dcfa104639ea8c75a0680f8adb961850566a681073b0626c7de458edfde055b19e9dc418edbd3814d6cc569cbe4fffcec041b1e10111fc9a550bc059f6f5b9367aac610ea7d41adcbb968738f4a504e802f627dcb0891779d6d2b0dc0d7238fa9fa25fdb45be876cd741d58b5c8b1d7c23a91604cdeecb63a76233382e31c41dece0a9bc46ac24fdf2be7d807076ad73762118e69b218400121e83e1a8caa9f2f5a3601b3031425187f365350ebf5b938a0bcd431c6f39b99ae7e9508f0a7f85edfb9559d33c4d6469dfc1377464855e59e278f0262e23e3e1736f5b537b4bf75e15082318da7488f1a8ca464929fcba87f6c400c01ee7e0cee7554216f6e2ff1096300315ff81cd2ec337d9eedd5aa1408e67f55e63a5c4fa96ccc28ca1b1cee187a24c6ce1fbf3ecaf3d9199e460c7911d34db278737848a1dae19d6851a1084a37a236923b627d047819f1b8b139cbb4e45a0b99da1af58941b194949cf8dcd18af39ee740e768e43555a6e3223cdf422487eb714fc6d25b90aaa779aa380046f9735a99b66088e1b7c39c9ed93a60ea933b6d825d2f65d798950dde860b05ff73a77b3c9c994cb26945b4a38e0139843f098f49b597e7f9cb34c984eda9c4f329e8397fab6f0d6367b0ef00041977aaa4f4269cf4552990b7d7e3a64b053737c44c91aaa0e96b7f1f73d7da01d9e3e2158f0da107dcd7538df4db73178bf7d3722980cba18e5d7b6e37cfea4f15623369a5520ad6d9b57c786dc03a8783ca002e3c556b53baea66898d1341357397c6a125064f012ef2736309702ed1801a3e552fefb249d8cd904d37baa87e042e932c15762b5cf9db8608a4ecbafaef096cc947e8a46124217671ef6af619a25f7352923ea51e18c5ae730523ac3e3c16bb83a363bef29d2397c56c8fa766964c1b6509946a636bc134f74722e83230d526fb7da8af3028e8de4b17ef6e2d162a686d4ea01ca43a0667c02a2ce83327fb5f81e36567b0730bf542810d7b5cafe4566366b71635d5e530a6faa3fb41e2d77246795ee8dcd3810168beef4e8d827748b62dfeb9fab20b43bd2a007279312419f3d89221d6205c1da6eed0c12c402cb4b7b3f074573b2cdc00673867d2ade52b8906d916e11d77a18fffa408806d21f18f309f37a991d2216c4ec4c7f0ab54f858e2a2ad8790398f17d79c0ffa8a0f767e6131de2056b742e47e9718d86f0d81a36d656e482fe60f03a792c2550ee7ffec1f3e12f0a0cd8e429ab9760307cac99829505e645cd3c9878ca369b8b74de9f9362be7374b4f0e8962c4d1487ee073cd9babcfdcd060495ee90fe421fdf5c970f71782ca25a22a8fdfbc8c56f9e7b56c0c35e1041d1e4bbd771d4f25127a1fd77d64b53e82de9c9ff9fab7b36cf6edc9be007d86beb7acf433997d25a2cd7abda40bbc0842ab29a6769d75498371faf0316a9b533764749961dd8e73a2c55323731247b9be1a27526063be7ae143469ce123abe364ae949cff774c814a589a1fbf93cd7c1aae3f8963a5ef1db794e63e20eb40210510e1a53428d691d49d6a775683ba8a6ee3b773f34ab38bf25d71afff2cd35c8dd2158ab458d63e4aa27736f5784c480dac6e7cc3d21a562f0f162c418a81ddeb07571b55ebeee9aade7beeae78618d66c046c2f7bb74f9c2e59319e8e875bff4db9c36341b42e567120c9933c708b9b86668fe3b940ac32b6acf0159ab78a6ebac1409fad5d63eb66d4a47aaa14409d9cb9150e1135b7b3bcdfdc34b2c6742522a94092f91615dff785bf75e2863d957f3aef4171bcbbe0ad9c8e866533bd4e120f64185d4ca8b73fbef39905e1ec5599f349eb64a10b66ef2574688ead2cac5b36ca86febc06e5f47a6bd54075971c895459f30eab92f58cc9f036e9870a10d1c16fe78a2237185005b142cdad5f22c48ce1ba5a69207c5fe8143198859dad68c9aa654b46703a8a71525a063840e8969e28cb32c2b8413663b7e001c6969cfaf2c6e10dc628788109e56cb792423a00c7395e01dec9a4e93275e914c0001b6e5e81e6f07a60ef94963f44bb718cc7747c00acd5cf3b1e2f8b579fea21f38afc77a10810df909bb1b56de4f7cac197479eebeb370e8ddf9800563a80915a0dd93432df45adc12b925b733ef2263a29150a406de00d9e04e7335e7931e054439914298040b3dc9a3c44ac00fe92d51871ba0c5fe123bb4733967eb6f81523be3a55cabbc056f23208ed9c4ab4e195599525356a3179f2d553d0164bdc19e183975897928ae106becc37a430f2aa0c34c36c28d9bedfba6f37ff09c8ec82e1d6690d22ff9342a34dd19120465513217f50ddf0b1a132f5846ff33f6494c56e8ad2df6d1f3ffad65dcbd85eb11dd887407ff3890040fea1a2c6e5ebf320b9a293491b1a7beb6afc127b91a8de24bc66ee57e69db591283986c7af953211f03a6ae9cc27453a38b3e546a2fbae24aea1cd51e343de2ab641818d1479868d15a8720cb95349a926a93ac657ea3dc19867c6114664ad97954aef85c4f902c54d2687e2d96e81210e640f25b0c79beabd7bdbaa28f8e2c0ece693462d5a46b788008fdab15ababd440e221cd81029cb38b2bf774f64dcf0780aae12e4214f102806b803d6b72f814759ea5b1246f8d219ae60bd879a094f46c1b35b5bbd0963b0f91e43278486256697fa2d2a990eaad8d87bc9b3f987a09fa9927246faaef382c07cb51b63ee6da818e9ffdac980d92ce2f8de2cd27bcbd1f06226bb0f483928e95902eeda13237717f2a77827b8a17fdc671f2bd575e50ce75bfb8fc24064c26aceb7014ce9fc0163c4f7190a9c6a52d9d10812975a07f27aea48fd83fc74ba4a9bc017c551a4522ec38b72803118cf50a9394617552772ca936d3c40fefdc1b3d625922c5428f885df86c408b47452159a04e28543505c2d949b7c4fb1bcdd4878524b3109c151889748b4115210781f482ec69c91c84a24a622721290bb25468cf4a92faa89b1a49d0a852313754b521cc24343973d1f4b401eb98c78d8265c4875e607dabd2be1fdf7075bbb9b39c86ad8508765a9e0aeca90ace19223cd9712d0936fbade92d1b17f0f91ae8f89db55a1eb859567607d6cba1525a59abbaf795176be5d5cd190bd99cbeb01f3455cacc52bc798f3dee64ef1b041143b82554675422a69b7885ab9ed1bd518548541bbaca7b3ed1cf186d2b8377e9f61d9dcacb07631d755dd4f45c3a7afa1d5fbfbca8f4918055046f4f5a87666a1ebbb629ac553c203c024854524151a65bb64af0bbcc248bd7c627e4c8e1bf61aa5aebdff662c27bf7b04417337972a745f5dab995b96295bbf03d215abc23a9e68b9ea2c01821046b77185ebfd0db0d32822ec57d25857c63fd3a129610387e9619bd334f630c464a6a12f70f0e5557736540207716dc9c7c7a3be282b524d12439cc9a31c330a44aab703caa2a0d6accad68d0e62356f5f32e941e396a15ea2d79641de2c591a07dcc14ad97f000ef8be491b6d01eb7f0da41e84eb1957d44fb1ec63a0d44ab1edff8ad814798bbfebed13fe1efa6fc9ca08601bccffe8cac99b1402f7d60f96209534da86ac81b858cb43d1bbd883f2fca945407600d2efe8c9bf55fdb8695c3b7d67389c6dd02f0821c72282c59ac8a70fa77f81d5e7557e282633670d09ab44bfe026756699b8616c7f7fc511fe862eb2f5ef8a71ba949f2eaaf96bb020e7ceadedc65d882cf3536eb863247219d738b98204f2273e0cae94dcf811eafeac7fbec4b227ee6ab8fb3c7636d7167b7415c1d336cbec409711547ecc5452a2778b19503a07dc3ca45e8b63e4f769b8c4d38fce5e263db53191d1106281b891dff810d6864b69b9b4d4ed29b303226ff15727270169920c79e71e1b91915408c63c38851c7cf3741270887a573cf15baf5acdad5568c05a1de3b88425ceb26929a85dd9129bdc91965a52766aa4e25ca4fe8113a1949cd22652137bbd223196e04fce3a02da41ecd3e22e266b1a298001501a64b62a4daee46a8b760e98c4ef03803069606d9cab00aa0469e1df0fc0f6c83546b3deade438193a492b303b43d6db0c023ab232205c699b297488b4c9263814a2e26fd4efcdde0ed0532877341c985c3ec7290741a3c71344e7b5d432bc29e13d104143e5845da9f9769c033e3bef1902476d6217b4f76e001827ea7cfd368eec65e6c917db0d18768fe57a79ff7c4514ba5c33ee885ab3be6835da10581eccb200e74ff0a31570c15ea934e6d498f85797f14ee783af3b212202fe1dd08ee0f7ad47ce4087560c511d736ffca05a12d178f7099607e8b94593870421c95b919ebda83c3a346ef1935596fdfc6381bfccec2095abcae59b2fe9be0eb1a4846d52251b31163b85cf91c64064da6d01dbf27830b50c99d17e899509078eba0ce04c36605567749bbe0661b8efa5e08cfc10cd5f60653d045d0b0403b32d407f214d783b8421092629f0272df21105a4a04d3f503f04f7eea6315318c340db2c3fdbbf9c115dc0ccee46acf4be7f777c0a08b277dafb46f1dc29bf879a8a6dede5098db828f6b7e2a1686bc948d24aab24554aee12bc6a49c57b9a01ff51b2b8fe4906e19b3f9d1d37accf5234868f16e37fd9ef5207ebdf8ca6987425a8fc956b2e228432e6f9d72e077575a476a9e9de1afe8984739f13b9f049872c34cf2f2971f7b5ac3b27d9f91cc64c19e31ada3218ea2662f10f2297a5977706ef538ba9c0357f2c0e92e9002cc03dc7d5eedd0a89cf18904486c4ff26ceb89c14353baf305b398bd3ef5255a3584873303717e5f2e712f1ebc1c71229aa431494a3629f9ea5693286b750801a2e359a947d0eb92427ba275804374c950b50aef4611f0857778cff236e8265b5c91808c7c00c969f485c471107c435cf26bbb4b547acc3bde75f5b1314803a0859fbca716679ef1fbbbfd98460520c16f11f926f0b5f4e07c41ededf9b781a19a411361be90ef7c6730e233f07b0621e61a385f0b07154f4c11cd4d66595d802439cb360981598b39c859ce6dd68d7462f60f1a2ac37d54401c7a15f80b78948d6c3012bb11444e3ce2aa43595db976152a15c7102e68c3300391705067fe3f54ecc5eda874ce241b28467afbecd0a232fbf5b9763ced4b7d09e59189a93161d9a3db43c6e480c272765cf92bba997e92b5c693d8cc9b6a39b244d255ab25a68c0a8407815622e8cbe3a14fd6c538069d93de63e18ea61df3f59d163ddd4c913d56f2a1cf53c1280872d9999f5ed0cfbbed0a7c2d3a158cd009ec4bcadc6cb97871560954244bd901d47c59917718c3f0b0d290bf088c7685b40e1e2aa8a433343e3319713abac8d570323d6cd41aa6d316752124729eab763846ce40bf6f70e132023fc6dba79066b9c171ac841bf9789de27204d7d1f256bc47c53c97ed0430f78333c4ed08c203313840ba84633234ad615b3e3b05e4bc5696a4153cc8767b48627eb88e5666622524003e592267b6a74745a6ff37b05c5e46a6087ecd58098d435048141e9d3415511f92b53845fa5c672846b98b904ddd4a1f76cb4c65e35443f8317bfe1a0cafd155c48f258f2e0c6979403be23640beb49a6e66c8040a6a012d51c227430f8d09d5828ddfa97cb71846057a46d6eba120189eb4b9064433201dedab9943fdff18a8583c0f075da9ca904f7e1e362f94fce7cea978cbb74a5a1a619aaacef228398e61af71f4f84f2d792b71b02241a5727925932f67386392f131edec93313ab9673a841c61dc9c8d66ba930776066c7af2c9b024a1992544f8e9a3c9ddae54449dda6d695c263a1e73e9c9cd8513e11f31f84c35fd83581f1fec1db76d259e8a872f1b6ebe90b3977d85ddcd92883f629a598bd9569181ed40c7007a6178a61cb47c85f3204e08977e23c5785ea9be2b492b1b49c5b22a6f12399b07b872f810a36d3041618ff91b6426aa4f2e1d9e1021cdc2be8a6be3ea01ee0e6ffd5e8729b0774f18faf00023875a3f0da45ce52e937eb3efb94d580adf3a864cc94d48aa5bc328334bcc0ac6f8da7905c2f642d17e438de28b01e1b14bf66266ea29c0e4c3acf6a0165f85be3ba907b89ec48f4e776bae30bf4bfaf0ecdcfc99c8a52b4f01c7f652db5442dfc02b476abc9d1d767443a74d84e332a5e18b066c094a82b60c79e28415526bb603f1661a4f81ac727f467ea0ad9a59439faea492a2f5561e7c0612e31914087933928ac92da57c5cdb369e9c4ff0a2e36e493d6e345c49b11f1e758551e473f3e228a8f2d12dc06b595c699a3417d14c6c5b3c977b8fd1fee5dd9e5d8e731375ad5d3f7fb41f199c25d035b6bca9e277d3e27d10b143319e4e8ae02a7531b32990f115cebc5ba53d323f3497128843506b9b78cc41b9ae04c148b6f9da05b4804198b6168a96975811271f9e26a010030864c8830272c7a8a5fd690d00876b5af187d8a8a798de5b533a74faaa7050a30ffdd04ab82bce64c0f54b57bd666430f66723c37569d533ddc680fc971e8450bd6bb49b68bba5b5deb042aeab3eadd2e56fa93c9bae476a84a5f2ae3b6fac7617aeac250c77bb3ae41eb86398ecb7d27f016ec6d45877cf340f358a2b7cb6f9bb217f1dfa686ee3975f42f078ec7e09ae0150b37490c73c7acf43171e87397cdd85e276a135625e45b6c5b5c06e3645262618b1ab6caf13f732039bd0d6822361cb04aca5429990cb413ef4476041600da1a01f98e0b5cbf7da6436bbf71ef3f0a17b8737527869b9c82254e52b1fb1743113d765ffe4e73fdc928cac0474c6b9dc907e9972a73ac55168711e2fbb7429b2b3f6a0a082f96668abe378e4716d48fff7d6073ec29ec2a2437ffabaa3d80d4f0b7497ad4a51e374d4f4a51571436b7ca3ed10be0431070609ccc891d57d3b26718781bb8d23f96c92cdb08ceff9c957c683565c830b178b5608fdb12de82f2f574ae99bb62296925f67bf83dd94bf7b9b277c0f97899"}, 0x1800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x452041, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x9, 0x400100) ioctl$TIOCNXCL(r4, 0x540d) 22:00:30 executing program 1 (fault-call:4 fault-nth:50): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 494.435764] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 494.447833] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 494.474776] tmpfs: No value for mount option '' 22:00:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB]) [ 494.496581] FAULT_INJECTION: forcing a failure. [ 494.496581] name failslab, interval 1, probability 0, space 0, times 0 [ 494.519762] CPU: 0 PID: 23381 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 494.527705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.537307] Call Trace: [ 494.539915] dump_stack+0x22c/0x33e [ 494.543551] should_fail.cold+0xa/0x2f [ 494.547448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.552568] ? find_held_lock+0x2d/0x110 [ 494.556775] ? sctp_bind_addr_state+0x1db/0x380 [ 494.561452] __should_failslab+0x153/0x1b6 [ 494.565718] should_failslab+0x5/0xf [ 494.569467] kmem_cache_alloc_trace+0x46/0x4b0 [ 494.574070] sctp_add_bind_addr+0x77/0x370 [ 494.578313] sctp_copy_local_addr_list+0x35b/0x520 [ 494.583258] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 494.588023] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 494.593214] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 494.598412] sctp_bind_addr_copy+0xde/0x470 [ 494.602737] __sctp_connect+0x713/0xd40 [ 494.606735] ? sctp_wfree+0x960/0x960 [ 494.610658] ? lock_sock_nested+0xa6/0x110 [ 494.615126] ? mark_held_locks+0xa6/0xf0 [ 494.619204] ? __local_bh_enable_ip+0x159/0x2a0 [ 494.624377] ? sctp_asconf_mgmt+0x380/0x380 [ 494.628701] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 494.634014] ? sctp_asconf_mgmt+0x380/0x380 [ 494.638338] sctp_inet_connect+0x14b/0x1b0 [ 494.642710] __sys_connect+0x265/0x2c0 [ 494.646605] ? __ia32_sys_accept+0xb0/0xb0 [ 494.650885] ? __mutex_add_waiter+0x160/0x160 [ 494.655408] ? vfs_write+0x393/0x540 [ 494.659120] ? fput+0x2b/0x190 [ 494.662309] ? ksys_write+0x1c8/0x2a0 [ 494.666111] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 494.671485] ? trace_hardirqs_off_caller+0x6e/0x210 [ 494.676501] __x64_sys_connect+0x6f/0xb0 [ 494.680576] do_syscall_64+0xf9/0x670 [ 494.684378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.689669] RIP: 0033:0x45de59 [ 494.692861] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.715468] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 494.723179] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 494.730438] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 494.737708] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0xff00, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 494.744979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 494.752252] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:31 executing program 1 (fault-call:4 fault-nth:51): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:31 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x24) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 494.822236] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 494.893785] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 494.959319] FAULT_INJECTION: forcing a failure. [ 494.959319] name failslab, interval 1, probability 0, space 0, times 0 [ 494.973613] CPU: 0 PID: 23407 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 494.981732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.991890] Call Trace: [ 494.994548] dump_stack+0x22c/0x33e [ 494.998212] should_fail.cold+0xa/0x2f [ 495.002191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.007330] ? find_held_lock+0x2d/0x110 [ 495.011418] ? sctp_bind_addr_state+0x1db/0x380 [ 495.016126] __should_failslab+0x153/0x1b6 [ 495.020380] should_failslab+0x5/0xf [ 495.024108] kmem_cache_alloc_trace+0x46/0x4b0 [ 495.028714] sctp_add_bind_addr+0x77/0x370 [ 495.032973] sctp_copy_local_addr_list+0x35b/0x520 [ 495.037921] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 495.042705] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 495.047941] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 495.053158] sctp_bind_addr_copy+0xde/0x470 [ 495.057502] __sctp_connect+0x713/0xd40 [ 495.061505] ? sctp_wfree+0x960/0x960 [ 495.065318] ? lock_sock_nested+0xa6/0x110 [ 495.069584] ? mark_held_locks+0xa6/0xf0 [ 495.073665] ? __local_bh_enable_ip+0x159/0x2a0 [ 495.078347] ? sctp_asconf_mgmt+0x380/0x380 [ 495.082690] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 495.087902] ? sctp_asconf_mgmt+0x380/0x380 [ 495.092240] sctp_inet_connect+0x14b/0x1b0 [ 495.096492] __sys_connect+0x265/0x2c0 [ 495.100393] ? __ia32_sys_accept+0xb0/0xb0 [ 495.104648] ? __mutex_add_waiter+0x160/0x160 [ 495.109163] ? vfs_write+0x393/0x540 [ 495.112892] ? fput+0x2b/0x190 [ 495.116103] ? ksys_write+0x1c8/0x2a0 [ 495.119934] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 495.125333] ? trace_hardirqs_off_caller+0x6e/0x210 [ 495.130375] __x64_sys_connect+0x6f/0xb0 [ 495.134464] do_syscall_64+0xf9/0x670 [ 495.138292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.143493] RIP: 0033:0x45de59 [ 495.146718] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.165630] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 495.173338] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 495.180613] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 495.187890] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 495.195151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000033 [ 495.202406] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb, 0x0, 0x0, 0x8000, 0x0, 0xfffffffffffffffc]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB]) 22:00:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x342, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:31 executing program 1 (fault-call:4 fault-nth:52): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:31 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, r3, 0x309, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xc8, r3, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20040814}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 495.397461] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:31 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="687567653d616c776179732c6d706f6c2b696e7465726c656176655184fb3fbfcd41be82a3cbcde9622306e1ceb4f35db9fcb17b8ab78727d4ec03dd4304b51a9c173d2654731b98ed7c875681826fd44bfaffa53b243a7efa99da825b284a62c7c2318a44480d2c904301179e4a94451fdc60b84f417928a16a2e65ca558b894bb966586e841e2166d1644428512d2934c09a08d9bb883844c88f32e81fa0f02613747ce26a93233a7df4f66e55c40375589376ec80306cc13a50e8a7df93cf4188d997"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 495.445604] FAULT_INJECTION: forcing a failure. [ 495.445604] name failslab, interval 1, probability 0, space 0, times 0 [ 495.535126] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 495.551778] CPU: 0 PID: 23425 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 495.559711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.569079] Call Trace: [ 495.571694] dump_stack+0x22c/0x33e [ 495.575320] should_fail.cold+0xa/0x2f [ 495.579216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.584307] ? find_held_lock+0x2d/0x110 [ 495.588368] ? sctp_bind_addr_state+0x1db/0x380 [ 495.593075] __should_failslab+0x153/0x1b6 [ 495.597303] should_failslab+0x5/0xf [ 495.601007] kmem_cache_alloc_trace+0x46/0x4b0 [ 495.605601] sctp_add_bind_addr+0x77/0x370 [ 495.609828] sctp_copy_local_addr_list+0x35b/0x520 [ 495.614748] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 495.619513] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 495.624701] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 495.629898] sctp_bind_addr_copy+0xde/0x470 [ 495.634359] __sctp_connect+0x713/0xd40 [ 495.638362] ? sctp_wfree+0x960/0x960 [ 495.642164] ? lock_sock_nested+0xa6/0x110 [ 495.649283] ? mark_held_locks+0xa6/0xf0 [ 495.653347] ? __local_bh_enable_ip+0x159/0x2a0 [ 495.658003] ? sctp_asconf_mgmt+0x380/0x380 [ 495.662439] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 495.669322] ? sctp_asconf_mgmt+0x380/0x380 [ 495.674909] sctp_inet_connect+0x14b/0x1b0 [ 495.679753] __sys_connect+0x265/0x2c0 [ 495.683637] ? __ia32_sys_accept+0xb0/0xb0 [ 495.689604] ? __mutex_add_waiter+0x160/0x160 [ 495.696178] ? vfs_write+0x393/0x540 [ 495.700756] ? fput+0x2b/0x190 [ 495.703944] ? ksys_write+0x1c8/0x2a0 [ 495.707750] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 495.713388] ? trace_hardirqs_off_caller+0x6e/0x210 [ 495.719293] __x64_sys_connect+0x6f/0xb0 [ 495.724488] do_syscall_64+0xf9/0x670 [ 495.729716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.735873] RIP: 0033:0x45de59 [ 495.739690] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.758600] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 495.766309] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 495.773570] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 495.781794] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 495.789326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000034 [ 495.796593] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x344, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 495.832248] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjq']) 22:00:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:32 executing program 1 (fault-call:4 fault-nth:53): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 496.014882] tmpfs: Bad mount option mpol+interleaveQ„û?¿ÍA¾‚£ËÍéb#áδó]¹ü±{Š·‡'ÔìÝCµœ [ 496.062622] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 496.096682] FAULT_INJECTION: forcing a failure. [ 496.096682] name failslab, interval 1, probability 0, space 0, times 0 [ 496.127034] tmpfs: Bad mount option mpol+interleaveQ„û?¿ÍA¾‚£ËÍéb#áδó]¹ü±{Š·‡'ÔìÝCµœ [ 496.143562] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "usrjq" [ 496.146207] CPU: 1 PID: 23460 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 496.163534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.173002] Call Trace: [ 496.176251] dump_stack+0x22c/0x33e [ 496.179873] should_fail.cold+0xa/0x2f [ 496.183774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.189399] ? find_held_lock+0x2d/0x110 [ 496.193462] ? sctp_bind_addr_state+0x1db/0x380 [ 496.198129] __should_failslab+0x153/0x1b6 [ 496.202360] should_failslab+0x5/0xf [ 496.206067] kmem_cache_alloc_trace+0x46/0x4b0 [ 496.210751] sctp_add_bind_addr+0x77/0x370 [ 496.215073] sctp_copy_local_addr_list+0x35b/0x520 [ 496.220014] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 496.225389] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 496.231882] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 496.238120] sctp_bind_addr_copy+0xde/0x470 [ 496.243308] __sctp_connect+0x713/0xd40 [ 496.249363] ? sctp_wfree+0x960/0x960 [ 496.255080] ? lock_sock_nested+0xa6/0x110 [ 496.260877] ? mark_held_locks+0xa6/0xf0 [ 496.265710] ? __local_bh_enable_ip+0x159/0x2a0 [ 496.271329] ? sctp_asconf_mgmt+0x380/0x380 [ 496.277398] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 496.282674] ? sctp_asconf_mgmt+0x380/0x380 [ 496.287942] sctp_inet_connect+0x14b/0x1b0 [ 496.292260] __sys_connect+0x265/0x2c0 [ 496.296149] ? __ia32_sys_accept+0xb0/0xb0 [ 496.300379] ? __mutex_add_waiter+0x160/0x160 [ 496.304891] ? vfs_write+0x393/0x540 [ 496.308601] ? fput+0x2b/0x190 [ 496.311874] ? ksys_write+0x1c8/0x2a0 [ 496.315668] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 496.321029] ? trace_hardirqs_off_caller+0x6e/0x210 [ 496.326058] __x64_sys_connect+0x6f/0xb0 [ 496.330361] do_syscall_64+0xf9/0x670 [ 496.334180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.339373] RIP: 0033:0x45de59 [ 496.342564] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.366425] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 496.375363] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 496.382629] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 496.391454] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 496.400681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000035 [ 496.410267] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjq']) 22:00:33 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, &(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRESHEX]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3f, 0x0, &(0x7f0000000200), 0x100000, &(0x7f0000000340)=ANY=[@ANYBLOB='tmpfs\x00,\x00,\x00,smackfsdef=tmpfs\x00,subj_user=,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c7063723d30303030303030303030303030303030303031342c736d61636b6673726f6f745a381c91ea26c34fddad608d0a873d746d706673002c6673636f6e746578743d757365725f752c00"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x100) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x1, &(0x7f00000021c0)=""/4123, &(0x7f0000000240)=0x106d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e23, @rand_addr=0x64010102}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @local}], 0x60) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="61630615e341ee798fd8fbc9d1c5d386", 0x10) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x5) [ 496.502937] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 496.585984] tmpfs: No value for mount option '0xffffffffffffffff0xffffffffffffffff' 22:00:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x20000004cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], 0x0, 0x100}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000001c0)={0xffffffffffffffff, 0x7f, 0xb07, 0x6}) 22:00:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x358, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:33 executing program 1 (fault-call:4 fault-nth:54): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 496.635110] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "usrjq" [ 496.710874] FAULT_INJECTION: forcing a failure. [ 496.710874] name failslab, interval 1, probability 0, space 0, times 0 [ 496.726215] CPU: 0 PID: 23495 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 496.734653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.744006] Call Trace: [ 496.746610] dump_stack+0x22c/0x33e [ 496.750429] should_fail.cold+0xa/0x2f [ 496.754306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.759408] ? find_held_lock+0x2d/0x110 [ 496.763637] ? sctp_bind_addr_state+0x1db/0x380 [ 496.768306] __should_failslab+0x153/0x1b6 [ 496.772543] should_failslab+0x5/0xf [ 496.776431] kmem_cache_alloc_trace+0x46/0x4b0 [ 496.781005] sctp_add_bind_addr+0x77/0x370 [ 496.785318] sctp_copy_local_addr_list+0x35b/0x520 [ 496.790256] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 496.795210] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 496.800854] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 496.806035] sctp_bind_addr_copy+0xde/0x470 [ 496.810351] __sctp_connect+0x713/0xd40 [ 496.814328] ? sctp_wfree+0x960/0x960 [ 496.818136] ? lock_sock_nested+0xa6/0x110 [ 496.822454] ? mark_held_locks+0xa6/0xf0 [ 496.826513] ? __local_bh_enable_ip+0x159/0x2a0 [ 496.831528] ? sctp_asconf_mgmt+0x380/0x380 [ 496.836548] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 496.841730] ? sctp_asconf_mgmt+0x380/0x380 [ 496.846056] sctp_inet_connect+0x14b/0x1b0 [ 496.850284] __sys_connect+0x265/0x2c0 [ 496.854174] ? __ia32_sys_accept+0xb0/0xb0 [ 496.858497] ? __mutex_add_waiter+0x160/0x160 [ 496.862999] ? vfs_write+0x393/0x540 [ 496.866717] ? fput+0x2b/0x190 [ 496.869908] ? ksys_write+0x1c8/0x2a0 [ 496.873706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 496.879257] ? trace_hardirqs_off_caller+0x6e/0x210 [ 496.884275] __x64_sys_connect+0x6f/0xb0 [ 496.888358] do_syscall_64+0xf9/0x670 [ 496.892176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.899189] RIP: 0033:0x45de59 [ 496.902373] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.921437] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 496.930283] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 496.937543] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 496.944909] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 496.952169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000036 [ 496.959780] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:33 executing program 1 (fault-call:4 fault-nth:55): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjq']) 22:00:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x2, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) write$fb(0xffffffffffffffff, &(0x7f00000001c0)="b0bcbd73b47f", 0x6) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 497.167117] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 497.236963] FAULT_INJECTION: forcing a failure. [ 497.236963] name failslab, interval 1, probability 0, space 0, times 0 [ 497.250821] CPU: 1 PID: 23519 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 497.258752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.268129] Call Trace: [ 497.270758] dump_stack+0x22c/0x33e [ 497.274506] should_fail.cold+0xa/0x2f [ 497.278450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.283577] ? find_held_lock+0x2d/0x110 [ 497.287667] ? sctp_bind_addr_state+0x1db/0x380 [ 497.292360] __should_failslab+0x153/0x1b6 [ 497.296626] should_failslab+0x5/0xf [ 497.301335] kmem_cache_alloc_trace+0x46/0x4b0 [ 497.305924] sctp_add_bind_addr+0x77/0x370 [ 497.310162] sctp_copy_local_addr_list+0x35b/0x520 [ 497.315094] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 497.319852] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 497.325054] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 497.330402] sctp_bind_addr_copy+0xde/0x470 [ 497.334863] __sctp_connect+0x713/0xd40 [ 497.338843] ? sctp_wfree+0x960/0x960 [ 497.342640] ? lock_sock_nested+0xa6/0x110 [ 497.346888] ? mark_held_locks+0xa6/0xf0 [ 497.350965] ? __local_bh_enable_ip+0x159/0x2a0 [ 497.355642] ? sctp_asconf_mgmt+0x380/0x380 [ 497.359970] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 497.365151] ? sctp_asconf_mgmt+0x380/0x380 [ 497.369631] sctp_inet_connect+0x14b/0x1b0 [ 497.373859] __sys_connect+0x265/0x2c0 [ 497.377736] ? __ia32_sys_accept+0xb0/0xb0 [ 497.381988] ? __mutex_add_waiter+0x160/0x160 [ 497.386652] ? vfs_write+0x393/0x540 [ 497.390377] ? fput+0x2b/0x190 [ 497.393566] ? ksys_write+0x1c8/0x2a0 [ 497.397360] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 497.402714] ? trace_hardirqs_off_caller+0x6e/0x210 [ 497.407721] __x64_sys_connect+0x6f/0xb0 [ 497.411782] do_syscall_64+0xf9/0x670 [ 497.415575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.420754] RIP: 0033:0x45de59 [ 497.424456] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.443703] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 497.451405] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 497.459972] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 497.468710] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 497.477980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000037 [ 497.485527] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:34 executing program 1 (fault-call:4 fault-nth:56): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 497.524964] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "usrjq" 22:00:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x21}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0xdc4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x880, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f00000006c0)={0x3, 0x916, &(0x7f0000000580)="951b97f248d47f2aa9eb35cb6162d45cda092d6195c632dbd551c4a782254e", &(0x7f00000005c0)="f52ecb0023c9532e2cc2fc9e9891b5ca9c54dd7c0b9e3283b8ea808510e2e967625ac1db62aa07da8f4f5c929a1d16a198c69efcc010cc9a4477bd0ec73d586bd9daeb4862faf4043837374b794f4c9013d1deac929f1bf36bc14abe2f2a7b6824739c2a3a639abf27939a18d14116fea9d19821d41ef779db9b024ca5491567aba4723ba9239cfaced83077d074caf8a397e80ded983a6fb6a500d69f1f4d547363a29d341eac6d445abce82f1a701d621c37d033ea91cd83d8f0504a22c9da9735ffb7fd1397c633cae7f470faaaf8a33cf39610fa616a07d73d19", 0x1f, 0xdc}) pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000740)={0x4, 0x0, &(0x7f0000000000/0x3000)=nil}) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="0300b8a00cf220c3067d3100020000230400000000000000f6ffffffa606000000000000ffff00fffffffff2ffff0700000a00000a72d73a0501ee947a1d1170cdfa7b4d4fe85c813293ebea3dd2bd0c55b1d0aab09ff2b5041dd30b7b033840ff061174d699514f2be637a52d541edb41799df3965900000080893e5fba7274a930a7a6c181363c969e7f808489d865b33c612ee4267b261427a797d10547143f158bc7fc928e113da3cc0625621c0e737710d9f038de70c9eef77d86dba6a791fdcc1949b2588fb1128a6df714d2e1af5d72c7c9c9ac2cdfd212ce1df0aea5be90f404f6ce91c98d352210"]) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f00000001c0)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 497.588634] tmpfs: No value for mount option '0xffffffffffffffff0xffffffffffffffff' [ 497.604746] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 497.629411] FAULT_INJECTION: forcing a failure. [ 497.629411] name failslab, interval 1, probability 0, space 0, times 0 [ 497.641665] CPU: 1 PID: 23542 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 497.650207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.661195] Call Trace: [ 497.663862] dump_stack+0x22c/0x33e [ 497.667491] should_fail.cold+0xa/0x2f [ 497.671371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.676561] ? find_held_lock+0x2d/0x110 [ 497.680627] ? sctp_bind_addr_state+0x1db/0x380 [ 497.685297] __should_failslab+0x153/0x1b6 [ 497.689625] should_failslab+0x5/0xf [ 497.693339] kmem_cache_alloc_trace+0x46/0x4b0 [ 497.697930] sctp_add_bind_addr+0x77/0x370 [ 497.702164] sctp_copy_local_addr_list+0x35b/0x520 [ 497.707110] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 497.711906] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 497.717378] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 497.722593] sctp_bind_addr_copy+0xde/0x470 [ 497.726933] __sctp_connect+0x713/0xd40 [ 497.731097] ? sctp_wfree+0x960/0x960 [ 497.735294] ? lock_sock_nested+0xa6/0x110 [ 497.739546] ? mark_held_locks+0xa6/0xf0 [ 497.744249] ? __local_bh_enable_ip+0x159/0x2a0 [ 497.749540] ? sctp_asconf_mgmt+0x380/0x380 [ 497.753876] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 497.759066] ? sctp_asconf_mgmt+0x380/0x380 [ 497.763468] sctp_inet_connect+0x14b/0x1b0 [ 497.767728] __sys_connect+0x265/0x2c0 [ 497.771770] ? __ia32_sys_accept+0xb0/0xb0 [ 497.776015] ? __mutex_add_waiter+0x160/0x160 [ 497.780534] ? vfs_write+0x393/0x540 [ 497.784271] ? fput+0x2b/0x190 [ 497.787460] ? ksys_write+0x1c8/0x2a0 [ 497.791268] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 497.798813] ? trace_hardirqs_off_caller+0x6e/0x210 [ 497.806010] __x64_sys_connect+0x6f/0xb0 [ 497.811865] do_syscall_64+0xf9/0x670 [ 497.817230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.823288] RIP: 0033:0x45de59 [ 497.826544] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.845615] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 497.855190] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 497.865530] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 497.874577] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 497.883330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000038 [ 497.891264] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:34 executing program 1 (fault-call:4 fault-nth:57): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x36b, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquot']) 22:00:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x200, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x4, 0xfd, 0x4, 0x8, 0x0, 0xa, 0x10003, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext={0x401, 0x66}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x4000000000000, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x4, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:34 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="687567653d616c776179732c6d00005ba53b67d18832b9cc70896c3d696e7465726c656176658d10f3122951f39f4f3365f5fc70483e0000000000"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4008550d, &(0x7f0000000100)) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140), 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x448800, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setpipe(r0, 0x407, 0x10001) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x65, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 498.159169] FAULT_INJECTION: forcing a failure. [ 498.159169] name failslab, interval 1, probability 0, space 0, times 0 [ 498.245492] tmpfs: No value for mount option 'm' [ 498.251100] CPU: 0 PID: 23558 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 498.259908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.269800] Call Trace: [ 498.272493] dump_stack+0x22c/0x33e [ 498.276387] should_fail.cold+0xa/0x2f [ 498.280314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.285683] ? find_held_lock+0x2d/0x110 [ 498.289836] ? sctp_bind_addr_state+0x1db/0x380 [ 498.294507] __should_failslab+0x153/0x1b6 [ 498.298751] should_failslab+0x5/0xf [ 498.302464] kmem_cache_alloc_trace+0x46/0x4b0 [ 498.307047] sctp_add_bind_addr+0x77/0x370 [ 498.311281] sctp_copy_local_addr_list+0x35b/0x520 [ 498.316758] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 498.321521] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 498.327240] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 498.334415] sctp_bind_addr_copy+0xde/0x470 [ 498.338744] __sctp_connect+0x713/0xd40 [ 498.342747] ? sctp_wfree+0x960/0x960 [ 498.346819] ? lock_sock_nested+0xa6/0x110 [ 498.351058] ? mark_held_locks+0xa6/0xf0 [ 498.355726] ? __local_bh_enable_ip+0x159/0x2a0 [ 498.362487] ? sctp_asconf_mgmt+0x380/0x380 [ 498.368078] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 498.373278] ? sctp_asconf_mgmt+0x380/0x380 [ 498.377609] sctp_inet_connect+0x14b/0x1b0 [ 498.381842] __sys_connect+0x265/0x2c0 [ 498.385782] ? __ia32_sys_accept+0xb0/0xb0 [ 498.390020] ? __mutex_add_waiter+0x160/0x160 [ 498.394516] ? vfs_write+0x393/0x540 [ 498.398222] ? fput+0x2b/0x190 [ 498.402118] ? ksys_write+0x1c8/0x2a0 [ 498.405909] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 498.411264] ? trace_hardirqs_off_caller+0x6e/0x210 [ 498.417314] __x64_sys_connect+0x6f/0xb0 [ 498.421714] do_syscall_64+0xf9/0x670 [ 498.425509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.430688] RIP: 0033:0x45de59 [ 498.433868] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.452779] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 498.460496] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 498.468248] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 498.476038] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 498.483294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000039 [ 498.490899] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 498.569687] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:35 executing program 1 (fault-call:4 fault-nth:58): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 498.627465] tmpfs: No value for mount option 'm' [ 498.642864] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "usrjquot" [ 498.704713] FAULT_INJECTION: forcing a failure. [ 498.704713] name failslab, interval 1, probability 0, space 0, times 0 [ 498.719302] CPU: 0 PID: 23591 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 498.729061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.741666] Call Trace: [ 498.744290] dump_stack+0x22c/0x33e [ 498.749080] should_fail.cold+0xa/0x2f [ 498.755076] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.761616] ? find_held_lock+0x2d/0x110 [ 498.767672] ? sctp_bind_addr_state+0x1db/0x380 [ 498.774097] __should_failslab+0x153/0x1b6 [ 498.779142] should_failslab+0x5/0xf [ 498.784549] kmem_cache_alloc_trace+0x46/0x4b0 [ 498.789590] sctp_add_bind_addr+0x77/0x370 [ 498.794130] sctp_copy_local_addr_list+0x35b/0x520 [ 498.805271] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 498.811037] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 498.818741] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 498.825551] sctp_bind_addr_copy+0xde/0x470 [ 498.831376] __sctp_connect+0x713/0xd40 [ 498.836811] ? sctp_wfree+0x960/0x960 [ 498.840822] ? lock_sock_nested+0xa6/0x110 [ 498.846759] ? mark_held_locks+0xa6/0xf0 [ 498.850941] ? __local_bh_enable_ip+0x159/0x2a0 [ 498.858044] ? sctp_asconf_mgmt+0x380/0x380 [ 498.864411] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 498.870337] ? sctp_asconf_mgmt+0x380/0x380 [ 498.874710] sctp_inet_connect+0x14b/0x1b0 [ 498.879610] __sys_connect+0x265/0x2c0 [ 498.883704] ? __ia32_sys_accept+0xb0/0xb0 [ 498.887974] ? __mutex_add_waiter+0x160/0x160 [ 498.892516] ? vfs_write+0x393/0x540 [ 498.896261] ? fput+0x2b/0x190 [ 498.900232] ? ksys_write+0x1c8/0x2a0 [ 498.904266] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 498.909655] ? trace_hardirqs_off_caller+0x6e/0x210 [ 498.914843] __x64_sys_connect+0x6f/0xb0 [ 498.919044] do_syscall_64+0xf9/0x670 [ 498.922870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.928254] RIP: 0033:0x45de59 [ 498.931558] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa63f7d5b01000000000000fffffffffffdffe2100000f2ffff213e000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 498.951451] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 498.962842] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 498.970925] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 498.980311] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 498.989192] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003a [ 498.997446] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:35 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x0) 22:00:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xa, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquot']) [ 499.138858] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 22:00:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x370, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:35 executing program 1 (fault-call:4 fault-nth:59): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 499.351630] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "usrjquot" [ 499.462012] FAULT_INJECTION: forcing a failure. [ 499.462012] name failslab, interval 1, probability 0, space 0, times 0 [ 499.494157] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 499.528922] CPU: 0 PID: 23625 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 499.536956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.546686] Call Trace: [ 499.549405] dump_stack+0x22c/0x33e [ 499.554208] should_fail.cold+0xa/0x2f [ 499.558962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.564685] ? find_held_lock+0x2d/0x110 [ 499.569768] ? sctp_bind_addr_state+0x1db/0x380 [ 499.574542] __should_failslab+0x153/0x1b6 [ 499.578874] should_failslab+0x5/0xf [ 499.582763] kmem_cache_alloc_trace+0x46/0x4b0 [ 499.587457] sctp_add_bind_addr+0x77/0x370 [ 499.591714] sctp_copy_local_addr_list+0x35b/0x520 [ 499.596829] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 499.601900] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 499.607307] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 499.612781] sctp_bind_addr_copy+0xde/0x470 [ 499.619229] __sctp_connect+0x713/0xd40 [ 499.625075] ? sctp_wfree+0x960/0x960 [ 499.630402] ? lock_sock_nested+0xa6/0x110 [ 499.634929] ? mark_held_locks+0xa6/0xf0 [ 499.641945] ? __local_bh_enable_ip+0x159/0x2a0 [ 499.646709] ? sctp_asconf_mgmt+0x380/0x380 [ 499.651211] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 499.656418] ? sctp_asconf_mgmt+0x380/0x380 [ 499.660731] sctp_inet_connect+0x14b/0x1b0 [ 499.664968] __sys_connect+0x265/0x2c0 [ 499.668846] ? __ia32_sys_accept+0xb0/0xb0 [ 499.673083] ? __mutex_add_waiter+0x160/0x160 [ 499.677584] ? vfs_write+0x393/0x540 [ 499.681305] ? fput+0x2b/0x190 [ 499.684495] ? ksys_write+0x1c8/0x2a0 [ 499.688311] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 499.693688] ? trace_hardirqs_off_caller+0x6e/0x210 [ 499.698702] __x64_sys_connect+0x6f/0xb0 [ 499.702759] do_syscall_64+0xf9/0x670 [ 499.706779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.711968] RIP: 0033:0x45de59 [ 499.715158] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.735643] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 499.744916] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 499.752371] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 499.760243] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 499.767521] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003b 22:00:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquot']) 22:00:36 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="d4c27f83acfeb4ca796c3d696e746572686561d065"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) [ 499.774783] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffffe4ffff0900000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 499.841463] tmpfs: Bad mount option Ôƒ¬þ´Êyl [ 499.857033] tmpfs: Bad mount option Ôƒ¬þ´Êyl [ 499.866934] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "usrjquot" 22:00:36 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567653d616c63776179732c6d7015e36c1a6e74650400000076"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 499.892044] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x379, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota']) 22:00:36 executing program 1 (fault-call:4 fault-nth:60): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfc, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0xc53, 0x22401) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="68040000", @ANYRES16=0x0, @ANYBLOB="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"], 0x468}, 0x1, 0x0, 0x0, 0x40}, 0x4040) ioctl$USBDEVFS_DROP_PRIVILEGES(r3, 0x4004551e, &(0x7f0000000240)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000900)=ANY=[@ANYBLOB="03000000000020c3067d3112420000000000160be94b42037eff2f367d5b01000000000000ffffffffffffffe2100000f2ffff007200000000c4e5"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket$inet(0x2, 0x2, 0xfffffff9) write$binfmt_aout(r4, &(0x7f0000000940)={{0x108, 0x8, 0x1, 0x35, 0xae, 0xfffffffb, 0x3af, 0x3}, "588396aef4594bea6a77a2ccbb4ae3aab78f00b8391e04c27352c47d2e6a4f5818528e3f43dfbab9d16755950f30d43d82f04581c1f3ee632e4e8744e4d5f5e9067ecb6e2874d052b6de1430e02ede9f4c430728d2231399568051a4738695524e8c40f3427800aa3af194263a369eb8f768fff570c8f07dcd2feb44ef80302c39811d738f9c4758fc2e1aa0781e57c5d24616f0f8d3e3a58de81d3d870a7793ade35b9a663df3c3f4b43fb7049d5272c94338f4f3017bcd7ee3d23ac4f7908380969aa38b1899073c2a72f4f30e0b2688c60c56", [[], [], [], [], [], [], [], [], []]}, 0x9f4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 500.056184] tmpfs: Bad value 'alcways' for mount option 'huge' [ 500.079696] tmpfs: Bad value 'alcways' for mount option 'huge' [ 500.162878] FAULT_INJECTION: forcing a failure. [ 500.162878] name failslab, interval 1, probability 0, space 0, times 0 [ 500.195792] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 500.204219] CPU: 0 PID: 23667 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 500.215912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.225315] Call Trace: [ 500.228339] dump_stack+0x22c/0x33e [ 500.232037] should_fail.cold+0xa/0x2f [ 500.236061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.241476] ? find_held_lock+0x2d/0x110 [ 500.245609] ? sctp_bind_addr_state+0x1db/0x380 [ 500.250317] __should_failslab+0x153/0x1b6 [ 500.254585] should_failslab+0x5/0xf [ 500.258477] kmem_cache_alloc_trace+0x46/0x4b0 [ 500.263262] sctp_add_bind_addr+0x77/0x370 [ 500.267730] sctp_copy_local_addr_list+0x35b/0x520 [ 500.273915] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 500.279071] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 500.284387] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 500.289703] sctp_bind_addr_copy+0xde/0x470 [ 500.294058] __sctp_connect+0x713/0xd40 [ 500.298065] ? sctp_wfree+0x960/0x960 [ 500.301894] ? lock_sock_nested+0xa6/0x110 [ 500.306253] ? mark_held_locks+0xa6/0xf0 22:00:36 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="640fbd0973b3e5354219dd4891f05f68757b653d616c776179732c"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 500.310340] ? __local_bh_enable_ip+0x159/0x2a0 [ 500.315037] ? sctp_asconf_mgmt+0x380/0x380 [ 500.316107] tmpfs: Bad mount option d½ s³å5BÝH‘ð_hu{e [ 500.319381] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 500.319405] ? sctp_asconf_mgmt+0x380/0x380 [ 500.319419] sctp_inet_connect+0x14b/0x1b0 [ 500.319439] __sys_connect+0x265/0x2c0 [ 500.342486] ? __ia32_sys_accept+0xb0/0xb0 [ 500.346753] ? __mutex_add_waiter+0x160/0x160 [ 500.351284] ? vfs_write+0x393/0x540 [ 500.355029] ? fput+0x2b/0x190 [ 500.358245] ? ksys_write+0x1c8/0x2a0 [ 500.362079] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 500.367672] ? trace_hardirqs_off_caller+0x6e/0x210 [ 500.372718] __x64_sys_connect+0x6f/0xb0 [ 500.376808] do_syscall_64+0xf9/0x670 [ 500.380639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.385856] RIP: 0033:0x45de59 [ 500.389053] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.407961] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 500.415675] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 500.422961] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 500.430397] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 500.437664] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003c [ 500.444929] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:37 executing program 1 (fault-call:4 fault-nth:61): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 500.474730] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 500.474730] [ 500.489144] tmpfs: Bad mount option d½ s³å5BÝH‘ð_hu{e 22:00:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0xa, {0x2, 0x4e21, @broadcast}, 'veth0\x00'}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:37 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r1 = syz_mount_image$qnx6(&(0x7f0000000080)='qnx6\x00', &(0x7f00000000c0)='./file0/file0\x00', 0xffffffffffff7fff, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="f0e28dd002cfdb9eeae1bb6545463e47ad40ffe4ee040e6fab30cdd5033f00a0484f0f4f66fe116e96a68f0272a9dc4ea90a7d04996638d865e52a52bddbfb6b07647299993027e8878a5715a57a47162a55fdfe273f3a3790b68643bc00a9172f7208f047baa3efd7868b1dba091a96695a1aaa69dfe9a165c1d609846d661a5a854e22250b8ac24a2d56fa23a24071d75922ea0060b72ff99cf64c965f807a3e187d85641248dba7d661334e7df2f7", 0xb0, 0x1}, {&(0x7f0000000240)="34e3e37e0c44f72b632fc418c2bc8bcb542e34c0431a048e6cfb3f0617d000b6dcbc105adcedee87f44f9e75edf784108e4b391e7d20ddedc92c25cd4f2c10dc43e64f505f76f90051bbf71a795a1e8f8c0451e2bdeeff1bd502f06aa2446ee05670aa210731ac08e3aab8d5e407caab1f76427b8bc41a4601de5b840a8762c663e38e90e81186155478d434c3fa1cd90227511df7f379984d29965f68c1fc1800eebc0ac39f89dd380c596b2d4a986cc6397a319c64ea383c43d120", 0xbc, 0x2}, {&(0x7f0000000100)="0af398ee77ba8106c704a66c3a21e752a6ba6f841511d7bb4e66a075940da7f081f152bd45a746f53024295d8dea8ba34994ca2c", 0x34, 0x2}], 0x2, &(0x7f0000000380)={[{']'}, {'#\x82{'}, {'\''}, {}], [{@subj_type={'subj_type'}}, {@appraise='appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, '({'}}]}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup2(r0, r1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000ee00000000000000ff00", @ANYRES32=r7, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000100005ff000000000008001f00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r7], 0x50}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x2, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000017c0)={@private2, @local, @local, 0x7ff, 0x0, 0x80, 0x0, 0x1, 0xc2000002, r7}) r9 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 500.532095] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 500.583725] FAULT_INJECTION: forcing a failure. [ 500.583725] name failslab, interval 1, probability 0, space 0, times 0 [ 500.595760] CPU: 0 PID: 23698 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 500.603672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.613051] Call Trace: [ 500.615679] dump_stack+0x22c/0x33e [ 500.619445] should_fail.cold+0xa/0x2f [ 500.623372] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.628594] ? find_held_lock+0x2d/0x110 [ 500.632682] ? sctp_bind_addr_state+0x1db/0x380 [ 500.637409] __should_failslab+0x153/0x1b6 [ 500.641678] should_failslab+0x5/0xf [ 500.645425] kmem_cache_alloc_trace+0x46/0x4b0 [ 500.650033] sctp_add_bind_addr+0x77/0x370 [ 500.654320] sctp_copy_local_addr_list+0x35b/0x520 [ 500.659317] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 500.664101] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 500.669320] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 500.674549] sctp_bind_addr_copy+0xde/0x470 [ 500.678896] __sctp_connect+0x713/0xd40 [ 500.682931] ? sctp_wfree+0x960/0x960 [ 500.686758] ? lock_sock_nested+0xa6/0x110 [ 500.691024] ? mark_held_locks+0xa6/0xf0 [ 500.695110] ? __local_bh_enable_ip+0x159/0x2a0 [ 500.699797] ? sctp_asconf_mgmt+0x380/0x380 [ 500.704144] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 500.709545] ? sctp_asconf_mgmt+0x380/0x380 [ 500.713908] sctp_inet_connect+0x14b/0x1b0 [ 500.718183] __sys_connect+0x265/0x2c0 [ 500.722097] ? __ia32_sys_accept+0xb0/0xb0 [ 500.726361] ? __mutex_add_waiter+0x160/0x160 [ 500.730896] ? vfs_write+0x393/0x540 [ 500.734641] ? fput+0x2b/0x190 [ 500.737859] ? ksys_write+0x1c8/0x2a0 [ 500.741694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 500.747084] ? trace_hardirqs_off_caller+0x6e/0x210 [ 500.752127] __x64_sys_connect+0x6f/0xb0 [ 500.756311] do_syscall_64+0xf9/0x670 [ 500.760153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.765473] RIP: 0033:0x45de59 [ 500.768680] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.787597] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 500.795329] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 500.801540] qnx6: invalid mount options. [ 500.802612] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 500.802620] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 500.802627] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003d 22:00:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota']) 22:00:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3a0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 500.802634] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 500.888326] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 22:00:37 executing program 1 (fault-call:4 fault-nth:62): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 500.953997] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. [ 500.981806] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 500.981806] [ 501.008848] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 22:00:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xa00, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 501.075513] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. 22:00:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota']) [ 501.133660] FAULT_INJECTION: forcing a failure. [ 501.133660] name failslab, interval 1, probability 0, space 0, times 0 [ 501.134272] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 501.221624] CPU: 1 PID: 23730 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 501.229582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.238962] Call Trace: [ 501.241598] dump_stack+0x22c/0x33e [ 501.245267] should_fail.cold+0xa/0x2f [ 501.249199] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.254350] ? find_held_lock+0x2d/0x110 [ 501.258443] ? sctp_bind_addr_state+0x1db/0x380 [ 501.263147] __should_failslab+0x153/0x1b6 [ 501.267420] should_failslab+0x5/0xf [ 501.271159] kmem_cache_alloc_trace+0x46/0x4b0 [ 501.275785] sctp_add_bind_addr+0x77/0x370 [ 501.280054] sctp_copy_local_addr_list+0x35b/0x520 [ 501.285012] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 501.289800] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 501.295027] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 501.300251] sctp_bind_addr_copy+0xde/0x470 [ 501.304620] __sctp_connect+0x713/0xd40 [ 501.308810] ? sctp_wfree+0x960/0x960 [ 501.312649] ? lock_sock_nested+0xa6/0x110 [ 501.316928] ? mark_held_locks+0xa6/0xf0 [ 501.321019] ? __local_bh_enable_ip+0x159/0x2a0 [ 501.325718] ? sctp_asconf_mgmt+0x380/0x380 [ 501.330076] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 501.335420] ? sctp_asconf_mgmt+0x380/0x380 [ 501.339795] sctp_inet_connect+0x14b/0x1b0 [ 501.344335] __sys_connect+0x265/0x2c0 [ 501.348261] ? __ia32_sys_accept+0xb0/0xb0 [ 501.352530] ? __mutex_add_waiter+0x160/0x160 [ 501.357062] ? vfs_write+0x393/0x540 [ 501.361686] ? fput+0x2b/0x190 [ 501.364920] ? ksys_write+0x1c8/0x2a0 [ 501.368844] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 501.374241] ? trace_hardirqs_off_caller+0x6e/0x210 [ 501.379293] __x64_sys_connect+0x6f/0xb0 [ 501.383385] do_syscall_64+0xf9/0x670 [ 501.387217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.392423] RIP: 0033:0x45de59 [ 501.395638] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.414558] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:37 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hugt\x00\x00leave']) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f00000000c0)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x204100, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000100)=0xfffffffc, 0x64) 22:00:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f00000003c0)=0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000001c0)=[0x9, 0x901f, 0x4, 0x2], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000400)=0x800, 0x4) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000380)={@none}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 501.422300] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 501.429590] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 501.436880] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 501.444163] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003e [ 501.451448] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x80fe, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:38 executing program 1 (fault-call:4 fault-nth:63): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 501.548138] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 501.548138] [ 501.575573] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 501.607323] tmpfs: No value for mount option 'hugt' [ 501.609456] FAULT_INJECTION: forcing a failure. [ 501.609456] name failslab, interval 1, probability 0, space 0, times 0 [ 501.671746] CPU: 0 PID: 23763 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 501.679710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.689076] Call Trace: [ 501.691677] dump_stack+0x22c/0x33e [ 501.695302] should_fail.cold+0xa/0x2f [ 501.699185] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.704281] ? find_held_lock+0x2d/0x110 [ 501.708359] ? sctp_bind_addr_state+0x1db/0x380 [ 501.713208] __should_failslab+0x153/0x1b6 [ 501.717447] should_failslab+0x5/0xf [ 501.721179] kmem_cache_alloc_trace+0x46/0x4b0 [ 501.725793] sctp_add_bind_addr+0x77/0x370 [ 501.730038] sctp_copy_local_addr_list+0x35b/0x520 [ 501.735094] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 501.739861] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 501.745425] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 501.750620] sctp_bind_addr_copy+0xde/0x470 [ 501.754947] __sctp_connect+0x713/0xd40 [ 501.758931] ? sctp_wfree+0x960/0x960 [ 501.762731] ? lock_sock_nested+0xa6/0x110 [ 501.766979] ? mark_held_locks+0xa6/0xf0 [ 501.771042] ? __local_bh_enable_ip+0x159/0x2a0 [ 501.775709] ? sctp_asconf_mgmt+0x380/0x380 [ 501.780028] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 501.785214] ? sctp_asconf_mgmt+0x380/0x380 [ 501.789530] sctp_inet_connect+0x14b/0x1b0 [ 501.793795] __sys_connect+0x265/0x2c0 [ 501.797691] ? __ia32_sys_accept+0xb0/0xb0 [ 501.801926] ? __mutex_add_waiter+0x160/0x160 [ 501.806424] ? vfs_write+0x393/0x540 [ 501.810132] ? fput+0x2b/0x190 [ 501.813319] ? ksys_write+0x1c8/0x2a0 [ 501.817136] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 501.822513] ? trace_hardirqs_off_caller+0x6e/0x210 [ 501.827529] __x64_sys_connect+0x6f/0xb0 [ 501.831762] do_syscall_64+0xf9/0x670 [ 501.835602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.840807] RIP: 0033:0x45de59 [ 501.844002] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.862916] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 501.870622] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 501.877886] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 501.885174] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 501.892435] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003f [ 501.899693] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3aa, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 501.935129] tmpfs: No value for mount option 'hugt' 22:00:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffff86067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072c6c54b478ad5945fa9323fef0dc3a2965e806bb07bfea589bdff8d5bace15026278ad7e6abe0ea15d8cb20d2b02bd897a184eecd1b172261e53f82695a32fc48f2f67cc4c61752d61eec22fdeb4bbf65dd7dcff6b77b8a6063ed532c0fd680aa2400"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000440)={0x0, "18e313d9bff0f9b21e4095f6de168c40"}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x40, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:38 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc15, &(0x7f0000000100)=ANY=[@ANYBLOB='huge=always,mpol=interleave', @ANYBLOB="850614dd53faf4ea810dffd9c9b64172dccc2d8d287e4230cc12afbbc60ef48d4514da32dcbff8c76db83e71392a4df43f0b9b0e58d37a37fdba6bc11ea047ef290500000000000000f07fe8"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) write$snddsp(r1, &(0x7f0000000180)="6a5cf99358726bc5e3cd070ec2247d578db4f75cf11fc8059bf7f2de995a4e736dbf07d03b8955c6a49cad18b62b6c7543a054d2e3a689506f9ce803a3b67b123b09a6cb2a8cca1a7b1f7e1a098b47d16d11d78f55c9e355c28b798fd740e202af41ae1664c058ab2ef0a293b3b9efa693b82485a550a38d53bdbd60270705ec2891484b3f3758750b724435efd04662e32600fe3e6fd83677732c0f58c81ee8a10b1eb81dc497f56eba236c5e0f37fe571d6178141add0105a7089fdfc094ca4caa86fa2a4103c971cc757615035d4980a3c16314867cba7d83983053e2d4ab788c3cf88d3175d159dc80fc7ede0699de7eecaf", 0xf4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:38 executing program 1 (fault-call:4 fault-nth:64): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 502.182954] tmpfs: Bad value 'interleave…ÝSúôêÿÙɶArÜÌ-(~B0̯»ÆôEÚ2Ü¿øÇm¸>q9*Mô? ›XÓz7ýºkÁ Gï)' for mount option 'mpol' [ 502.223949] FAULT_INJECTION: forcing a failure. [ 502.223949] name failslab, interval 1, probability 0, space 0, times 0 [ 502.235540] CPU: 0 PID: 23788 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 502.243447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.252822] Call Trace: [ 502.255443] dump_stack+0x22c/0x33e [ 502.259101] should_fail.cold+0xa/0x2f [ 502.260902] tmpfs: Bad value 'interleave…ÝSúôêÿÙɶArÜÌ-(~B0̯»ÆôEÚ2Ü¿øÇm¸>q9*Mô? ›XÓz7ýºkÁ Gï)' for mount option 'mpol' [ 502.263017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.263034] ? find_held_lock+0x2d/0x110 [ 502.263049] ? sctp_bind_addr_state+0x1db/0x380 [ 502.263066] __should_failslab+0x153/0x1b6 [ 502.263081] should_failslab+0x5/0xf [ 502.263095] kmem_cache_alloc_trace+0x46/0x4b0 [ 502.263109] sctp_add_bind_addr+0x77/0x370 [ 502.263127] sctp_copy_local_addr_list+0x35b/0x520 [ 502.263142] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 502.263160] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 502.263186] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 502.275562] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 502.280315] sctp_bind_addr_copy+0xde/0x470 [ 502.280337] __sctp_connect+0x713/0xd40 [ 502.280357] ? sctp_wfree+0x960/0x960 [ 502.280371] ? lock_sock_nested+0xa6/0x110 [ 502.280393] ? mark_held_locks+0xa6/0xf0 [ 502.285260] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 502.289114] ? __local_bh_enable_ip+0x159/0x2a0 [ 502.289133] ? sctp_asconf_mgmt+0x380/0x380 [ 502.289150] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 502.289163] ? sctp_asconf_mgmt+0x380/0x380 [ 502.289180] sctp_inet_connect+0x14b/0x1b0 [ 502.391279] __sys_connect+0x265/0x2c0 [ 502.395179] ? __ia32_sys_accept+0xb0/0xb0 [ 502.399414] ? __mutex_add_waiter+0x160/0x160 [ 502.403901] ? vfs_write+0x393/0x540 [ 502.408569] ? fput+0x2b/0x190 [ 502.411750] ? ksys_write+0x1c8/0x2a0 [ 502.415560] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 502.420914] ? trace_hardirqs_off_caller+0x6e/0x210 [ 502.425928] __x64_sys_connect+0x6f/0xb0 [ 502.430013] do_syscall_64+0xf9/0x670 [ 502.433806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.438985] RIP: 0033:0x45de59 [ 502.442167] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.461067] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xc0fe, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 502.468782] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 502.476043] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 502.483315] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 502.490586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000040 [ 502.497844] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="687567653d616c776179732c6d706f6c3d696e7465726c65617665165c18f3c87db69834419bd921afb657bd7ab34263d88808974a5dc2f5456f3bf589e3198eea074d144e2f0c80c3a8c8d6cea97d4da3546a6a57cd6d69fbb59717a5e573e6b4f9f8c30f783a47a68872293f1d2c8bdc6cd00e259c70c7b426561546"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:39 executing program 1 (fault-call:4 fault-nth:65): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:39 executing program 2 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 502.643283] tmpfs: Bad value 'interleave\óÈ}¶˜4A›Ù!¯¶W½z³Bc؈—J]ÂõEo;õ‰ãŽêMN/ €Ã¨ÈÖΩ}M£TjjWÍmiûµ—¥åsæ´ùøÃx:G¦ˆr)?' for mount option 'mpol' [ 502.657148] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 502.696846] FAULT_INJECTION: forcing a failure. [ 502.696846] name failslab, interval 1, probability 0, space 0, times 0 22:00:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3b8, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 502.739027] FAULT_INJECTION: forcing a failure. [ 502.739027] name failslab, interval 1, probability 0, space 0, times 0 [ 502.759127] tmpfs: Bad value 'interleave\óÈ}¶˜4A›Ù!¯¶W½z³Bc؈—J]ÂõEo;õ‰ãŽêMN/ €Ã¨ÈÖΩ}M£TjjWÍmiûµ—¥åsæ´ùøÃx:G¦ˆr)?' for mount option 'mpol' [ 502.773888] CPU: 0 PID: 23812 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 502.781883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.791251] Call Trace: [ 502.793862] dump_stack+0x22c/0x33e [ 502.797518] should_fail.cold+0xa/0x2f [ 502.801441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.806568] ? find_held_lock+0x2d/0x110 [ 502.810656] ? sctp_bind_addr_state+0x1db/0x380 [ 502.815352] __should_failslab+0x153/0x1b6 [ 502.819611] should_failslab+0x5/0xf [ 502.823343] kmem_cache_alloc_trace+0x46/0x4b0 [ 502.828057] sctp_add_bind_addr+0x77/0x370 [ 502.832333] sctp_copy_local_addr_list+0x35b/0x520 [ 502.837288] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 502.842082] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 502.847414] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 502.852639] sctp_bind_addr_copy+0xde/0x470 [ 502.857069] __sctp_connect+0x713/0xd40 [ 502.861114] ? sctp_wfree+0x960/0x960 [ 502.865077] ? lock_sock_nested+0xa6/0x110 [ 502.869370] ? mark_held_locks+0xa6/0xf0 [ 502.873471] ? __local_bh_enable_ip+0x159/0x2a0 [ 502.878174] ? sctp_asconf_mgmt+0x380/0x380 [ 502.882530] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 502.887761] ? sctp_asconf_mgmt+0x380/0x380 [ 502.892272] sctp_inet_connect+0x14b/0x1b0 [ 502.896695] __sys_connect+0x265/0x2c0 [ 502.900617] ? __ia32_sys_accept+0xb0/0xb0 [ 502.904887] ? __mutex_add_waiter+0x160/0x160 [ 502.909534] ? vfs_write+0x393/0x540 [ 502.913277] ? fput+0x2b/0x190 [ 502.916498] ? ksys_write+0x1c8/0x2a0 [ 502.920508] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 502.925906] ? trace_hardirqs_off_caller+0x6e/0x210 [ 502.930966] __x64_sys_connect+0x6f/0xb0 [ 502.935065] do_syscall_64+0xf9/0x670 [ 502.938900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.944111] RIP: 0033:0x45de59 [ 502.947319] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.966248] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 502.973991] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 502.981290] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 502.988692] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 502.996943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000041 [ 503.004245] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 503.011561] CPU: 1 PID: 23813 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 503.019475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.028851] Call Trace: [ 503.031472] dump_stack+0x22c/0x33e [ 503.035130] should_fail.cold+0xa/0x2f [ 503.039047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 503.044176] ? lock_acquire+0x170/0x3f0 [ 503.048183] __should_failslab+0x153/0x1b6 [ 503.052442] should_failslab+0x5/0xf [ 503.056178] __kmalloc+0x2dd/0x4f0 [ 503.059743] ? __se_sys_memfd_create+0xf8/0x440 [ 503.064438] __se_sys_memfd_create+0xf8/0x440 [ 503.068959] ? memfd_file_seals_ptr+0x150/0x150 [ 503.073659] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.079062] ? trace_hardirqs_off_caller+0x6e/0x210 [ 503.084118] ? do_syscall_64+0x21/0x670 [ 503.088131] do_syscall_64+0xf9/0x670 [ 503.092047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.097254] RIP: 0033:0x45de59 [ 503.100458] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.119371] RSP: 002b:00007fb706b72a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 503.127078] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000045de59 22:00:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="607567653d516c65ff0100007665"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_unlink(&(0x7f0000000080)='#\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 503.134339] RDX: 00007fb706b72ae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 503.141605] RBP: 0000000000000000 R08: 00007fb706b72ad8 R09: 0000000000000000 [ 503.148872] R10: 00007fb706b72adc R11: 0000000000000246 R12: 0000000000000000 [ 503.156145] R13: 0000000020000100 R14: 0000000020000280 R15: 00000000200004c0 [ 503.185611] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:39 executing program 2 (fault-call:6 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:39 executing program 1 (fault-call:4 fault-nth:66): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 503.331424] tmpfs: Bad mount option `uge 22:00:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000010020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) accept$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f00000001c0)=0x6e) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x51034b251b9d3afb, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x2, @perf_config_ext, 0x0, 0x1000000002, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 503.384863] tmpfs: Bad mount option `uge [ 503.400984] FAULT_INJECTION: forcing a failure. [ 503.400984] name failslab, interval 1, probability 0, space 0, times 0 [ 503.438536] CPU: 0 PID: 23837 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 503.446475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.448478] FAULT_INJECTION: forcing a failure. [ 503.448478] name failslab, interval 1, probability 0, space 0, times 0 [ 503.456917] Call Trace: [ 503.456951] dump_stack+0x22c/0x33e [ 503.456981] should_fail.cold+0xa/0x2f [ 503.457002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 503.457021] ? lock_acquire+0x170/0x3f0 [ 503.457045] __should_failslab+0x153/0x1b6 [ 503.457063] should_failslab+0x5/0xf [ 503.457080] kmem_cache_alloc+0x2b1/0x4a0 [ 503.457107] ? __alloc_fd+0x2ab/0x590 [ 503.504458] ? shmem_destroy_callback+0xb0/0xb0 [ 503.509191] shmem_alloc_inode+0x18/0x40 [ 503.513276] ? shmem_destroy_callback+0xb0/0xb0 [ 503.518059] alloc_inode+0x5d/0x180 [ 503.521779] new_inode+0x1d/0xf0 [ 503.525159] shmem_get_inode+0x96/0x8d0 [ 503.529140] __shmem_file_setup.part.0+0x7a/0x2b0 [ 503.534015] shmem_file_setup+0x61/0x90 [ 503.538166] __se_sys_memfd_create+0x26b/0x440 [ 503.542934] ? memfd_file_seals_ptr+0x150/0x150 [ 503.547711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.553160] ? trace_hardirqs_off_caller+0x6e/0x210 [ 503.558206] ? do_syscall_64+0x21/0x670 [ 503.562220] do_syscall_64+0xf9/0x670 [ 503.566145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.571345] RIP: 0033:0x45de59 [ 503.574549] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.594008] RSP: 002b:00007fb706b72a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 503.601721] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000045de59 [ 503.608986] RDX: 00007fb706b72ae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 503.616245] RBP: 0000000000000000 R08: 00007fb706b72ad8 R09: 0000000000000000 [ 503.623507] R10: 00007fb706b72adc R11: 0000000000000246 R12: 0000000000000000 [ 503.630767] R13: 0000000020000100 R14: 0000000020000280 R15: 00000000200004c0 22:00:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000280)={{0x5, 0x1, 0x3, 0x3, '\x00', 0x5}, 0x1, [0xe1, 0x2, 0x100000000, 0x8, 0x1, 0x8001, 0x3, 0x2, 0x1f, 0x10000, 0x6, 0x9, 0x6, 0xb292, 0x400, 0x9, 0x3, 0x101, 0xc2d, 0x7fffffff, 0x2, 0x1f, 0xfffffffffffffffb, 0x8000, 0x10000, 0x9, 0xffffffffffffffe0, 0x7, 0x0, 0x7, 0x3, 0x3, 0x1f, 0x2, 0x5, 0x5, 0x5, 0x0, 0x1c1, 0x4, 0x4, 0x2, 0x4, 0x0, 0x0, 0x40, 0x5, 0x8, 0x0, 0x4, 0x1, 0x6, 0x5, 0x825a984, 0x0, 0xffffffffffff8000, 0x7, 0x2, 0x7, 0x9, 0x5, 0x2, 0x3, 0x5, 0x7, 0x4, 0x158f, 0x3, 0x7f, 0x7, 0x2, 0x7, 0x3d, 0x3, 0xffffffffffffffff, 0x7fffffff, 0x3, 0x0, 0x8, 0x7, 0x216a3a73, 0xe165, 0x4, 0x41d65b4d, 0x4, 0x5, 0xffff, 0x24, 0xe878, 0x3, 0x6, 0x7fff, 0x10001, 0x6, 0x8000, 0x8, 0xa, 0x341, 0x400, 0x1b, 0x1, 0x1f, 0x9, 0x0, 0x8, 0x9, 0x2, 0x0, 0x4, 0x6, 0x1, 0x100, 0x2, 0x10000, 0xc8e, 0x80, 0x5a69, 0xf19, 0x8001, 0x9, 0x7, 0x9f, 0x8, 0x494a1ef6, 0x9, 0xfffffffffffffffe, 0x7, 0x4ee5]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000880)={0x0, 0xfffffff7, 0x0, 0xb81, 0x8}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="687567653d616c776179732c6d706f6c3d696e7465726cf3bb4333cf800658f1caca5ca04517defa860e3c5d3b90c064436a4166d6213ad94377fc7c31d8395d88bdbaf4c832f712bae11bdd707126f770b7e5dc0000000000", @ANYRES32, @ANYRESDEC, @ANYBLOB="760d96f45241173f1d7d04f945a510a4dcaf90d97643dd9f0b184366c2dccb19db91b67ffff56e176ae17cd01d3667c027a56c77bd068c0b3e889a4f5dc9ac6b2e1821aeb8c1d50961b87b115c70750cfe6eae1f2a32f1b49d02d6fcd655f8d04d18e972f3444fdaac8a4f3c3d30b9392b421c1806bf28653ca2e9f0ed48c1b36f55e7a9ae873f6381bef6303c50998b6328c013ee637990953af6804ad4d364311120ea", @ANYRESHEX=r0]) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000007c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000780)={&(0x7f00000000c0)={0x88, 0x5, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x88}}, 0x41) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x2e0e) read(r1, &(0x7f0000000800)=""/125, 0x7d) r3 = dup(r2) connect$l2tp6(r0, &(0x7f0000000900)={0xa, 0x0, 0x8, @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 503.642198] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 503.717552] CPU: 0 PID: 23841 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 503.725532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.734908] Call Trace: [ 503.737541] dump_stack+0x22c/0x33e [ 503.741202] should_fail.cold+0xa/0x2f [ 503.745125] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 503.750258] ? find_held_lock+0x2d/0x110 [ 503.754358] ? sctp_bind_addr_state+0x1db/0x380 [ 503.759070] __should_failslab+0x153/0x1b6 [ 503.763338] should_failslab+0x5/0xf 22:00:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3c9, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 503.767082] kmem_cache_alloc_trace+0x46/0x4b0 [ 503.771701] sctp_add_bind_addr+0x77/0x370 [ 503.775970] sctp_copy_local_addr_list+0x35b/0x520 [ 503.781141] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 503.785934] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 503.791173] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 503.797181] sctp_bind_addr_copy+0xde/0x470 [ 503.801545] __sctp_connect+0x713/0xd40 [ 503.806273] ? sctp_wfree+0x960/0x960 [ 503.810413] ? lock_sock_nested+0xa6/0x110 [ 503.814678] ? mark_held_locks+0xa6/0xf0 [ 503.818766] ? __local_bh_enable_ip+0x159/0x2a0 [ 503.819791] tmpfs: Bad value 'interló»C3Ï€XñÊÊ\ EÞú†<];ÀdCjAfÖ!:ÙCwü|1Ø9]ˆ½ºôÈ2÷ºáÝpq&÷p·åÜ' for mount option 'mpol' [ 503.823537] ? sctp_asconf_mgmt+0x380/0x380 [ 503.823558] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 503.823576] ? sctp_asconf_mgmt+0x380/0x380 [ 503.823589] sctp_inet_connect+0x14b/0x1b0 [ 503.823606] __sys_connect+0x265/0x2c0 [ 503.823618] ? __ia32_sys_accept+0xb0/0xb0 [ 503.823635] ? __mutex_add_waiter+0x160/0x160 [ 503.823653] ? vfs_write+0x393/0x540 [ 503.823667] ? fput+0x2b/0x190 [ 503.823679] ? ksys_write+0x1c8/0x2a0 [ 503.823696] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.823711] ? trace_hardirqs_off_caller+0x6e/0x210 [ 503.823726] __x64_sys_connect+0x6f/0xb0 [ 503.823747] do_syscall_64+0xf9/0x670 [ 503.894992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.900208] RIP: 0033:0x45de59 22:00:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfc00, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 503.903428] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.922361] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 503.930095] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 503.937389] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 503.944689] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 503.951977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000042 [ 503.959269] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:40 executing program 2 (fault-call:6 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:40 executing program 1 (fault-call:4 fault-nth:67): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 504.158198] FAULT_INJECTION: forcing a failure. [ 504.158198] name failslab, interval 1, probability 0, space 0, times 0 [ 504.179601] FAULT_INJECTION: forcing a failure. [ 504.179601] name failslab, interval 1, probability 0, space 0, times 0 [ 504.213233] CPU: 0 PID: 23872 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 504.221186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.230559] Call Trace: [ 504.233178] dump_stack+0x22c/0x33e [ 504.236891] should_fail.cold+0xa/0x2f [ 504.240804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 504.245920] ? find_held_lock+0x2d/0x110 [ 504.249982] ? sctp_bind_addr_state+0x1db/0x380 [ 504.254656] __should_failslab+0x153/0x1b6 [ 504.258885] should_failslab+0x5/0xf [ 504.263038] kmem_cache_alloc_trace+0x46/0x4b0 [ 504.267630] sctp_add_bind_addr+0x77/0x370 [ 504.271856] sctp_copy_local_addr_list+0x35b/0x520 [ 504.276792] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 504.281540] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 504.286733] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 504.291927] sctp_bind_addr_copy+0xde/0x470 [ 504.296243] __sctp_connect+0x713/0xd40 [ 504.300231] ? sctp_wfree+0x960/0x960 [ 504.304041] ? lock_sock_nested+0xa6/0x110 [ 504.308291] ? mark_held_locks+0xa6/0xf0 [ 504.312351] ? __local_bh_enable_ip+0x159/0x2a0 [ 504.317011] ? sctp_asconf_mgmt+0x380/0x380 [ 504.321358] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 504.326564] ? sctp_asconf_mgmt+0x380/0x380 [ 504.330888] sctp_inet_connect+0x14b/0x1b0 [ 504.335122] __sys_connect+0x265/0x2c0 [ 504.339002] ? __ia32_sys_accept+0xb0/0xb0 [ 504.343232] ? __mutex_add_waiter+0x160/0x160 [ 504.347725] ? vfs_write+0x393/0x540 [ 504.351430] ? fput+0x2b/0x190 [ 504.354707] ? ksys_write+0x1c8/0x2a0 [ 504.358504] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 504.363889] ? trace_hardirqs_off_caller+0x6e/0x210 [ 504.368919] __x64_sys_connect+0x6f/0xb0 [ 504.372990] do_syscall_64+0xf9/0x670 [ 504.376795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.381979] RIP: 0033:0x45de59 [ 504.385166] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.404407] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 504.412118] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 504.419394] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 504.426766] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 504.434317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000043 [ 504.441631] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 504.492284] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 504.504130] CPU: 0 PID: 23871 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 [ 504.512067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.522679] Call Trace: [ 504.525310] dump_stack+0x22c/0x33e [ 504.528989] should_fail.cold+0xa/0x2f [ 504.533524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 504.538663] ? find_held_lock+0x2d/0x110 [ 504.542760] __should_failslab+0x153/0x1b6 [ 504.547040] should_failslab+0x5/0xf [ 504.550790] kmem_cache_alloc+0x2b1/0x4a0 [ 504.554977] selinux_inode_alloc_security+0xe6/0x2d0 [ 504.560118] security_inode_alloc+0x67/0xc0 [ 504.564474] inode_init_always+0x5a3/0xb70 [ 504.568732] alloc_inode+0x7a/0x180 [ 504.572365] new_inode+0x1d/0xf0 [ 504.575728] shmem_get_inode+0x96/0x8d0 [ 504.579735] __shmem_file_setup.part.0+0x7a/0x2b0 [ 504.584600] shmem_file_setup+0x61/0x90 [ 504.588583] __se_sys_memfd_create+0x26b/0x440 [ 504.593302] ? memfd_file_seals_ptr+0x150/0x150 [ 504.597975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 504.603359] ? trace_hardirqs_off_caller+0x6e/0x210 [ 504.608387] ? do_syscall_64+0x21/0x670 [ 504.612367] do_syscall_64+0xf9/0x670 [ 504.616170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.621351] RIP: 0033:0x45de59 [ 504.624537] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.643446] RSP: 002b:00007fb706b72a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 504.651249] RAX: ffffffffffffffda RBX: 0000000020000280 RCX: 000000000045de59 [ 504.658539] RDX: 00007fb706b72ae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 504.665809] RBP: 0000000000000000 R08: 00007fb706b72ad8 R09: 0000000000000000 [ 504.673090] R10: 00007fb706b72adc R11: 0000000000000246 R12: 0000000000000000 [ 504.680746] R13: 0000000020000100 R14: 0000000020000280 R15: 00000000200004c0 [ 504.708252] tmpfs: Bad value 'interló»C3Ï€XñÊÊ\ EÞú†<];ÀdCjAfÖ!:ÙCwü|1Ø9]ˆ½ºôÈ2÷ºáÝpq&÷p·åÜ' for mount option 'mpol' 22:00:41 executing program 1 (fault-call:4 fault-nth:68): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 504.785946] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3d8, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 504.877704] FAULT_INJECTION: forcing a failure. [ 504.877704] name failslab, interval 1, probability 0, space 0, times 0 22:00:41 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567653d616c776105000000706f6c3d696e7465726c65617665"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x452480, 0x0) [ 504.987845] CPU: 1 PID: 23887 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 504.995798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.005184] Call Trace: [ 505.007836] dump_stack+0x22c/0x33e [ 505.008372] tmpfs: Bad value 'alwa' for mount option 'huge' [ 505.011485] should_fail.cold+0xa/0x2f [ 505.011510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.011526] ? find_held_lock+0x2d/0x110 [ 505.011543] ? sctp_bind_addr_state+0x1db/0x380 22:00:41 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567653d616c77617900800000000000007b7465726c65617665"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 505.011561] __should_failslab+0x153/0x1b6 [ 505.011576] should_failslab+0x5/0xf [ 505.011595] kmem_cache_alloc_trace+0x46/0x4b0 [ 505.028189] tmpfs: Bad value 'alwa' for mount option 'huge' [ 505.030452] sctp_add_bind_addr+0x77/0x370 [ 505.030475] sctp_copy_local_addr_list+0x35b/0x520 [ 505.030499] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 505.030517] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 505.030539] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 505.077761] sctp_bind_addr_copy+0xde/0x470 [ 505.082107] __sctp_connect+0x713/0xd40 [ 505.086089] ? sctp_wfree+0x960/0x960 [ 505.089900] ? lock_sock_nested+0xa6/0x110 [ 505.094161] ? mark_held_locks+0xa6/0xf0 [ 505.098238] ? __local_bh_enable_ip+0x159/0x2a0 [ 505.102917] ? sctp_asconf_mgmt+0x380/0x380 [ 505.107243] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 505.112453] ? sctp_asconf_mgmt+0x380/0x380 [ 505.116768] sctp_inet_connect+0x14b/0x1b0 [ 505.121016] __sys_connect+0x265/0x2c0 [ 505.124908] ? __ia32_sys_accept+0xb0/0xb0 [ 505.129139] ? __mutex_add_waiter+0x160/0x160 [ 505.133632] ? vfs_write+0x393/0x540 [ 505.137338] ? fput+0x2b/0x190 [ 505.140548] ? ksys_write+0x1c8/0x2a0 [ 505.144343] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 505.149707] ? trace_hardirqs_off_caller+0x6e/0x210 [ 505.154715] __x64_sys_connect+0x6f/0xb0 [ 505.158807] do_syscall_64+0xf9/0x670 [ 505.162617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.167811] RIP: 0033:0x45de59 22:00:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 505.171012] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.189904] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 505.197608] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 505.204870] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 505.212136] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 505.219401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000044 [ 505.226698] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfe80, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 505.279885] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 505.318099] tmpfs: Bad value 'alway' for mount option 'huge' [ 505.337344] tmpfs: Bad value 'alway' for mount option 'huge' 22:00:41 executing program 1 (fault-call:4 fault-nth:69): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:42 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) chdir(&(0x7f0000000080)='./file0\x00') [ 505.429371] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000001c0)={0x355b}, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000240)={[0x3]}, 0x8, 0x80000) sendto$ax25(r3, &(0x7f0000000480)="ef3ab0f7362c14a3494f1c9753c8647810d659c74b50ffcfadf60b3120362518457014a6f79a90992e1aff44bbc3baac2fc918678ba59fd91ab99e17014f5c5f5b49ec48101d823d2adfc1d6e4c8e1bf46d6c09032bf3deead253961c2c9920cb121ca903ed6d72b23c5f57638ca943d53d097a7cd6352e7e259d89b68849cdc08fbed552c4884085510947d580c0ffb1b215d955a5b95f6bb468ab6b7c23e2d6eeda4005fdb00"/182, 0xb6, 0x4000010, &(0x7f0000000540)={{0x3, @null, 0x7}, [@bcast, @null, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x500, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 505.535810] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 505.590666] FAULT_INJECTION: forcing a failure. [ 505.590666] name failslab, interval 1, probability 0, space 0, times 0 [ 505.628992] CPU: 0 PID: 23925 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 505.636930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.646501] Call Trace: [ 505.649565] dump_stack+0x22c/0x33e [ 505.653233] should_fail.cold+0xa/0x2f [ 505.657469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.662594] ? find_held_lock+0x2d/0x110 [ 505.666686] ? sctp_bind_addr_state+0x1db/0x380 [ 505.671389] __should_failslab+0x153/0x1b6 [ 505.675653] should_failslab+0x5/0xf [ 505.679399] kmem_cache_alloc_trace+0x46/0x4b0 [ 505.684011] sctp_add_bind_addr+0x77/0x370 [ 505.688508] sctp_copy_local_addr_list+0x35b/0x520 [ 505.693480] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 505.699429] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 505.704672] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 505.709906] sctp_bind_addr_copy+0xde/0x470 [ 505.714316] __sctp_connect+0x713/0xd40 [ 505.718442] ? sctp_wfree+0x960/0x960 [ 505.722279] ? lock_sock_nested+0xa6/0x110 [ 505.726558] ? mark_held_locks+0xa6/0xf0 [ 505.730656] ? __local_bh_enable_ip+0x159/0x2a0 [ 505.735363] ? sctp_asconf_mgmt+0x380/0x380 [ 505.739718] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 505.744948] ? sctp_asconf_mgmt+0x380/0x380 [ 505.749309] sctp_inet_connect+0x14b/0x1b0 [ 505.753572] __sys_connect+0x265/0x2c0 [ 505.757490] ? __ia32_sys_accept+0xb0/0xb0 [ 505.761756] ? __mutex_add_waiter+0x160/0x160 [ 505.766413] ? vfs_write+0x393/0x540 [ 505.770153] ? fput+0x2b/0x190 [ 505.773373] ? ksys_write+0x1c8/0x2a0 [ 505.777207] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 505.782600] ? trace_hardirqs_off_caller+0x6e/0x210 [ 505.787658] __x64_sys_connect+0x6f/0xb0 [ 505.792454] do_syscall_64+0xf9/0x670 [ 505.796300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.801515] RIP: 0033:0x45de59 [ 505.804732] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.823661] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 505.831402] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 22:00:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:42 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)={0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 505.838696] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 505.845993] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 505.853286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000045 [ 505.860568] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 505.953375] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x600, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:42 executing program 1 (fault-call:4 fault-nth:70): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 506.126772] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfec0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 506.222794] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x840080, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 506.300435] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x1fd, 0x0, 0x0, 0x1000, &(0x7f0000035000/0x1000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000060400000000000000f6fffff7a2067d5b01000000000000ffffffffffffffe2100000f2ffff070000f600000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x68ae, 0x2, 0x7fff, 0x1, r4}, &(0x7f0000001480)=0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0xab66ba140105b9f, 0x0, 0xffffffff, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000380)={{0x0, 0x7f, 0xffffffffffffffff, 0x52, 0x40, 0x0, 0x8, 0x7, 0x7fffffff, 0x11888, 0x22d, 0x0, 0x9, 0x6, 0x8}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000480)={0x0, r5, "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", "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"}) [ 506.357565] FAULT_INJECTION: forcing a failure. [ 506.357565] name failslab, interval 1, probability 0, space 0, times 0 [ 506.390328] CPU: 1 PID: 23967 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 506.398274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.407646] Call Trace: [ 506.410299] dump_stack+0x22c/0x33e [ 506.413951] should_fail.cold+0xa/0x2f [ 506.417864] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 506.422968] ? find_held_lock+0x2d/0x110 [ 506.427027] ? sctp_bind_addr_state+0x1db/0x380 [ 506.431695] __should_failslab+0x153/0x1b6 [ 506.435925] should_failslab+0x5/0xf [ 506.439630] kmem_cache_alloc_trace+0x46/0x4b0 [ 506.444220] sctp_add_bind_addr+0x77/0x370 [ 506.448461] sctp_copy_local_addr_list+0x35b/0x520 [ 506.453381] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 506.458130] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 506.463317] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 506.468496] sctp_bind_addr_copy+0xde/0x470 [ 506.472812] __sctp_connect+0x713/0xd40 [ 506.477766] ? sctp_wfree+0x960/0x960 [ 506.481554] ? lock_sock_nested+0xa6/0x110 [ 506.485803] ? mark_held_locks+0xa6/0xf0 [ 506.489866] ? __local_bh_enable_ip+0x159/0x2a0 [ 506.494536] ? sctp_asconf_mgmt+0x380/0x380 [ 506.498878] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 506.504065] ? sctp_asconf_mgmt+0x380/0x380 [ 506.508411] sctp_inet_connect+0x14b/0x1b0 [ 506.512642] __sys_connect+0x265/0x2c0 [ 506.516518] ? __ia32_sys_accept+0xb0/0xb0 [ 506.520744] ? __mutex_add_waiter+0x160/0x160 [ 506.525229] ? vfs_write+0x393/0x540 [ 506.528931] ? fput+0x2b/0x190 [ 506.532110] ? ksys_write+0x1c8/0x2a0 [ 506.535903] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 506.541256] ? trace_hardirqs_off_caller+0x6e/0x210 [ 506.546281] __x64_sys_connect+0x6f/0xb0 [ 506.550468] do_syscall_64+0xf9/0x670 [ 506.554283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.559484] RIP: 0033:0x45de59 [ 506.562677] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.581662] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 506.589422] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 506.596685] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 506.604004] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 506.611471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000046 [ 506.618759] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 506.682779] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 506.697672] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:43 executing program 1 (fault-call:4 fault-nth:71): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x700, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 506.818110] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 506.857456] FAULT_INJECTION: forcing a failure. 22:00:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x3000, 0x80000001, 0x9, 0x26, 0x0, 0x101, 0x10002000000000, 0xff, 0x0, 0x9, 0x4, 0x20, 0xffffffff, 0x4, 0x8, 0x1], 0xd000, 0x4810}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDCTL_FM_LOAD_INSTR(0xffffffffffffffff, 0x40285107) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 506.857456] name failslab, interval 1, probability 0, space 0, times 0 [ 506.911882] CPU: 0 PID: 24006 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 506.919834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.929268] Call Trace: [ 506.931892] dump_stack+0x22c/0x33e [ 506.935555] should_fail.cold+0xa/0x2f [ 506.939484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 506.944605] ? find_held_lock+0x2d/0x110 [ 506.948691] ? sctp_bind_addr_state+0x1db/0x380 [ 506.953385] __should_failslab+0x153/0x1b6 [ 506.957640] should_failslab+0x5/0xf 22:00:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:43 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x1, 0x0) semtimedop(r2, &(0x7f0000000100)=[{0x0, 0x0, 0x1000}, {}], 0x2, &(0x7f0000000140)) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000080)=0x5) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 506.961373] kmem_cache_alloc_trace+0x46/0x4b0 [ 506.965975] sctp_add_bind_addr+0x77/0x370 [ 506.970322] sctp_copy_local_addr_list+0x35b/0x520 [ 506.975282] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 506.980058] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 506.985274] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 506.990491] sctp_bind_addr_copy+0xde/0x470 [ 506.994859] __sctp_connect+0x713/0xd40 [ 506.998872] ? sctp_wfree+0x960/0x960 [ 507.002802] ? lock_sock_nested+0xa6/0x110 [ 507.007072] ? mark_held_locks+0xa6/0xf0 [ 507.011154] ? __local_bh_enable_ip+0x159/0x2a0 [ 507.015857] ? sctp_asconf_mgmt+0x380/0x380 [ 507.020203] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 507.025415] ? sctp_asconf_mgmt+0x380/0x380 [ 507.029756] sctp_inet_connect+0x14b/0x1b0 [ 507.034020] __sys_connect+0x265/0x2c0 [ 507.037933] ? __ia32_sys_accept+0xb0/0xb0 [ 507.042191] ? __mutex_add_waiter+0x160/0x160 [ 507.046710] ? vfs_write+0x393/0x540 [ 507.050444] ? fput+0x2b/0x190 [ 507.053654] ? ksys_write+0x1c8/0x2a0 22:00:43 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) bind$bt_hci(r1, &(0x7f00000001c0)={0x1f, 0x3, 0x4}, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@const={0x10, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x61, 0x5f, 0x30, 0x61, 0x30, 0x6f]}}, &(0x7f00000000c0)=""/155, 0x2c, 0x9b, 0x1}, 0x20) [ 507.058081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 507.063465] ? trace_hardirqs_off_caller+0x6e/0x210 [ 507.069544] __x64_sys_connect+0x6f/0xb0 [ 507.073617] do_syscall_64+0xf9/0x670 [ 507.077418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.082610] RIP: 0033:0x45de59 [ 507.085823] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.105020] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 507.112849] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 507.120114] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 507.127402] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 507.134663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000047 [ 507.141921] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xff00, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:43 executing program 1 (fault-call:4 fault-nth:72): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000001c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb, 0x5], 0x0, 0x180}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x12400, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 507.269189] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 507.318197] tmpfs: No value for mount option 'ame_offset:16' [ 507.332397] FAULT_INJECTION: forcing a failure. [ 507.332397] name failslab, interval 1, probability 0, space 0, times 0 [ 507.363648] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 507.383879] CPU: 1 PID: 24035 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 507.391814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.401171] Call Trace: [ 507.403781] dump_stack+0x22c/0x33e [ 507.407407] should_fail.cold+0xa/0x2f [ 507.411292] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 507.416389] ? find_held_lock+0x2d/0x110 [ 507.420443] ? sctp_bind_addr_state+0x1db/0x380 [ 507.425112] __should_failslab+0x153/0x1b6 [ 507.429355] should_failslab+0x5/0xf [ 507.433068] kmem_cache_alloc_trace+0x46/0x4b0 [ 507.437645] sctp_add_bind_addr+0x77/0x370 [ 507.441890] sctp_copy_local_addr_list+0x35b/0x520 [ 507.446816] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 507.451570] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 507.456782] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 507.461988] sctp_bind_addr_copy+0xde/0x470 [ 507.466312] __sctp_connect+0x713/0xd40 [ 507.470409] ? sctp_wfree+0x960/0x960 [ 507.474206] ? lock_sock_nested+0xa6/0x110 [ 507.478463] ? mark_held_locks+0xa6/0xf0 [ 507.482521] ? __local_bh_enable_ip+0x159/0x2a0 [ 507.487214] ? sctp_asconf_mgmt+0x380/0x380 [ 507.491529] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 507.496732] ? sctp_asconf_mgmt+0x380/0x380 [ 507.501043] sctp_inet_connect+0x14b/0x1b0 [ 507.505271] __sys_connect+0x265/0x2c0 [ 507.509186] ? __ia32_sys_accept+0xb0/0xb0 [ 507.513423] ? __mutex_add_waiter+0x160/0x160 [ 507.517917] ? vfs_write+0x393/0x540 [ 507.521625] ? fput+0x2b/0x190 [ 507.524903] ? ksys_write+0x1c8/0x2a0 [ 507.528701] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 507.534062] ? trace_hardirqs_off_caller+0x6e/0x210 [ 507.539076] __x64_sys_connect+0x6f/0xb0 [ 507.543132] do_syscall_64+0xf9/0x670 [ 507.546929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.552109] RIP: 0033:0x45de59 22:00:44 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 507.555300] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.574197] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 507.581923] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 507.589185] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 507.596445] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 507.603707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000048 [ 507.610970] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xbc1, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x35) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000040)={'gre0\x00', {0x2, 0x0, @remote}}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x3}, 0x4) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000070, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) [ 507.639509] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:44 executing program 1 (fault-call:4 fault-nth:73): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 507.751915] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x5, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 507.812415] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 507.854632] audit: type=1400 audit(1603231244.367:49): avc: denied { node_bind } for pid=24055 comm="syz-executor.3" saddr=fe80:: scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 507.919077] FAULT_INJECTION: forcing a failure. [ 507.919077] name failslab, interval 1, probability 0, space 0, times 0 22:00:44 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567653d616f6c3de96e7465726c656176eae1811ac668972bed"]) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4c2001, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x100, 0x0, 0x1, 0x5}, &(0x7f0000000100)=0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000300)={0x1, 0x0, 0x1000, 0x6f, &(0x7f0000000240)="bab0a4506e9c89afb14db66325a320920b299d99b94f13993c574e0c6a4fb326251894285a89ff733b88c9f437860b1246143979edebda34fb04b9da18141a42ba31b034a98720dda1b6c1358d11a44121a36d274ef75a3a8e3824ab6566393a39736589c8ab0dc20bda122a55c51c", 0x15, 0x0, &(0x7f00000002c0)="5ae6a552dfcf9bc46dc9816ce36104c0620c46a5d4"}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000180)={'erspan0\x00', 0x0, 0x10, 0x8, 0x6, 0x4, {{0x16, 0x4, 0x1, 0x8, 0x58, 0x67, 0x0, 0x3, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@rr={0x7, 0x17, 0x9b, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @empty, @local, @private=0xa010101]}, @rr={0x7, 0x1f, 0xa8, [@dev={0xac, 0x14, 0x14, 0x20}, @broadcast, @private=0xa010101, @remote, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x43}]}, @timestamp={0x44, 0xc, 0x5d, 0x0, 0x4, [0xfff, 0x1f]}]}}}}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0xa00, 0x0) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000380)=0x7) [ 507.963467] audit: type=1400 audit(1603231244.397:50): avc: denied { name_connect } for pid=24055 comm="syz-executor.3" dest=20000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 507.988289] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 508.003608] CPU: 1 PID: 24075 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 508.011550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.020919] Call Trace: [ 508.023533] dump_stack+0x22c/0x33e [ 508.027182] should_fail.cold+0xa/0x2f [ 508.031086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.036201] ? find_held_lock+0x2d/0x110 [ 508.040285] ? sctp_bind_addr_state+0x1db/0x380 [ 508.044978] __should_failslab+0x153/0x1b6 [ 508.049233] should_failslab+0x5/0xf [ 508.052965] kmem_cache_alloc_trace+0x46/0x4b0 [ 508.057577] sctp_add_bind_addr+0x77/0x370 [ 508.061836] sctp_copy_local_addr_list+0x35b/0x520 [ 508.066796] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 508.068449] audit: type=1400 audit(1603231244.407:51): avc: denied { ioctl } for pid=24055 comm="syz-executor.3" path="socket:[89077]" dev="sockfs" ino=89077 ioctlcmd=0x8917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 508.071568] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 508.071591] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 508.071609] sctp_bind_addr_copy+0xde/0x470 [ 508.071634] __sctp_connect+0x713/0xd40 [ 508.071657] ? sctp_wfree+0x960/0x960 [ 508.071672] ? lock_sock_nested+0xa6/0x110 [ 508.071695] ? mark_held_locks+0xa6/0xf0 [ 508.127834] ? __local_bh_enable_ip+0x159/0x2a0 [ 508.132524] ? sctp_asconf_mgmt+0x380/0x380 [ 508.136864] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 508.142071] ? sctp_asconf_mgmt+0x380/0x380 [ 508.146408] sctp_inet_connect+0x14b/0x1b0 [ 508.150663] __sys_connect+0x265/0x2c0 [ 508.154564] ? __ia32_sys_accept+0xb0/0xb0 [ 508.158815] ? __mutex_add_waiter+0x160/0x160 [ 508.163331] ? vfs_write+0x393/0x540 [ 508.167059] ? fput+0x2b/0x190 [ 508.170264] ? ksys_write+0x1c8/0x2a0 [ 508.174088] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 508.179472] ? trace_hardirqs_off_caller+0x6e/0x210 [ 508.184517] __x64_sys_connect+0x6f/0xb0 [ 508.188637] do_syscall_64+0xf9/0x670 [ 508.192478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.197841] RIP: 0033:0x45de59 [ 508.201060] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.220003] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 508.227719] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 508.234988] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 508.242255] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 508.249520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000049 [ 508.256933] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x1000000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 508.285886] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:44 executing program 1 (fault-call:4 fault-nth:74): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xbc2, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 508.391466] tmpfs: Bad value 'aol=énterleavêáÆh—+í' for mount option 'huge' [ 508.439177] FAULT_INJECTION: forcing a failure. [ 508.439177] name failslab, interval 1, probability 0, space 0, times 0 [ 508.451449] CPU: 1 PID: 24100 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 508.459381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.468842] Call Trace: [ 508.471473] dump_stack+0x22c/0x33e [ 508.475143] should_fail.cold+0xa/0x2f [ 508.479064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.484193] ? find_held_lock+0x2d/0x110 [ 508.488281] ? sctp_bind_addr_state+0x1db/0x380 [ 508.493082] __should_failslab+0x153/0x1b6 [ 508.497343] should_failslab+0x5/0xf [ 508.501083] kmem_cache_alloc_trace+0x46/0x4b0 [ 508.505706] sctp_add_bind_addr+0x77/0x370 [ 508.509976] sctp_copy_local_addr_list+0x35b/0x520 [ 508.514938] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 508.519725] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 508.524956] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 508.530180] sctp_bind_addr_copy+0xde/0x470 [ 508.534539] __sctp_connect+0x713/0xd40 [ 508.538801] ? sctp_wfree+0x960/0x960 [ 508.542641] ? lock_sock_nested+0xa6/0x110 [ 508.546913] ? mark_held_locks+0xa6/0xf0 [ 508.551144] ? __local_bh_enable_ip+0x159/0x2a0 [ 508.556628] ? sctp_asconf_mgmt+0x380/0x380 [ 508.560982] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 508.566200] ? sctp_asconf_mgmt+0x380/0x380 [ 508.570548] sctp_inet_connect+0x14b/0x1b0 [ 508.574854] __sys_connect+0x265/0x2c0 [ 508.578784] ? __ia32_sys_accept+0xb0/0xb0 [ 508.583061] ? __mutex_add_waiter+0x160/0x160 [ 508.587596] ? vfs_write+0x393/0x540 [ 508.591335] ? fput+0x2b/0x190 [ 508.594549] ? ksys_write+0x1c8/0x2a0 [ 508.598457] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 508.604005] ? trace_hardirqs_off_caller+0x6e/0x210 [ 508.609050] __x64_sys_connect+0x6f/0xb0 [ 508.613233] do_syscall_64+0xf9/0x670 [ 508.617154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.622355] RIP: 0033:0x45de59 [ 508.625564] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.644478] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 508.652213] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 508.659500] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 508.666788] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 508.674110] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004a [ 508.681393] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000000020c3067d3100029423090400000000000000f6ffffffa6067d0100000000000000ffff7fffffffffe21000540cefc4c3c7b1b9da72eafe52c95900f2ffff0700000a00000072"]) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x7, 0x1, 0x180, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:45 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,_pol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x490483, 0x1dd) [ 508.768146] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0)='mptcp_pm\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 508.883391] tmpfs: Bad mount option _pol [ 508.920780] tmpfs: Bad mount option _pol [ 508.946297] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 508.969160] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:45 executing program 1 (fault-call:4 fault-nth:75): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1202, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 509.134510] REISERFS warning (device loop2): reiserfs_fill_super: Cannot allocate commit workqueue [ 509.198757] FAULT_INJECTION: forcing a failure. [ 509.198757] name failslab, interval 1, probability 0, space 0, times 0 [ 509.229426] CPU: 0 PID: 24155 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 509.237353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.246720] Call Trace: [ 509.249319] dump_stack+0x22c/0x33e [ 509.252947] should_fail.cold+0xa/0x2f [ 509.256827] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 509.261921] ? find_held_lock+0x2d/0x110 [ 509.265974] ? sctp_bind_addr_state+0x1db/0x380 [ 509.272719] __should_failslab+0x153/0x1b6 [ 509.276958] should_failslab+0x5/0xf [ 509.280666] kmem_cache_alloc_trace+0x46/0x4b0 [ 509.285242] sctp_add_bind_addr+0x77/0x370 [ 509.289472] sctp_copy_local_addr_list+0x35b/0x520 [ 509.294412] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 509.299190] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 509.304386] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 509.309568] sctp_bind_addr_copy+0xde/0x470 [ 509.313886] __sctp_connect+0x713/0xd40 [ 509.317854] ? sctp_wfree+0x960/0x960 [ 509.321650] ? lock_sock_nested+0xa6/0x110 [ 509.325881] ? mark_held_locks+0xa6/0xf0 [ 509.329942] ? __local_bh_enable_ip+0x159/0x2a0 [ 509.334603] ? sctp_asconf_mgmt+0x380/0x380 [ 509.338918] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 509.344199] ? sctp_asconf_mgmt+0x380/0x380 [ 509.348512] sctp_inet_connect+0x14b/0x1b0 [ 509.352742] __sys_connect+0x265/0x2c0 [ 509.356632] ? __ia32_sys_accept+0xb0/0xb0 [ 509.361482] ? __mutex_add_waiter+0x160/0x160 [ 509.365972] ? vfs_write+0x393/0x540 [ 509.369680] ? fput+0x2b/0x190 [ 509.372866] ? ksys_write+0x1c8/0x2a0 [ 509.376664] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 509.382019] ? trace_hardirqs_off_caller+0x6e/0x210 [ 509.387035] __x64_sys_connect+0x6f/0xb0 [ 509.391094] do_syscall_64+0xf9/0x670 [ 509.394884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.400079] RIP: 0033:0x45de59 [ 509.403280] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.422549] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 509.430248] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 509.437525] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 22:00:46 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x55c9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getrandom(&(0x7f0000000140)=""/141, 0x8d, 0x2) ptrace(0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:00:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x2000000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 509.444784] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 509.452055] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004b [ 509.459313] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x7, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0xa, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000240), &(0x7f0000000440)=0x60, 0x80000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="03000000000020c3067d3100020000a6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a0000007202471a02fcbdbb91c30ab546f76e09f3a9907d9d0d792e13f29948b0f34073f56a84c48e4e255e69984a7f7cf5e3760f282d33f2d0ef477bb91a02c38dabb6cad382ef7c1cabccc5008a9990bb00"/138]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:46 executing program 1 (fault-call:4 fault-nth:76): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 509.640347] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 509.679545] tmpfs: Bad value 'interleavedôül늲ØÛï*èÆ\â¥}Á´Ÿ½' for mount option 'mpol' [ 509.745730] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 509.828973] FAULT_INJECTION: forcing a failure. [ 509.828973] name failslab, interval 1, probability 0, space 0, times 0 [ 509.843797] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 509.869233] CPU: 1 PID: 24192 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 509.877180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.886563] Call Trace: [ 509.889193] dump_stack+0x22c/0x33e [ 509.892856] should_fail.cold+0xa/0x2f [ 509.896776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 509.901908] ? find_held_lock+0x2d/0x110 [ 509.906007] ? sctp_bind_addr_state+0x1db/0x380 [ 509.910707] __should_failslab+0x153/0x1b6 [ 509.914968] should_failslab+0x5/0xf [ 509.918710] kmem_cache_alloc_trace+0x46/0x4b0 [ 509.923318] sctp_add_bind_addr+0x77/0x370 [ 509.927638] sctp_copy_local_addr_list+0x35b/0x520 [ 509.932620] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 509.937410] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 509.942639] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 509.947858] sctp_bind_addr_copy+0xde/0x470 [ 509.952209] __sctp_connect+0x713/0xd40 [ 509.956013] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 509.956200] ? sctp_wfree+0x960/0x960 [ 509.970850] ? lock_sock_nested+0xa6/0x110 [ 509.975115] ? mark_held_locks+0xa6/0xf0 [ 509.979194] ? __local_bh_enable_ip+0x159/0x2a0 [ 509.983880] ? sctp_asconf_mgmt+0x380/0x380 [ 509.988222] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 509.993430] ? sctp_asconf_mgmt+0x380/0x380 [ 509.997783] sctp_inet_connect+0x14b/0x1b0 [ 510.002034] __sys_connect+0x265/0x2c0 [ 510.006021] ? __ia32_sys_accept+0xb0/0xb0 [ 510.010274] ? __mutex_add_waiter+0x160/0x160 [ 510.014790] ? vfs_write+0x393/0x540 [ 510.018518] ? fput+0x2b/0x190 [ 510.021721] ? ksys_write+0x1c8/0x2a0 [ 510.025541] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 510.030922] ? trace_hardirqs_off_caller+0x6e/0x210 [ 510.036096] __x64_sys_connect+0x6f/0xb0 [ 510.040197] do_syscall_64+0xf9/0x670 [ 510.044028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.049235] RIP: 0033:0x45de59 22:00:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1401, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0x8000}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa350d0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=r0, @ANYRESDEC=r0]) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x10002) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @private0}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) dup(r2) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x28011, r3, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0xc0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 510.052447] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.071468] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 510.079209] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 510.086511] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 510.093920] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 510.101225] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004c [ 510.108521] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:46 executing program 1 (fault-call:4 fault-nth:77): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) readv(r3, &(0x7f0000000240)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/59, 0x3b}, {&(0x7f0000000380)=""/108, 0x6c}], 0x3) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000001480)=""/94) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001580)={&(0x7f0000001500)={0x4c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x92}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfffffffe}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x64091}, 0x2000c801) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 510.205663] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 510.225678] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1403, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x9, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 510.401436] FAULT_INJECTION: forcing a failure. [ 510.401436] name failslab, interval 1, probability 0, space 0, times 0 [ 510.444720] CPU: 1 PID: 24231 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 510.452661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.462040] Call Trace: [ 510.464662] dump_stack+0x22c/0x33e [ 510.468320] should_fail.cold+0xa/0x2f [ 510.472235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 510.477361] ? find_held_lock+0x2d/0x110 [ 510.481446] ? sctp_bind_addr_state+0x1db/0x380 [ 510.486232] __should_failslab+0x153/0x1b6 [ 510.490502] should_failslab+0x5/0xf [ 510.494324] kmem_cache_alloc_trace+0x46/0x4b0 [ 510.498927] sctp_add_bind_addr+0x77/0x370 [ 510.503188] sctp_copy_local_addr_list+0x35b/0x520 [ 510.508143] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 510.510802] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 510.512924] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 510.512946] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 510.512964] sctp_bind_addr_copy+0xde/0x470 [ 510.512986] __sctp_connect+0x713/0xd40 [ 510.513008] ? sctp_wfree+0x960/0x960 [ 510.513026] ? lock_sock_nested+0xa6/0x110 [ 510.513049] ? mark_held_locks+0xa6/0xf0 [ 510.554807] ? __local_bh_enable_ip+0x159/0x2a0 [ 510.559469] ? sctp_asconf_mgmt+0x380/0x380 [ 510.563795] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 510.568991] ? sctp_asconf_mgmt+0x380/0x380 [ 510.573304] sctp_inet_connect+0x14b/0x1b0 [ 510.577537] __sys_connect+0x265/0x2c0 [ 510.581430] ? __ia32_sys_accept+0xb0/0xb0 [ 510.585672] ? __mutex_add_waiter+0x160/0x160 [ 510.590156] ? vfs_write+0x393/0x540 [ 510.593856] ? fput+0x2b/0x190 [ 510.597158] ? ksys_write+0x1c8/0x2a0 [ 510.601050] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 510.606403] ? trace_hardirqs_off_caller+0x6e/0x210 [ 510.611409] __x64_sys_connect+0x6f/0xb0 [ 510.615465] do_syscall_64+0xf9/0x670 [ 510.619295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.624511] RIP: 0033:0x45de59 22:00:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x4000000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 510.627709] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.646716] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 510.654448] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 510.661724] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 510.669011] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 510.676745] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004d [ 510.684699] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 510.744260] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1601, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 510.808905] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 510.942330] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 510.977783] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x10, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:47 executing program 1 (fault-call:4 fault-nth:78): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000060c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x1, @perf_config_ext, 0x0, 0x68, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 511.209996] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:47 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setns(r2, 0x2000000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 511.250262] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 511.287766] FAULT_INJECTION: forcing a failure. [ 511.287766] name failslab, interval 1, probability 0, space 0, times 0 [ 511.314405] CPU: 0 PID: 24294 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 511.322347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.331705] Call Trace: [ 511.334309] dump_stack+0x22c/0x33e [ 511.337964] should_fail.cold+0xa/0x2f [ 511.341853] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 511.347903] ? find_held_lock+0x2d/0x110 [ 511.351992] ? sctp_bind_addr_state+0x1db/0x380 [ 511.356661] __should_failslab+0x153/0x1b6 [ 511.360899] should_failslab+0x5/0xf [ 511.364640] kmem_cache_alloc_trace+0x46/0x4b0 [ 511.369220] sctp_add_bind_addr+0x77/0x370 [ 511.373453] sctp_copy_local_addr_list+0x35b/0x520 [ 511.378381] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 511.383134] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 511.388321] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 511.393524] sctp_bind_addr_copy+0xde/0x470 [ 511.397845] __sctp_connect+0x713/0xd40 [ 511.401823] ? sctp_wfree+0x960/0x960 [ 511.405618] ? lock_sock_nested+0xa6/0x110 [ 511.409852] ? mark_held_locks+0xa6/0xf0 [ 511.413936] ? __local_bh_enable_ip+0x159/0x2a0 [ 511.418685] ? sctp_asconf_mgmt+0x380/0x380 [ 511.423000] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 511.430283] ? sctp_asconf_mgmt+0x380/0x380 [ 511.434610] sctp_inet_connect+0x14b/0x1b0 [ 511.438854] __sys_connect+0x265/0x2c0 [ 511.442733] ? __ia32_sys_accept+0xb0/0xb0 [ 511.446964] ? __mutex_add_waiter+0x160/0x160 [ 511.451454] ? vfs_write+0x393/0x540 [ 511.455161] ? fput+0x2b/0x190 [ 511.458344] ? ksys_write+0x1c8/0x2a0 [ 511.462144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 511.467520] ? trace_hardirqs_off_caller+0x6e/0x210 [ 511.472534] __x64_sys_connect+0x6f/0xb0 [ 511.476594] do_syscall_64+0xf9/0x670 [ 511.480394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.485580] RIP: 0033:0x45de59 [ 511.488782] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1f00, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 511.507679] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 511.516161] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 511.523422] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 511.530683] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 511.537945] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004e [ 511.545267] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:48 executing program 1 (fault-call:4 fault-nth:79): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 511.621031] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x80, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04002dbd7000fcdbdf25010000000000000007410000004c00000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000080010000000000000000000000001010000000000a61fdacb000000"], 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0)=0x24, 0x4) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000000c3067d3100020000090400000000000000f6ffffffa6067d5b010000000000ebfff4ffffffffffe2100000f202ff0700000a00000072"]) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getegid() setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000240)=0x7a0c, 0x4) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:00:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x11, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xa000000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 511.773900] FAULT_INJECTION: forcing a failure. [ 511.773900] name failslab, interval 1, probability 0, space 0, times 0 [ 511.809840] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 511.829944] CPU: 1 PID: 24316 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 511.837890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.847430] Call Trace: [ 511.850054] dump_stack+0x22c/0x33e [ 511.853720] should_fail.cold+0xa/0x2f [ 511.857636] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 511.862760] ? find_held_lock+0x2d/0x110 [ 511.866842] ? sctp_bind_addr_state+0x1db/0x380 [ 511.871548] __should_failslab+0x153/0x1b6 [ 511.875822] should_failslab+0x5/0xf 22:00:48 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="68755d653d616c77ccf41d26a06d692e3d696e7461726c65617665"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x125f, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 511.879566] kmem_cache_alloc_trace+0x46/0x4b0 [ 511.884183] sctp_add_bind_addr+0x77/0x370 [ 511.888449] sctp_copy_local_addr_list+0x35b/0x520 [ 511.893408] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 511.898175] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 511.903498] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 511.908722] sctp_bind_addr_copy+0xde/0x470 [ 511.912650] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 511.913064] __sctp_connect+0x713/0xd40 [ 511.927480] ? sctp_wfree+0x960/0x960 [ 511.931316] ? lock_sock_nested+0xa6/0x110 [ 511.935578] ? mark_held_locks+0xa6/0xf0 [ 511.939653] ? __local_bh_enable_ip+0x159/0x2a0 [ 511.944502] ? sctp_asconf_mgmt+0x380/0x380 [ 511.948844] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 511.954046] ? sctp_asconf_mgmt+0x380/0x380 [ 511.958370] sctp_inet_connect+0x14b/0x1b0 [ 511.962611] __sys_connect+0x265/0x2c0 [ 511.966492] ? __ia32_sys_accept+0xb0/0xb0 [ 511.970720] ? __mutex_add_waiter+0x160/0x160 [ 511.975214] ? vfs_write+0x393/0x540 [ 511.978920] ? fput+0x2b/0x190 [ 511.982101] ? ksys_write+0x1c8/0x2a0 [ 511.985895] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 511.991686] ? trace_hardirqs_off_caller+0x6e/0x210 [ 511.996697] __x64_sys_connect+0x6f/0xb0 [ 512.000773] do_syscall_64+0xf9/0x670 [ 512.004583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.009784] RIP: 0033:0x45de59 [ 512.012964] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.031879] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 512.039581] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 512.046837] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 512.054093] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 512.061482] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004f [ 512.068752] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:48 executing program 1 (fault-call:4 fault-nth:80): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000ee00000000000000ff00", @ANYRES32=r4, @ANYBLOB="fe000000eeff00001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000100005ff000000000008001f00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r4], 0x50}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x2, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000002c80)={0x1470, 0x12, 0x1fd, 0x70bd29, 0x25dfdbfd, {0xf, 0x80, 0x6f, 0xd4, {0x4e20, 0x4e20, [0x2, 0x9, 0x6, 0x7fffffff], [0x9, 0x4, 0x80000000, 0x8000], r4, [0xa62, 0x9]}, 0xfffffffd, 0x10001}, [@INET_DIAG_REQ_BYTECODE={0x45, 0x1, "b39dfacebfb13fe0ce53e0a7668aaef19cd1ac1829615315de11f35eddcc31838b95de6075e501a9d2d2c778a3f500e9d0232836de3d7f636550032c12f48ab38d"}, @INET_DIAG_REQ_BYTECODE={0xcc, 0x1, "dedcf358c4071fbd95038c20c6ebc0f086bab5799d9349b1c059c499c23ed293efaefd4f768beae39e73cfc80b1fb651be65692f580cd5f094aa74b0af02e21accc60782d2659ae68cc79a07cfbf52cc6e2ea252a7e68d48cb4146d7a0edaf00691a1cda7999b1a1f98e85d30f244bc9803f587453696d2ad704c1b65cec06190764010a035caea45b5d11067d38aceeb4cdc2d64987c285adf9390d0385872b24b71d34a886a8434a4724de80377ed1b854e31d5fa45e9e1f9d7bcd65058dc1edb74e9471642f45"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x79, 0x1, "cd166a7ece0c6835108b01a750b1d46a406e8a31dd3ea4b41a3e5041105487562733d9270c0ab4efeb91f69e632b81dc9f013d3481822dc125b01b31427c84b26d64f5554230760662e91b47e7ff3caf3e0c0912eb4203ff064b8a0659d0258090e2e055dafdffdd23f6fc0bd04262911359726ebe"}, @INET_DIAG_REQ_BYTECODE={0x5a, 0x1, "95d9974984771f91241537a4a3ce5de5247653eb692028523ebc78d9480590ff746cf4a75907c2fdb4a856b7077c1ebfa4dcf9e406b088708a5e7f2373dc1a3337fd3ee10bc4e3f347d577bc749b8e631d1d16577c0a"}, @INET_DIAG_REQ_BYTECODE={0xa3, 0x1, "c8a5b6afcaf510693308b20d010cc69509cdc7622bd44d0e7d1c4f324121036efd8d6641ebaa91d36ea825a8af7d5cfef071f53a50880c84d35b400a97c3a0fe8d2a9b4cc0d6655fc96194bfb639a03144daf5025f49c8e4e2db82e35898ebca3b7143f8c4f7978643b88927aa94d2689fc94f60845fd46494a87c081f416ab920dc5bb6438af2e0168116f594d45983dfcb2f28e35eb7530cf90b02245bb0"}, @INET_DIAG_REQ_BYTECODE={0x18b, 0x1, "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"}]}, 0x1470}, 0x1, 0x0, 0x0, 0x4008011}, 0x20000000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x238ed0}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 512.192298] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 512.199659] tmpfs: Bad mount option hu]e 22:00:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x22, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 512.260456] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 512.310204] netlink: 5180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 512.311759] FAULT_INJECTION: forcing a failure. [ 512.311759] name failslab, interval 1, probability 0, space 0, times 0 [ 512.319618] netlink: 5180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 512.348524] CPU: 0 PID: 24355 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 512.356449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.360127] *** Guest State *** [ 512.365815] Call Trace: [ 512.365847] dump_stack+0x22c/0x33e [ 512.365871] should_fail.cold+0xa/0x2f [ 512.365885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.365898] ? find_held_lock+0x2d/0x110 [ 512.365913] ? sctp_bind_addr_state+0x1db/0x380 [ 512.365931] __should_failslab+0x153/0x1b6 [ 512.365947] should_failslab+0x5/0xf [ 512.365963] kmem_cache_alloc_trace+0x46/0x4b0 [ 512.365980] sctp_add_bind_addr+0x77/0x370 [ 512.365998] sctp_copy_local_addr_list+0x35b/0x520 [ 512.366013] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 512.366030] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 512.366049] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 512.366067] sctp_bind_addr_copy+0xde/0x470 [ 512.381571] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 512.384685] __sctp_connect+0x713/0xd40 [ 512.384710] ? sctp_wfree+0x960/0x960 [ 512.384727] ? lock_sock_nested+0xa6/0x110 [ 512.384751] ? mark_held_locks+0xa6/0xf0 [ 512.384766] ? __local_bh_enable_ip+0x159/0x2a0 [ 512.384778] ? sctp_asconf_mgmt+0x380/0x380 [ 512.384793] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 512.384807] ? sctp_asconf_mgmt+0x380/0x380 [ 512.384817] sctp_inet_connect+0x14b/0x1b0 [ 512.384831] __sys_connect+0x265/0x2c0 [ 512.384845] ? __ia32_sys_accept+0xb0/0xb0 [ 512.384867] ? __mutex_add_waiter+0x160/0x160 [ 512.384883] ? vfs_write+0x393/0x540 [ 512.384898] ? fput+0x2b/0x190 [ 512.384912] ? ksys_write+0x1c8/0x2a0 [ 512.384932] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 512.384947] ? trace_hardirqs_off_caller+0x6e/0x210 [ 512.384963] __x64_sys_connect+0x6f/0xb0 [ 512.384982] do_syscall_64+0xf9/0x670 [ 512.384998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.385010] RIP: 0033:0x45de59 [ 512.385024] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.385032] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 512.385045] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 512.385053] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 512.385061] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 512.385069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000050 [ 512.385077] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 512.431227] tmpfs: Bad mount option hu]e 22:00:49 executing program 1 (fault-call:4 fault-nth:81): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2000, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 512.433848] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 22:00:49 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0xaf07, 0xb6d4}, {0x39a}]}, 0x14, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 512.720954] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfc000000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 512.762604] CR3 = 0x0000000000000000 [ 512.768006] FAULT_INJECTION: forcing a failure. [ 512.768006] name failslab, interval 1, probability 0, space 0, times 0 [ 512.768389] RSP = 0x00000020000004cb RIP = 0x0000000000000000 [ 512.807072] CPU: 0 PID: 24375 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 512.815027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.823136] RFLAGS=0x00238ed2 DR7 = 0x0000000000000400 [ 512.824401] Call Trace: [ 512.824438] dump_stack+0x22c/0x33e [ 512.824464] should_fail.cold+0xa/0x2f [ 512.824494] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.836058] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 512.836678] ? find_held_lock+0x2d/0x110 [ 512.856519] ? sctp_bind_addr_state+0x1db/0x380 [ 512.857778] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 512.861218] __should_failslab+0x153/0x1b6 [ 512.861237] should_failslab+0x5/0xf [ 512.861253] kmem_cache_alloc_trace+0x46/0x4b0 [ 512.861273] sctp_add_bind_addr+0x77/0x370 [ 512.861293] sctp_copy_local_addr_list+0x35b/0x520 [ 512.861310] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 512.861333] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 512.878691] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 512.882220] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 512.882242] sctp_bind_addr_copy+0xde/0x470 [ 512.882263] __sctp_connect+0x713/0xd40 [ 512.882284] ? sctp_wfree+0x960/0x960 [ 512.882300] ? lock_sock_nested+0xa6/0x110 [ 512.882331] ? mark_held_locks+0xa6/0xf0 [ 512.882347] ? __local_bh_enable_ip+0x159/0x2a0 [ 512.882367] ? sctp_asconf_mgmt+0x380/0x380 [ 512.892049] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 512.896294] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 512.896314] ? sctp_asconf_mgmt+0x380/0x380 [ 512.896326] sctp_inet_connect+0x14b/0x1b0 [ 512.896346] __sys_connect+0x265/0x2c0 [ 512.896359] ? __ia32_sys_accept+0xb0/0xb0 [ 512.896374] ? __mutex_add_waiter+0x160/0x160 [ 512.896390] ? vfs_write+0x393/0x540 [ 512.896403] ? fput+0x2b/0x190 [ 512.896416] ? ksys_write+0x1c8/0x2a0 [ 512.896433] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 512.896446] ? trace_hardirqs_off_caller+0x6e/0x210 [ 512.896461] __x64_sys_connect+0x6f/0xb0 22:00:49 executing program 4: preadv2(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000180)=""/205, 0xcd}, {&(0x7f00000000c0)=""/97, 0x61}, {&(0x7f0000000280)=""/7, 0x7}, {&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/173, 0xad}], 0x6, 0x800, 0xfffff801, 0x1) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="687567653d616c7761b292daff7d85cf29696e74f99765726c65617665"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0x8, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 512.896480] do_syscall_64+0xf9/0x670 [ 512.896494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.896505] RIP: 0033:0x45de59 [ 512.896519] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.896526] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 512.896539] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 512.896548] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 512.896556] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 512.896564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000051 [ 512.896573] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 513.037174] netlink: 5180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.040367] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 22:00:49 executing program 1 (fault-call:4 fault-nth:82): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 513.055074] netlink: 5180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.069301] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 513.091676] netlink: 5180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.102276] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 513.134760] netlink: 5180 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.137712] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 513.159411] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 513.206335] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 513.210480] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 513.227460] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 513.250198] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 513.263516] tmpfs: Bad value 'alwa²’Úÿ}…Ï)intù—erleave' for mount option 'huge' [ 513.282907] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 513.289942] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 22:00:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x23, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 513.299042] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 513.320054] Interruptibility = 00000000 ActivityState = 00000000 [ 513.326901] *** Host State *** [ 513.333033] FAULT_INJECTION: forcing a failure. [ 513.333033] name failslab, interval 1, probability 0, space 0, times 0 [ 513.345589] tmpfs: Bad value 'alwa²’Úÿ}…Ï)intù—erleave' for mount option 'huge' [ 513.347041] RIP = 0xffffffff811ca2ea RSP = 0xffff8880476a7878 [ 513.370901] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 513.377616] CPU: 1 PID: 24405 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 513.385531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.394900] Call Trace: [ 513.397503] dump_stack+0x22c/0x33e [ 513.401144] should_fail.cold+0xa/0x2f [ 513.405053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.410174] ? find_held_lock+0x2d/0x110 [ 513.414325] ? sctp_bind_addr_state+0x1db/0x380 [ 513.419007] __should_failslab+0x153/0x1b6 [ 513.423265] should_failslab+0x5/0xf [ 513.426970] kmem_cache_alloc_trace+0x46/0x4b0 [ 513.431544] sctp_add_bind_addr+0x77/0x370 [ 513.435770] sctp_copy_local_addr_list+0x35b/0x520 [ 513.441471] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 513.446240] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 513.452043] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 513.457231] sctp_bind_addr_copy+0xde/0x470 [ 513.461799] __sctp_connect+0x713/0xd40 [ 513.465782] ? sctp_wfree+0x960/0x960 [ 513.469591] ? lock_sock_nested+0xa6/0x110 [ 513.473854] ? mark_held_locks+0xa6/0xf0 [ 513.477943] ? __local_bh_enable_ip+0x159/0x2a0 [ 513.482639] ? sctp_asconf_mgmt+0x380/0x380 [ 513.486993] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 513.492191] ? sctp_asconf_mgmt+0x380/0x380 [ 513.496505] sctp_inet_connect+0x14b/0x1b0 [ 513.500760] __sys_connect+0x265/0x2c0 [ 513.504639] ? __ia32_sys_accept+0xb0/0xb0 [ 513.508871] ? __mutex_add_waiter+0x160/0x160 [ 513.513363] ? vfs_write+0x393/0x540 [ 513.517231] ? fput+0x2b/0x190 [ 513.520630] ? ksys_write+0x1c8/0x2a0 [ 513.524730] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 513.530226] ? trace_hardirqs_off_caller+0x6e/0x210 [ 513.535271] __x64_sys_connect+0x6f/0xb0 [ 513.539348] do_syscall_64+0xf9/0x670 [ 513.543177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.548391] RIP: 0033:0x45de59 [ 513.551598] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.570515] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 513.578232] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 513.585494] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 513.592777] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 513.600063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000052 22:00:50 executing program 4: syz_open_pts(0xffffffffffffffff, 0x80) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="b6462126b8ea6139685888db62818fd7f7918f7a9dc1be63b5bc7815ca8574596074516e75469e356d84feef2e080cbedda4568ad3afe8cab4124299f32d3df6c28ad6a47b05655da8bdf2f01547b8e4dd4a9062261a3475a73f1b63c485264a98ed5f3e70ed6d8b6f6b1557fb988e49b5eda1ad5746b8ce60507bc1dfccff47cd7c8b62a9816a99663d15b34566e2026841a01dd7f0786d7f19305449d108ec6eec5b97ae7028fc4b9c69050cb7f0c0452defc92579446c3b10e90ace85a61dcd34a586fd87a46fe2", 0xc9, 0xfe}], 0x1000000, &(0x7f0000000440)={[{@quota='quota'}, {@errors_continue='errors=continue'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@nodelalloc='nodelalloc'}, {@noinit_itable='noinit_itable'}, {@i_version='i_version'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80000}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4}}], [{@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@euid_lt={'euid<', r4}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x11) tee(r3, r0, 0x4, 0x0) [ 513.607324] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 513.616105] FSBase=00007f7bf8aeb700 GSBase=ffff8880ae300000 TRBase=fffffe0000003000 [ 513.646978] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 22:00:50 executing program 1 (fault-call:4 fault-nth:83): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2200, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 513.654343] CR0=0000000080050033 CR3=000000009a65c000 CR4=00000000001426e0 [ 513.663653] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff87c013e0 [ 513.670535] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 513.679237] *** Control State *** [ 513.683594] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 513.699413] EntryControls=0000d1ff ExitControls=002fefff [ 513.719364] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 513.727517] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 513.746802] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 513.766889] reason=80000021 qualification=0000000000000000 [ 513.806620] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 513.842240] FAULT_INJECTION: forcing a failure. [ 513.842240] name failslab, interval 1, probability 0, space 0, times 0 [ 513.877460] CPU: 1 PID: 24421 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 513.882092] IDTVectoring: info=00000000 errcode=00000000 [ 513.885408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.885415] Call Trace: [ 513.885445] dump_stack+0x22c/0x33e [ 513.885467] should_fail.cold+0xa/0x2f [ 513.910370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.910764] TSC Offset = 0xfffffeebdd7a0afc [ 513.915477] ? find_held_lock+0x2d/0x110 [ 513.915496] ? sctp_bind_addr_state+0x1db/0x380 [ 513.915515] __should_failslab+0x153/0x1b6 [ 513.926702] EPT pointer = 0x00000000846b501e [ 513.928547] should_failslab+0x5/0xf [ 513.928563] kmem_cache_alloc_trace+0x46/0x4b0 [ 513.928582] sctp_add_bind_addr+0x77/0x370 [ 513.950020] sctp_copy_local_addr_list+0x35b/0x520 [ 513.951976] Virtual processor ID = 0x0001 [ 513.954980] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 513.955003] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 513.955029] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 513.974337] sctp_bind_addr_copy+0xde/0x470 [ 513.978695] __sctp_connect+0x713/0xd40 [ 513.982702] ? sctp_wfree+0x960/0x960 [ 513.986525] ? lock_sock_nested+0xa6/0x110 [ 513.990792] ? mark_held_locks+0xa6/0xf0 [ 513.994875] ? __local_bh_enable_ip+0x159/0x2a0 [ 513.999565] ? sctp_asconf_mgmt+0x380/0x380 [ 514.003911] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 514.009127] ? sctp_asconf_mgmt+0x380/0x380 [ 514.013467] sctp_inet_connect+0x14b/0x1b0 [ 514.017725] __sys_connect+0x265/0x2c0 [ 514.021630] ? __ia32_sys_accept+0xb0/0xb0 [ 514.025885] ? __mutex_add_waiter+0x160/0x160 [ 514.030400] ? vfs_write+0x393/0x540 [ 514.034179] ? fput+0x2b/0x190 [ 514.037387] ? ksys_write+0x1c8/0x2a0 [ 514.041210] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 514.046598] ? trace_hardirqs_off_caller+0x6e/0x210 [ 514.051653] __x64_sys_connect+0x6f/0xb0 [ 514.055743] do_syscall_64+0xf9/0x670 [ 514.059568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.064775] RIP: 0033:0x45de59 [ 514.067984] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.087867] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 514.095604] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 514.102933] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 [ 514.110224] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 514.117605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000053 [ 514.124899] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000540)=ANY=[@ANYBLOB="03000000000020c3067d3164109caa00020000ad17ad1017c7deb1ac4c090400000000000005f6ffffffa6067d5b010000000000fbffffffffffffffe2100000f2ffff0700000a00000072c221d1a7ed295a9f7f462b7dd4efe2a50b76c9f7d7315d9553f4c15d58834162360ab2ca9df628c10580f40f787de5fa44ef9ba38b9822233214ad4fad3d8d94c0dea10b5047f8e98d36a153963a5792f9afb7a720af6a3c8b3f5fda95f0c73b81f69796e45af285bf2cf96cbec54fd1999a4d56e70f9f757bbfeaba686f43ec2ba9"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfe800000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 514.186531] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 514.208814] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2c00, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:50 executing program 1 (fault-call:4 fault-nth:84): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 514.355669] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2c, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="0300e2cbfde57e195eb25069f2b10000000020c3067d3100020000090400000000000000f6ffffffa6067d5b010000ffffffffffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) accept$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f00000001c0)=0x6e) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 514.537142] FAULT_INJECTION: forcing a failure. [ 514.537142] name failslab, interval 1, probability 0, space 0, times 0 [ 514.554038] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 514.595754] CPU: 0 PID: 24467 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 514.603699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.613073] Call Trace: [ 514.615694] dump_stack+0x22c/0x33e [ 514.619348] should_fail.cold+0xa/0x2f [ 514.623258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.628379] ? find_held_lock+0x2d/0x110 [ 514.632637] ? sctp_bind_addr_state+0x1db/0x380 [ 514.637339] __should_failslab+0x153/0x1b6 [ 514.641601] should_failslab+0x5/0xf [ 514.645339] kmem_cache_alloc_trace+0x46/0x4b0 [ 514.649987] sctp_add_bind_addr+0x77/0x370 [ 514.654302] sctp_copy_local_addr_list+0x35b/0x520 [ 514.659338] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 514.664118] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 514.669332] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 514.674553] sctp_bind_addr_copy+0xde/0x470 [ 514.679101] __sctp_connect+0x713/0xd40 [ 514.683105] ? sctp_wfree+0x960/0x960 [ 514.687170] ? lock_sock_nested+0xa6/0x110 [ 514.691428] ? mark_held_locks+0xa6/0xf0 [ 514.696446] ? __local_bh_enable_ip+0x159/0x2a0 [ 514.701134] ? sctp_asconf_mgmt+0x380/0x380 [ 514.705476] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 514.710698] ? sctp_asconf_mgmt+0x380/0x380 [ 514.715047] sctp_inet_connect+0x14b/0x1b0 [ 514.719309] __sys_connect+0x265/0x2c0 [ 514.723220] ? __ia32_sys_accept+0xb0/0xb0 [ 514.727472] ? __mutex_add_waiter+0x160/0x160 [ 514.731985] ? vfs_write+0x393/0x540 [ 514.735706] ? fput+0x2b/0x190 [ 514.738905] ? ksys_write+0x1c8/0x2a0 [ 514.742738] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 514.748884] ? trace_hardirqs_off_caller+0x6e/0x210 [ 514.753928] __x64_sys_connect+0x6f/0xb0 [ 514.757999] do_syscall_64+0xf9/0x670 [ 514.761825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.767017] RIP: 0033:0x45de59 [ 514.770207] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.789104] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 514.797438] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 514.804727] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 514.811983] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 514.819262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000054 [ 514.826547] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 514.882847] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 514.908361] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:51 executing program 1 (fault-call:4 fault-nth:85): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x3c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x480d0}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:00:51 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "1c509221331a382387e71550a4487ca2a3ead6a3"}, 0x15, 0x2) 22:00:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x2d01, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 515.025298] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 515.066471] FAULT_INJECTION: forcing a failure. [ 515.066471] name failslab, interval 1, probability 0, space 0, times 0 [ 515.079966] CPU: 0 PID: 24497 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 515.087887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.097260] Call Trace: [ 515.099876] dump_stack+0x22c/0x33e [ 515.103530] should_fail.cold+0xa/0x2f [ 515.107441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.112585] ? find_held_lock+0x2d/0x110 [ 515.116682] ? sctp_bind_addr_state+0x1db/0x380 [ 515.121391] __should_failslab+0x153/0x1b6 [ 515.125659] should_failslab+0x5/0xf [ 515.129390] kmem_cache_alloc_trace+0x46/0x4b0 [ 515.133996] sctp_add_bind_addr+0x77/0x370 [ 515.138251] sctp_copy_local_addr_list+0x35b/0x520 [ 515.143206] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 515.147996] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 515.153214] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 515.158449] sctp_bind_addr_copy+0xde/0x470 [ 515.162819] __sctp_connect+0x713/0xd40 [ 515.166823] ? sctp_wfree+0x960/0x960 [ 515.170655] ? lock_sock_nested+0xa6/0x110 [ 515.174951] ? mark_held_locks+0xa6/0xf0 [ 515.179052] ? __local_bh_enable_ip+0x159/0x2a0 [ 515.183766] ? sctp_asconf_mgmt+0x380/0x380 [ 515.188203] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 515.193429] ? sctp_asconf_mgmt+0x380/0x380 [ 515.197783] sctp_inet_connect+0x14b/0x1b0 [ 515.202147] __sys_connect+0x265/0x2c0 [ 515.206137] ? __ia32_sys_accept+0xb0/0xb0 [ 515.210402] ? __mutex_add_waiter+0x160/0x160 [ 515.215042] ? vfs_write+0x393/0x540 [ 515.218785] ? fput+0x2b/0x190 [ 515.221998] ? ksys_write+0x1c8/0x2a0 [ 515.225830] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 515.231248] ? trace_hardirqs_off_caller+0x6e/0x210 [ 515.236292] __x64_sys_connect+0x6f/0xb0 [ 515.240371] do_syscall_64+0xf9/0x670 [ 515.244176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.249365] RIP: 0033:0x45de59 22:00:51 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) semctl$GETNCNT(0xffffffffffffffff, 0x2, 0xe, &(0x7f00000005c0)=""/215) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x8, 'gre0\x00', {'bond_slave_1\x00'}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000280)=@ethtool_rxnfc={0x2d, 0x9, 0x0, {0x8, @ah_ip6_spec={@dev={0xfe, 0x80, [], 0x1c}, @private2, 0x80000000}, {0x0, @dev={[], 0x36}, 0x4, 0x20, [0x8, 0x400]}, @usr_ip4_spec={@loopback, @broadcast, 0x0, 0x0, 0x1, 0x7f}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0x2, 0x81, [0x0, 0x1ff]}, 0x2}, 0x6, [0x5, 0x1, 0xffffffff, 0x4, 0x2, 0x5]}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') sendmsg$NL80211_CMD_SET_CHANNEL(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x40, r3, 0x4, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x3b}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x85}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000100)) [ 515.252556] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.271486] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 515.279203] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 515.286483] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 515.293759] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 515.301040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000055 [ 515.308340] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x48, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xfec00000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:51 executing program 1 (fault-call:4 fault-nth:86): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f0000000380)={0xfffffffa, "25357f11d1638b72d16396a0ea34b4e45993ac9145c6592a40d572a35089454b", 0x100, 0x2, 0x8, 0x2, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 515.462471] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 515.536695] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 515.577643] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 515.591290] FAULT_INJECTION: forcing a failure. [ 515.591290] name failslab, interval 1, probability 0, space 0, times 0 [ 515.609967] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 515.654814] CPU: 0 PID: 24533 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 515.662759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.673172] Call Trace: [ 515.675788] dump_stack+0x22c/0x33e [ 515.679422] should_fail.cold+0xa/0x2f [ 515.683400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.688526] ? find_held_lock+0x2d/0x110 [ 515.692597] ? sctp_bind_addr_state+0x1db/0x380 [ 515.697278] __should_failslab+0x153/0x1b6 [ 515.701525] should_failslab+0x5/0xf [ 515.705268] kmem_cache_alloc_trace+0x46/0x4b0 [ 515.710116] sctp_add_bind_addr+0x77/0x370 [ 515.714359] sctp_copy_local_addr_list+0x35b/0x520 [ 515.719295] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 515.724057] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 515.729254] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 515.734448] sctp_bind_addr_copy+0xde/0x470 [ 515.738776] __sctp_connect+0x713/0xd40 [ 515.742758] ? sctp_wfree+0x960/0x960 [ 515.746650] ? lock_sock_nested+0xa6/0x110 [ 515.750894] ? mark_held_locks+0xa6/0xf0 [ 515.754956] ? __local_bh_enable_ip+0x159/0x2a0 [ 515.759630] ? sctp_asconf_mgmt+0x380/0x380 [ 515.764221] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 515.769468] ? sctp_asconf_mgmt+0x380/0x380 [ 515.773799] sctp_inet_connect+0x14b/0x1b0 [ 515.778049] __sys_connect+0x265/0x2c0 [ 515.781939] ? __ia32_sys_accept+0xb0/0xb0 [ 515.786176] ? __mutex_add_waiter+0x160/0x160 [ 515.790675] ? vfs_write+0x393/0x540 [ 515.794392] ? fput+0x2b/0x190 [ 515.797585] ? ksys_write+0x1c8/0x2a0 [ 515.801387] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 515.806753] ? trace_hardirqs_off_caller+0x6e/0x210 [ 515.811772] __x64_sys_connect+0x6f/0xb0 [ 515.815838] do_syscall_64+0xf9/0x670 [ 515.819638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.824825] RIP: 0033:0x45de59 [ 515.828021] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.846936] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 515.854650] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 515.861917] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 515.869291] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 515.876564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000056 [ 515.883856] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3003, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:52 executing program 1 (fault-call:4 fault-nth:87): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 516.042810] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 516.046419] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 516.077565] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4a, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x100, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xa3, 0x2a, [@gcr_ga={0xbd, 0x6}, @fast_bss_trans={0x37, 0x5f, {0x7, 0x1, "bee83ebfaec272368571efaa9c022afe", "f8123584280fba334908a79c655f4a91ef2d81a3d23f3be68e477583dc77d83b", "bbd9c7e57e1eea5e925f60d862c0e4551b537f6315d7a216a48453a1d13f54cd", [{0x2, 0xb, "1cb05c1674ad087e7a75d8"}]}}, @tim={0x5, 0xd, {0x1, 0x85, 0x9, "c22aef65d415021b79b2"}}, @erp={0x2a, 0x1, {0x1, 0x1}}, @ht={0x2d, 0x1a, {0x40, 0x3, 0x0, 0x0, {0x8, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x400, 0x2, 0x3}}, @mesh_id={0x72, 0x6}]}, @NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x2}, @NL80211_ATTR_IE={0x3f, 0x2a, [@prep={0x83, 0x25, @ext={{}, 0x8, 0x8, @broadcast, 0x5, @device_b, 0x0, 0xdd9, @device_b, 0x1}}, @link_id={0x65, 0x12, {@random="a5c7ede80e95", @device_a, @device_b}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 516.158599] FAULT_INJECTION: forcing a failure. [ 516.158599] name failslab, interval 1, probability 0, space 0, times 0 [ 516.187084] CPU: 1 PID: 24567 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 516.195030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.204500] Call Trace: [ 516.207133] dump_stack+0x22c/0x33e [ 516.210780] should_fail.cold+0xa/0x2f [ 516.214689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.219818] ? find_held_lock+0x2d/0x110 [ 516.223915] ? sctp_bind_addr_state+0x1db/0x380 [ 516.228700] __should_failslab+0x153/0x1b6 [ 516.232960] should_failslab+0x5/0xf [ 516.236707] kmem_cache_alloc_trace+0x46/0x4b0 [ 516.241303] sctp_add_bind_addr+0x77/0x370 [ 516.245547] sctp_copy_local_addr_list+0x35b/0x520 [ 516.250491] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 516.255385] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 516.260695] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 516.265891] sctp_bind_addr_copy+0xde/0x470 [ 516.270227] __sctp_connect+0x713/0xd40 [ 516.274202] ? sctp_wfree+0x960/0x960 [ 516.278013] ? lock_sock_nested+0xa6/0x110 [ 516.282257] ? mark_held_locks+0xa6/0xf0 [ 516.286327] ? __local_bh_enable_ip+0x159/0x2a0 [ 516.291013] ? sctp_asconf_mgmt+0x380/0x380 [ 516.295363] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 516.300560] ? sctp_asconf_mgmt+0x380/0x380 [ 516.305015] sctp_inet_connect+0x14b/0x1b0 [ 516.309390] __sys_connect+0x265/0x2c0 [ 516.313292] ? __ia32_sys_accept+0xb0/0xb0 [ 516.317598] ? __mutex_add_waiter+0x160/0x160 [ 516.322096] ? vfs_write+0x393/0x540 [ 516.325830] ? fput+0x2b/0x190 [ 516.329045] ? ksys_write+0x1c8/0x2a0 [ 516.332857] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 516.338224] ? trace_hardirqs_off_caller+0x6e/0x210 [ 516.343552] __x64_sys_connect+0x6f/0xb0 [ 516.347619] do_syscall_64+0xf9/0x670 [ 516.351415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.356606] RIP: 0033:0x45de59 [ 516.359798] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.378703] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 516.386504] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 516.395335] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 516.402641] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 22:00:52 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=ave\x00\x00\x00\x00\x00\x00\x00']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 516.409926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000057 [ 516.417194] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 516.468277] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 516.521774] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0xff000000, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 516.564615] ================================================================================ [ 516.573607] UBSAN: Undefined behaviour in arch/x86/kvm/pmu_intel.c:310:12 [ 516.580560] shift exponent 233 is too large for 64-bit type 'long long unsigned int' [ 516.588474] CPU: 1 PID: 24580 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 [ 516.596382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.605764] Call Trace: [ 516.608391] dump_stack+0x22c/0x33e 22:00:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3701, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 516.612075] ubsan_epilogue+0xe/0x3a [ 516.615827] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 516.622137] ? update_permission_bitmask+0x135/0x370 [ 516.627321] ? kvm_irq_delivery_to_apic+0x871/0xa80 [ 516.632460] intel_pmu_refresh.cold+0x56/0xa0 [ 516.636994] kvm_update_cpuid+0x6d9/0xaf0 [ 516.641179] kvm_vcpu_ioctl_set_cpuid+0x6ab/0x970 [ 516.646049] ? _copy_from_user+0xd2/0x130 [ 516.650278] kvm_arch_vcpu_ioctl+0xea3/0x2e10 [ 516.654797] ? kvm_arch_vcpu_put+0x5a0/0x5a0 [ 516.659837] ? io_schedule_timeout+0x140/0x140 [ 516.664447] ? lock_downgrade+0x750/0x750 [ 516.668630] ? lock_acquire+0x170/0x3f0 [ 516.672806] ? kvm_vcpu_ioctl+0x175/0xe30 [ 516.676976] ? kvm_vcpu_ioctl+0x175/0xe30 [ 516.681185] ? __mutex_lock+0x3bd/0x13f0 [ 516.685372] ? futex_wait+0x438/0x590 [ 516.689278] ? kvm_vcpu_ioctl+0x175/0xe30 [ 516.693446] ? ww_mutex_unlock+0x2f0/0x2f0 [ 516.698371] ? wake_up_q+0x93/0xe0 [ 516.702209] ? drop_futex_key_refs+0x6f/0xe0 [ 516.706700] ? __lock_acquire+0x6ec/0x3ff0 [ 516.710977] kvm_vcpu_ioctl+0x8af/0xe30 [ 516.714970] ? kvm_get_dirty_log+0x590/0x590 [ 516.719430] ? mark_held_locks+0xf0/0xf0 [ 516.723528] ? do_futex+0x163/0x1c60 [ 516.727285] ? mark_held_locks+0xf0/0xf0 [ 516.731389] ? lock_downgrade+0x750/0x750 [ 516.735539] ? mark_held_locks+0xf0/0xf0 [ 516.739601] ? check_preemption_disabled+0x41/0x2b0 [ 516.744613] ? find_held_lock+0x2d/0x110 [ 516.748797] ? kvm_get_dirty_log+0x590/0x590 [ 516.753237] do_vfs_ioctl+0xcdb/0x12e0 [ 516.757152] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 516.762368] ? ioctl_preallocate+0x200/0x200 [ 516.766873] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 516.772343] ? __fget+0x3ad/0x570 [ 516.775829] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 516.780250] ? ktime_get_ts64+0x2d3/0x420 [ 516.784503] ksys_ioctl+0x9b/0xc0 [ 516.788020] __x64_sys_ioctl+0x6f/0xb0 [ 516.791935] do_syscall_64+0xf9/0x670 [ 516.795829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.801464] RIP: 0033:0x45de59 [ 516.804783] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.824285] RSP: 002b:00007f7bf8aeac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 516.832013] RAX: ffffffffffffffda RBX: 0000000000011f00 RCX: 000000000045de59 [ 516.839348] RDX: 0000000020000440 RSI: 000000004008ae8a RDI: 0000000000000005 [ 516.847220] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 516.854765] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 516.862366] R13: 00007ffcfe8d7ddf R14: 00007f7bf8aeb9c0 R15: 000000000118bf2c [ 516.870090] ================================================================================ 22:00:53 executing program 1 (fault-call:4 fault-nth:88): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe21002a4f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_bp={&(0x7f00000001c0), 0xb}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 517.106862] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 517.178455] FAULT_INJECTION: forcing a failure. [ 517.178455] name failslab, interval 1, probability 0, space 0, times 0 [ 517.198855] tmpfs: Bad value 'ave' for mount option 'mpol' [ 517.207920] CPU: 1 PID: 24614 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 517.216028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.225703] Call Trace: [ 517.227449] tmpfs: Bad value 'ave' for mount option 'mpol' [ 517.228684] dump_stack+0x22c/0x33e [ 517.228707] should_fail.cold+0xa/0x2f [ 517.228722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.228740] ? find_held_lock+0x2d/0x110 [ 517.251352] ? sctp_bind_addr_state+0x1db/0x380 [ 517.256111] __should_failslab+0x153/0x1b6 [ 517.260648] should_failslab+0x5/0xf [ 517.264410] kmem_cache_alloc_trace+0x46/0x4b0 [ 517.269215] sctp_add_bind_addr+0x77/0x370 [ 517.273489] sctp_copy_local_addr_list+0x35b/0x520 [ 517.278540] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 517.283339] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 517.288567] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 517.295438] sctp_bind_addr_copy+0xde/0x470 [ 517.299787] __sctp_connect+0x713/0xd40 [ 517.303974] ? sctp_wfree+0x960/0x960 [ 517.307800] ? lock_sock_nested+0xa6/0x110 [ 517.312080] ? mark_held_locks+0xa6/0xf0 [ 517.317395] ? __local_bh_enable_ip+0x159/0x2a0 [ 517.322106] ? sctp_asconf_mgmt+0x380/0x380 [ 517.326465] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 517.331696] ? sctp_asconf_mgmt+0x380/0x380 [ 517.336145] sctp_inet_connect+0x14b/0x1b0 [ 517.340408] __sys_connect+0x265/0x2c0 [ 517.344320] ? __ia32_sys_accept+0xb0/0xb0 [ 517.348578] ? __mutex_add_waiter+0x160/0x160 [ 517.353187] ? vfs_write+0x393/0x540 [ 517.356932] ? fput+0x2b/0x190 [ 517.360149] ? ksys_write+0x1c8/0x2a0 [ 517.363975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 517.369364] ? trace_hardirqs_off_caller+0x6e/0x210 [ 517.374416] __x64_sys_connect+0x6f/0xb0 [ 517.378556] do_syscall_64+0xf9/0x670 [ 517.382388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.387596] RIP: 0033:0x45de59 [ 517.390810] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.409729] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 517.417459] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 22:00:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4c, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:53 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x2, &(0x7f00000021c0)=""/4117, &(0x7f0000001140)=0x1015) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 517.424750] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 517.432039] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 517.439326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000058 [ 517.446612] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 517.482719] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x10}, 0x3}]}, &(0x7f0000000200)=0x10) [ 517.627069] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 517.648508] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:54 executing program 1 (fault-call:4 fault-nth:89): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100180000090400000000000000f6ffffffa6067d5b01000005000000000a0000007200"/61]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3a03, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 517.817710] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 517.870117] FAULT_INJECTION: forcing a failure. [ 517.870117] name failslab, interval 1, probability 0, space 0, times 0 22:00:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x55, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 517.972012] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 517.979469] CPU: 1 PID: 24659 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 517.990912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.000280] Call Trace: [ 518.002895] dump_stack+0x22c/0x33e [ 518.006550] should_fail.cold+0xa/0x2f [ 518.010464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 518.015584] ? find_held_lock+0x2d/0x110 [ 518.019672] ? sctp_bind_addr_state+0x1db/0x380 [ 518.024398] __should_failslab+0x153/0x1b6 [ 518.028659] should_failslab+0x5/0xf [ 518.032391] kmem_cache_alloc_trace+0x46/0x4b0 [ 518.037007] sctp_add_bind_addr+0x77/0x370 [ 518.041254] sctp_copy_local_addr_list+0x35b/0x520 [ 518.046199] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 518.050959] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 518.056160] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 518.061385] sctp_bind_addr_copy+0xde/0x470 [ 518.065713] __sctp_connect+0x713/0xd40 [ 518.069712] ? sctp_wfree+0x960/0x960 [ 518.073541] ? lock_sock_nested+0xa6/0x110 [ 518.077777] ? mark_held_locks+0xa6/0xf0 [ 518.081843] ? __local_bh_enable_ip+0x159/0x2a0 [ 518.086535] ? sctp_asconf_mgmt+0x380/0x380 [ 518.090865] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 518.096684] ? sctp_asconf_mgmt+0x380/0x380 [ 518.101096] sctp_inet_connect+0x14b/0x1b0 [ 518.105457] __sys_connect+0x265/0x2c0 [ 518.109462] ? __ia32_sys_accept+0xb0/0xb0 [ 518.113866] ? __mutex_add_waiter+0x160/0x160 [ 518.118487] ? vfs_write+0x393/0x540 [ 518.122283] ? fput+0x2b/0x190 [ 518.125923] ? ksys_write+0x1c8/0x2a0 [ 518.129876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 518.135260] ? trace_hardirqs_off_caller+0x6e/0x210 [ 518.140286] __x64_sys_connect+0x6f/0xb0 [ 518.144350] do_syscall_64+0xf9/0x670 [ 518.148173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.153368] RIP: 0033:0x45de59 22:00:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f00000001c0)="b10566b87b000f00d00f001c0cf3420fa7e8673e450f0866ba2100b002ee0fa14723c2362ef3410f064f0fc75800", 0x2e}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 518.156557] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.175454] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 518.183157] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 518.190442] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 518.197844] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 518.205341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000059 [ 518.212774] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:54 executing program 1 (fault-call:4 fault-nth:90): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 518.307286] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 518.328701] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3f00, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:00:55 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="a91fa3062776491965676c65617604"]) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000001780)=0x1) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4000, &(0x7f0000000180)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '-,$:\'}!\xee[&[\x00'}}, {@version_L='version=9p2000.L'}, {@access_any='access=any'}, {@fscache='fscache'}, {@cache_loose='cache=loose'}], [{@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}, {@euid_gt={'euid>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@obj_role={'obj_role'}}, {@obj_role={'obj_role', 0x3d, '-+)'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@seclabel='seclabel'}]}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x153000, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001700)={&(0x7f0000000300)={0x13e0, 0x0, 0xc, 0x3, 0x70bd29, 0x25dfdbfd, {0x2, 0x0, 0x6}, [@generic="26b9ec4eb73ecc01e739f8c7fbf642eb6cea57293b6e8d85a7e4cf7e128a0678b95c3ce79c81d8afcc38d987509141040c73a39300f82988228475cc8ccc9b3a3dea4a17d5ca66ec698c26674d120bf0c8802166b1f5062d9cf21e5f9e71804e0a219a70f8c93344de865eb42f6df72820313fc093ca59efb9603a82d90168d2ac", @generic="31dad631d955bf938f9ac94f1065923d8f4ca4f93dfb80928b3ac827973eb6a7a266d8f34ebea560a643d3f3ba1fa789297062066529aec08b86e4b22619d0436f8badbc70344ca42d58ff9861c2f7149410d55ca0911ac44845f2e67b0c1843b163678ce83612", @typed={0x4, 0x78}, @typed={0x8, 0x80, 0x0, 0x0, @u32=0x8}, @generic="4bfcfd080a5f7e612ceab6aa0d1f69b8a1f46baa830c5b5fd9a37e9592fe62c6549e6822b188800bea9b961a91b85a1f798200d6fde503755101dafb773ddfefe4f7fb61f99947c7b62c6c3a27bc6d28b82f6b3139d9b496555a54998e04fd95af3e0912aefbd3305fc935780e0e19f1577aacd6ac22fdcec1cb72b45fdb00fd80ea67c03f7e06e0b71551c52be3afd117070b83e0f08500e4707d171bff64b467558fc6b93ca7218881c4c2ec7993", @generic="fd7c96fc3d9a3f", @nested={0x1004, 0x1b, 0x0, 0x1, [@generic="13ed1d5806714d418969c26bd313d0fcd61e2802363c420bb3364db2ec443596f80716e9d2b3fb705a5abf0f57e2f21306d60468c1b42443e631e2375d75e4e9f8eefccdaa568316e698d5d74be771397dae83759c6b4d92d323f2ddd5f0f85ce97a7d2681d644656a580cfe99f163438b57c8068902722a94e3358e60bec270bf46ea11601d6a635f49e5661db54e47508693b814a532efb8636ba49c558962142223da0238690d17879b28f7664e969755080f966e51965fab335b8720794023f5f749edf62a2b68cc98ba28510b5753d146a37fdeec9230c1dd07cf8ba446a17a07120d70367a9dd534b560b06129357054cc5f4a20a0a8017bbf282ebc569007f42fbf2e00b5a0aa5649633c16b2cdeec44f315b30e1d12333117c38a60e8b23c3223f31bdd496eefe744a2bfadd385fdf093790595b179e2eb3c976897b3c77380acdeb63e4ce6d16945d77462859839bb83ddfa228433f976d380dde85ce8d83df152e8511da1815d858e2093c0e4de1090fb8e958e3a96a8622d9f674d1f091185a7abe21f349ea2fdb6633d0a9440aceb7d8683112ab46e26f2714cca97d704a6221c59ba85a58d74f1f62e5c2eec5a2709437ccd36b26044ba9efcfa181f19e292826abb6d82d333285067cb575f6d2456534091a4cc3941c21eb531e0afdb2dea79b59bbe8f14839096558ddf6d45bab9c7433104d133dc80fab345a953a8a456e593a91ff7b2795d451ba2451d266e31e0900b32095be09a3bb1d92840315155d3ee0b3e92b3e955c282b0f709440395b312189fd448e3b0367a1ffc0e0a4cb240aeddfada62b305f73c6167c7d05d000b20cd245230c93a713591677dba2298a202c9206aa6b81090ab5a4f68fb91c5739394727ca021c8e7802432436b4bd0a2844b3a2b8c16814ecfc4ad65952cc7fbea553d58048a4c04f2bbea511b5253bee4ecae78291c9e061917a2cf20cb5afb398bf9a372dc8477c4c5f3f144779b5f9a224df6ac0f5aeed7a2669877ba09b52bb8feb668df1f4f5c5c39f8657efb0c8935300b3e0496b693cd9b2c21258119753bd278d8d9ec36b797b01d1d69414a98bbbab750ba316a5428962a4d0f99605b8e5c45b02480e1474af1c9bc05d0d4972cd4cdbbe1014fa0feed82883f301f06fa290f1faca39a3caa61682a1b06fd6cff7bdb3a53e9c2d9d12538d40eeecc4b2ee5b6cce5aecb604ce0aab3c34d1b552b7298e8749a95ae147dac60dfd5a6cf250c51727a3271896d86818cfebd92cd027469c142d176cb061232d6e44176640e2e1568138f190297383e1263e30648c12696addc0ebe8a9af5a5e4f94c863328d6254bb9fa8652f1ffe0c073b3ac18eb0d5729010d1848a99414924ff630ddc4b8e658c99ec23be6bb782e2f55fbd46047a1b42f324c59f09cd6e3e2f58e1db3f99e222085e3712b949fc25331dad3fae15ffdcad01a82d6740a3426bcbe07df7e1afc0b592e646c47b01cdf82042bc9113f88d884e8bc9eaa6eee026911764be90e0f8dffb671819ec8b072b8f5bac5893d92b042f9281c17b722e3e25a3e61c0bfb7bb4ead188324cded2af482656b2698301a2aba6db56a1718f5b3ed169734ce8982a04c6ec664bf0dc6a3c3a1fdc7b03ac83cc5327066ca8522a1dfbb5ce6cd4d81895b86b7142c7f9924e0445ed880c86e0abb8a7a5f089b126f03c37d23576fd85d444ff208bfc88dab5f4f53838cdd5c5aa5d0a26aeb7295f747409b67bd78f1f88d3c8afd0f5072e28a7c07f0350cea086e86e95c40a4f62b404101b85c2c003435083451b8393791ea7abc2c22bac036aefb23fab56b2d5e7b56cd9e543c7242a4d086d7c881df7646e055d61a2a56fa20d0cb04cf6a2694bdbd1a8f8a0e9817d134e6970fede90ef256a6572712a63493841cadcfee419c2e218d3e52177ef6fa90d8292520743e7b15e9191179f92592d5bead71dd769b5000c1b0d6ccb10b72056f7f162cf9ca5b09eb54e0bf8ad2413b5c58ecfe4de5babdcafce76cde62796f93e890e59c200ecf273811113754633cbbffe83b6e65701f2a15a57667297af87b2512dbd82dc43f46060bcbfa7dfb58cdae798fae246a844bb505f70fddd4036723f7ea3028c449b4f539005a68b3935ebdc3e3a1e95688aa1d58488c031af5cf176ea487fc6401679866283abecedffdea36a175bdd51350e177dcb5469990eb04cb391ec967666424c765399a8b5e74ab6a187800540b994c3ed3c91926179c4322eec012691e04bc33a940e471c1c1cd7af2e3672ca640448957a889b5cf28ac7023202c601902ed3c1cf79989d104e26d5bdd32465a8404151cc3278a0f1d6eca415f7ab71911f139af4199b810afde6d18960b30a6f2f9546eaf4153c2da15196fa733907037088f97afc79a85774b1b74c7e65e608fd6ffdc6fe47ce66189dd132fe0dadb35c245cf9121972052924e088fb5445b74149f9e7c46dcb1bd8cac303361d6584bfbefde33d500547a21b91a8c0fe411208242ca89b5ff7ab77b3d6d18923da5613ae5c653378d9554c7a271139bcfd134cf083e757f0eb0d8bdb2b45cc4fd28a6ddbec4275b273c0bd68751306609f2ce119db95dc6d7064b740bed0b027c5bfbce4918ec27a00f63dcf8290a00636ac650e843ed85eca61389f6b294cdd1e8d2630f498e4784d9c9de179d719b733db76719be5f9c7a10a8dd643cd214129c20ae2e7c16f4085503dcd8e0e60d37d1989c0fd1c722ceaea7bfbc46179851e6fe1a0c0aa342c56070a9f35afbc5652dbe99200e8e9a6872aeac7b8fa3430c3789a150e8f1f2ba2b93d35753ae8ff19c8c1c8ef6cb132706af68cf37d2eacf3fa054c41a60bd72291aaa8afa25fe2fa1552358ce40bd34944d1b17453a9adf0b5941a38a1efce2ab6a9fa6abc288a157cb06a15cffce3008ba77a37aaee7cb05e7409af2ac60d7cc5f524d50e8b74938ddacd4be920b6e8e6ff3b0b789f4afcef80711f812116a25c41f67adc6519b26795406d51c072d6f26c28170157e11cb032c892302ac55ea905a3b6c6069e122ca4a4fb49017e87fee85172666e901e7527edc4348eaeaeebc12f5ec4d262fabe85f71f7953d0b94a836cb98f34f1b4c9ddc4550b638f4906c22a29fbd343ea23b7761b4945911ee1ce0cd13776bee780aeaa61798187b6d551bf848b1f99d903baece14108bf1c79a5e24b6ce5599039dc5bbd0908323d6d50c8155431381b22904c3735bb4805c4e240a223dc66e66a9d4caf895db32bbef588fdf3b990b5ee2491e036e8bd3443547a2d68c9d53e71a10c6428e86fe929b0880333ff3333f2a76df0749892285590b8280c2bf1f9524cd8b1883a26fd8b0190e4cc76e15d0514ac1abbe118c11a1017c703ff406fc516f1a6a1ca99c8236c943951be55f469a0b6afea2016d3ea8431e88315d928800791e770fc753e45675e6578c70dbcff8f0282a0a2ff13652b7fff0fec9821b6a21786e1f354c7f61905fd5a956a9e1ad762032d6a2ef182a62d5476d9f1d11053ab0fffc1932ebcc247e3ebefaa995df14a905a40229244ac958ca5cc485be3e6a1ad50818e10594634f0ab4062731afad9782f36f31cb86915298ed94fa7fdc350f66c6212500f6318f05f792e42cffc9e35992fe4de1685ae8331247c0950033321ff618b777278c9b51567e39eff3a9079155a58d9e0b6a30531dff22e393ee913fc4bbb24d3fd3f5b87ef25064c88d9bcbc5c836acf3c76e48e796797f11f4c4e09890cce6b157ad4ef8e15bc202f2bc0a384ca256f9da43f28cd6fb3687350e076f79ddbc80e5a3f73f8a967024e527b0727e55b3d8173d605c3c3fd3c70af84a4b7455c545ca65c64289effb7f70f684654ca46331e3107543bb21bd1e26a922df3c9d7f6255cf45a14eb1d75b54ef5107d4891160e34ae517b0d20c14ab67e1f09ef0d53740b595f07c606e1db051a01213ad993c600c4249df42c51df4fe5dcbe7ffadfe39311fdd2c4735e74de993bfd81f31f1b354f661e60aef0795e17b620e6ba30d50939a2cafd80c33ce5742abf7d041d54c3369a6ff81c7b5bf89a824798c62aa8cbf73669fb14bf86751fcf44507f06139f6237edd590a49837621a708842605839699d1f2f56bc83ff8336c7be4f23e642e29dc5cc875d2d9354a9126ef4d5f7a0d73e5b01615bd664c479081ff26c8136676a65f1fcb4dbffdbb52d25705cce653f4de621c911e98b6a66bc785f6c6c23a95ca4986315a99db133df1ceeb3c85882c5a9301cbb879154b244c7b35c270de009343c6c24069cbff185bc8ef87573ad755f380db0c3cd57211e1c5539d3731a45f7297da9f862e70e56e830f298c35b5a8f3c0e04b3e27d4f0aaf01a00c3709eaeea3d4c60a83de5bcf2b3db566ff203f10b8bea03b0ab958d8b22b67c562af06eb26e16764ea35f5b9cfd74b51446f76fde3131655d327d07664512f3fd25ad18611f8d8107ce181e19560e31e04ffdc6530a48d42cdd092ff4f9ec80edc6b8d1a287f5aefa4ffe4c23f30c8ec9b584a8063cbc2eea7a9af02eb4eaa78fdd2b7308a3b9f44e96010342cf3efabdcbe56906b3d848d97bc383998f4add2b2f4b9b57e13e85e3794f4728be374e64012377161b993416a4136fe058b8b57078050345d99900b68074b4f1f8fc1b66681d8b39b3fba7781a3e6d7e0f90f6b4b7970395d757d5f48720e667a71b1df30d843e4f6e174b961a83bd89d1c4f24a017960cab0df06e46107118e2a627fd00921ed60c19891400945ca460424ce915509c4c30790956b929c247e5069f721ec2b7cdf208bc6d7fec572f92629d4b15690d6b2934f2663aafe650704334c251cf2c95f9706db6aab8df03d4b47b186e6a1d3c14201eeb5983f078b97f74d2477e368b9becbc3f63cfbe62c65c848c2336c8439ddf26ba892af147c816f77670343bb24549c11464b9a560b333068f0e14ac2b200fd5bbf0b22cc07bf84ce73c4f14e80b3a96e7e16e5cb3c2afc9b7c9ddd804f9bfe627951353a4f3da832c2f45dc5295b96ff4d0e1106b428b11f81ed1e6c9af4f1aba5337d10b473dc775ab995f91026f5e09caae2f86c5e6ddd4898c7ddb470c8a126a948857c650e4a8a765c1c729669482c2f95438cc3fcd34dd0ac65b42311f26d4f219183259b7c0978ab0d459e03cd7addb48df9c1fda128d64b9e14a9b001e548d433f6085fb61a66ff9497a2ee8d5e38aba965210506ccc3bbed06abf7bf09505870a41891b7a39ad7bd5fbb45b28a4b25ca3a42144d7814d6a5c6c0251a77559888d3a12aec9fb9933ab56b434fae159a05598f755c9d042ba4dab1d5a3ef6e59b3bc197520b8fea79dcd0ad52a38c82b17b5f43062852ca6a3c6866293be6c5309be38a9b6410135e3ccfbbad8dd044163ff39d5380fee676678e35fe5955e0153d5e3237edb77461520733ddb2768c706a00f5107a69644edea5eacd959dbe21bb693acd1de7c1fede94da4ef454a0928de352a8ec28f89a1f60b972fc8a0e4974c78df634b5b5be629bfda9a1c9bac9fa1241c5033907c30d49d7408549bc41c2514dfe0aead048b0c2bf5561c79066e05bb0a99b793d7ca4576b9c2ee654a29c3c790d51ffeb11cae9f4d47b84f1aae84d8d7330cbd5faac4e040b155266f942a943936399391b5c64286fd094cc891aefd75ec43309055de0491a6ea9c8a91099cdbaa699fdd7b4bd18d404f7d5e96fef3cafc175ac278efdee98ac277cfb6bfbd3164ea78855052925a58d0aa428f7f86816"]}, @nested={0x147, 0xc, 0x0, 0x1, [@generic="eb14c4b43a99bbb14f4a6212fb41c97065c2460163a08262ddefcd64a24deb624cdc4cca7d4c5a183bd2ae03fa71e36a33f296fbbfc5f79d7b02e408a8458568677fd732054a30d9cfae42dd9a798b00d88614069c7f", @typed={0xc, 0x55, 0x0, 0x0, @u64=0x8001}, @generic="0a33784207a92e22889668ac90bd4cd2bff64fe82d31405851013b05a60bebed5f273b8c6fdc09adea5bc54653fc091aa86e9e0adc42044d0aba7caa548c8bdbb9f19b469561835620c7531a65f86547c45ed70be99feb3904342c527f8cc81efdf9635efb20e93987e257ce41743908690a7fe02af90ab7e96ff182224359173d5e83209f8c3faa989c12e5c2077acc1be693326209a6321258ce84adaf4ff05790581724d6abb4e5066f8844d90b8e4048ad360260c27051307b3f702fb4807b4f151eac2f69752f1734bab5c04177b8743495556e059703aa59fb95b24b09d2"]}, @typed={0x6, 0x5b, 0x0, 0x0, @str='-\x00'}, @typed={0xcb, 0x10, 0x0, 0x0, @binary="06485320d5ec773eaf4a3e7fc95433ac42774b09499546406b0b41266089ddcb7fd92c80499b5a655f7de8776d71b054fcd23e63a01927e151a5abe46337991c1e080887127d8af42ccd102475325d97e3608e41f11003dc254dc70e55c4b7679a4986b242b0d1aaea28f705519b009a752e3b3972f322b83649b48d5bb4672db76d3a82bf699dd1264e6f6aa457c5c9e21fa244d1b76e4aea774b60e770ad223a676a651b5d2c64f6c9be9a1f3a68b0f191524ee3dd24455cad0f8516311d253e0f83e6fe580a"}]}, 0x13e0}, 0x1, 0x0, 0x0, 0x1}, 0x8040) [ 518.464275] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 518.501458] FAULT_INJECTION: forcing a failure. [ 518.501458] name failslab, interval 1, probability 0, space 0, times 0 [ 518.526599] CPU: 1 PID: 24699 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 518.534554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.543941] Call Trace: [ 518.546564] dump_stack+0x22c/0x33e [ 518.550336] should_fail.cold+0xa/0x2f [ 518.554353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 518.559480] ? find_held_lock+0x2d/0x110 [ 518.563571] ? sctp_bind_addr_state+0x1db/0x380 [ 518.568283] __should_failslab+0x153/0x1b6 [ 518.572563] should_failslab+0x5/0xf [ 518.576331] kmem_cache_alloc_trace+0x46/0x4b0 [ 518.581041] sctp_add_bind_addr+0x77/0x370 [ 518.585351] sctp_copy_local_addr_list+0x35b/0x520 [ 518.590692] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 518.595469] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 518.600688] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 518.605891] sctp_bind_addr_copy+0xde/0x470 [ 518.610219] __sctp_connect+0x713/0xd40 [ 518.614197] ? sctp_wfree+0x960/0x960 [ 518.617996] ? lock_sock_nested+0xa6/0x110 [ 518.622250] ? mark_held_locks+0xa6/0xf0 [ 518.626342] ? __local_bh_enable_ip+0x159/0x2a0 [ 518.631049] ? sctp_asconf_mgmt+0x380/0x380 [ 518.635368] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 518.640575] ? sctp_asconf_mgmt+0x380/0x380 [ 518.644917] sctp_inet_connect+0x14b/0x1b0 [ 518.649181] __sys_connect+0x265/0x2c0 [ 518.653068] ? __ia32_sys_accept+0xb0/0xb0 [ 518.658255] ? __mutex_add_waiter+0x160/0x160 [ 518.662773] ? vfs_write+0x393/0x540 [ 518.667088] ? fput+0x2b/0x190 [ 518.670300] ? ksys_write+0x1c8/0x2a0 [ 518.674095] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 518.679450] ? trace_hardirqs_off_caller+0x6e/0x210 [ 518.684474] __x64_sys_connect+0x6f/0xb0 [ 518.688640] do_syscall_64+0xf9/0x670 [ 518.692434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.697614] RIP: 0033:0x45de59 [ 518.700799] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.719725] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a 22:00:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 518.727436] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 518.734699] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 518.742051] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 518.749323] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005a [ 518.756584] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x60, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:55 executing program 1 (fault-call:4 fault-nth:91): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 518.822032] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000380)="ba4200ec66b9800000c00f326635000800000f30baf80c66b8cedc188866efbafc0cb80c00ef65f30f090f3266b9800000c00f326635002000000f30bad104b835d1ef66b9b008000066b80010000066ba000000000f30360f208366b80e0000000f23d80f21f86635000000c00f23f8", 0x70}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) socket$l2tp(0x2, 0x2, 0x73) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 518.905127] tmpfs: No value for mount option '©£'vIegleav' [ 518.922707] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 518.955725] FAULT_INJECTION: forcing a failure. [ 518.955725] name failslab, interval 1, probability 0, space 0, times 0 [ 518.982997] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 519.017937] CPU: 0 PID: 24721 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 519.025952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.037826] Call Trace: [ 519.040453] dump_stack+0x22c/0x33e [ 519.044108] should_fail.cold+0xa/0x2f [ 519.048005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 519.053097] ? find_held_lock+0x2d/0x110 [ 519.057152] ? sctp_bind_addr_state+0x1db/0x380 [ 519.061815] __should_failslab+0x153/0x1b6 [ 519.066036] should_failslab+0x5/0xf [ 519.069735] kmem_cache_alloc_trace+0x46/0x4b0 [ 519.074303] sctp_add_bind_addr+0x77/0x370 [ 519.078538] sctp_copy_local_addr_list+0x35b/0x520 [ 519.083457] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 519.088287] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 519.093523] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 519.098815] sctp_bind_addr_copy+0xde/0x470 [ 519.103148] __sctp_connect+0x713/0xd40 [ 519.107129] ? sctp_wfree+0x960/0x960 [ 519.111267] ? lock_sock_nested+0xa6/0x110 [ 519.116394] ? mark_held_locks+0xa6/0xf0 [ 519.120482] ? __local_bh_enable_ip+0x159/0x2a0 [ 519.125239] ? sctp_asconf_mgmt+0x380/0x380 [ 519.129576] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 519.134773] ? sctp_asconf_mgmt+0x380/0x380 [ 519.139082] sctp_inet_connect+0x14b/0x1b0 [ 519.143325] __sys_connect+0x265/0x2c0 [ 519.147212] ? __ia32_sys_accept+0xb0/0xb0 [ 519.151439] ? __mutex_add_waiter+0x160/0x160 [ 519.155941] ? vfs_write+0x393/0x540 [ 519.159660] ? fput+0x2b/0x190 [ 519.162938] ? ksys_write+0x1c8/0x2a0 [ 519.166734] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 519.172345] ? trace_hardirqs_off_caller+0x6e/0x210 [ 519.177784] __x64_sys_connect+0x6f/0xb0 [ 519.181838] do_syscall_64+0xf9/0x670 [ 519.185630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.190805] RIP: 0033:0x45de59 [ 519.193995] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.212885] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 519.220578] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 519.227843] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 519.235110] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 519.242367] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005b [ 519.249625] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:55 executing program 1 (fault-call:4 fault-nth:92): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:55 executing program 3: sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r2, 0xc01864ba, &(0x7f00000001c0)={0x3, 0x6f9, 0x5, 0xc0c0c0c0}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000030c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a02000072"]) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb, 0x0, 0x3fc, 0x0, 0x0, 0x3fffffffffffd], 0x0, 0x11d0}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:00:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4000, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 519.392044] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 519.439110] FAULT_INJECTION: forcing a failure. [ 519.439110] name failslab, interval 1, probability 0, space 0, times 0 [ 519.452273] CPU: 0 PID: 24751 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 519.461146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.472203] Call Trace: [ 519.475339] dump_stack+0x22c/0x33e [ 519.479662] should_fail.cold+0xa/0x2f [ 519.484104] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 519.489883] ? find_held_lock+0x2d/0x110 [ 519.493945] ? sctp_bind_addr_state+0x1db/0x380 [ 519.498611] __should_failslab+0x153/0x1b6 [ 519.503091] should_failslab+0x5/0xf [ 519.506925] kmem_cache_alloc_trace+0x46/0x4b0 [ 519.512095] sctp_add_bind_addr+0x77/0x370 [ 519.518165] sctp_copy_local_addr_list+0x35b/0x520 [ 519.524963] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 519.529779] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 519.535531] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 519.540734] sctp_bind_addr_copy+0xde/0x470 [ 519.545151] __sctp_connect+0x713/0xd40 [ 519.549123] ? sctp_wfree+0x960/0x960 [ 519.553264] ? lock_sock_nested+0xa6/0x110 [ 519.557494] ? mark_held_locks+0xa6/0xf0 [ 519.561560] ? __local_bh_enable_ip+0x159/0x2a0 [ 519.567030] ? sctp_asconf_mgmt+0x380/0x380 [ 519.571808] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 519.577010] ? sctp_asconf_mgmt+0x380/0x380 [ 519.581331] sctp_inet_connect+0x14b/0x1b0 [ 519.586472] __sys_connect+0x265/0x2c0 [ 519.590367] ? __ia32_sys_accept+0xb0/0xb0 [ 519.594957] ? __mutex_add_waiter+0x160/0x160 [ 519.600603] ? vfs_write+0x393/0x540 [ 519.604590] ? fput+0x2b/0x190 [ 519.607790] ? ksys_write+0x1c8/0x2a0 [ 519.612231] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 519.617593] ? trace_hardirqs_off_caller+0x6e/0x210 [ 519.622605] __x64_sys_connect+0x6f/0xb0 [ 519.626664] do_syscall_64+0xf9/0x670 [ 519.630724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.636163] RIP: 0033:0x45de59 [ 519.640142] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.659877] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 519.667765] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 519.675062] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 519.682874] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 519.690156] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005c [ 519.697425] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 519.718078] tmpfs: No value for mount option '©£'vIegleav' 22:00:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x66, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:56 executing program 1 (fault-call:4 fault-nth:93): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x2]}, 0x3}]}, &(0x7f0000000200)=0x10) [ 519.810868] 9pnet: p9_fd_create_tcp (24718): problem connecting socket to 127.0.0.1 [ 519.819984] 9pnet: p9_fd_create_tcp (24755): problem connecting socket to 127.0.0.1 22:00:56 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="687567696e7465726c65617665b957641d28b03a3bfe64bc473d807ee4a129ea5063915bcdd0d6356813e23b38941d9e224646c90f8ce4b36df04acea50f4532ffb15e8594cc33350dc0c611e6fcb12d83e644001f87d99708a284802a48d1f6d579a520ac42079c0dd8449db73907c605e825a99da0c029f70dbd5e3df1e9a7f29a88ed4857dc96d7871f40de0bdd96ffb8471ec250f2232c6591aa31057700000900"/173]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000180)='e\x00', &(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='!.[}}\xa6/\x00', &(0x7f00000002c0)='tmpfs\x00'], &(0x7f0000000380)=[&(0x7f0000000340)='--]\x00'], 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 519.925833] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 519.952801] FAULT_INJECTION: forcing a failure. [ 519.952801] name failslab, interval 1, probability 0, space 0, times 0 [ 520.005585] CPU: 0 PID: 24773 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 520.013531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.019248] tmpfs: Bad mount option huginterleave¹Wd(°:;þd¼G [ 520.023504] Call Trace: [ 520.023535] dump_stack+0x22c/0x33e [ 520.023557] should_fail.cold+0xa/0x2f [ 520.023575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 520.023587] ? find_held_lock+0x2d/0x110 [ 520.023600] ? sctp_bind_addr_state+0x1db/0x380 [ 520.023619] __should_failslab+0x153/0x1b6 [ 520.023632] should_failslab+0x5/0xf [ 520.023646] kmem_cache_alloc_trace+0x46/0x4b0 [ 520.023667] sctp_add_bind_addr+0x77/0x370 [ 520.023688] sctp_copy_local_addr_list+0x35b/0x520 [ 520.041841] tmpfs: Bad mount option huginterleave¹Wd(°:;þd¼G [ 520.045200] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 520.045224] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 520.045246] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 520.045260] sctp_bind_addr_copy+0xde/0x470 [ 520.045277] __sctp_connect+0x713/0xd40 [ 520.107122] ? sctp_wfree+0x960/0x960 [ 520.110942] ? lock_sock_nested+0xa6/0x110 [ 520.115186] ? mark_held_locks+0xa6/0xf0 [ 520.119258] ? __local_bh_enable_ip+0x159/0x2a0 [ 520.123929] ? sctp_asconf_mgmt+0x380/0x380 [ 520.128244] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 520.133426] ? sctp_asconf_mgmt+0x380/0x380 [ 520.137844] sctp_inet_connect+0x14b/0x1b0 [ 520.142071] __sys_connect+0x265/0x2c0 [ 520.145947] ? __ia32_sys_accept+0xb0/0xb0 [ 520.150174] ? __mutex_add_waiter+0x160/0x160 [ 520.154666] ? vfs_write+0x393/0x540 [ 520.158370] ? fput+0x2b/0x190 [ 520.161623] ? ksys_write+0x1c8/0x2a0 [ 520.165429] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 520.170796] ? trace_hardirqs_off_caller+0x6e/0x210 [ 520.175802] __x64_sys_connect+0x6f/0xb0 [ 520.179856] do_syscall_64+0xf9/0x670 [ 520.183655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.188831] RIP: 0033:0x45de59 [ 520.192018] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.211095] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 520.218880] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 520.226137] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 520.233483] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 520.240742] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005d [ 520.248009] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4080, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000380)=0x4) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:56 executing program 1 (fault-call:4 fault-nth:94): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x20000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xe0, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'geneve0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:auditd_etc_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'geneve1\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2f, 0x7, 'system_u:object_r:restorecond_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x41}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2}]}, 0xe0}, 0x1, 0x0, 0x0, 0x8080}, 0x24000000) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x44080, 0x0) iopl(0x77) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1a1) getsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000340), &(0x7f0000000380)=0x4) [ 520.323107] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 520.340978] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4203, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 520.417555] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 520.459917] FAULT_INJECTION: forcing a failure. [ 520.459917] name failslab, interval 1, probability 0, space 0, times 0 [ 520.481722] CPU: 0 PID: 24801 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 520.489996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.499713] Call Trace: [ 520.502312] dump_stack+0x22c/0x33e [ 520.505933] should_fail.cold+0xa/0x2f [ 520.509810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 520.515200] ? find_held_lock+0x2d/0x110 [ 520.519544] ? sctp_bind_addr_state+0x1db/0x380 [ 520.524226] __should_failslab+0x153/0x1b6 [ 520.528471] should_failslab+0x5/0xf [ 520.532183] kmem_cache_alloc_trace+0x46/0x4b0 [ 520.536764] sctp_add_bind_addr+0x77/0x370 [ 520.540993] sctp_copy_local_addr_list+0x35b/0x520 [ 520.545917] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 520.550762] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 520.555951] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 520.561134] sctp_bind_addr_copy+0xde/0x470 [ 520.565450] __sctp_connect+0x713/0xd40 [ 520.569423] ? sctp_wfree+0x960/0x960 [ 520.573401] ? lock_sock_nested+0xa6/0x110 [ 520.577641] ? mark_held_locks+0xa6/0xf0 [ 520.581703] ? __local_bh_enable_ip+0x159/0x2a0 [ 520.586385] ? sctp_asconf_mgmt+0x380/0x380 [ 520.590715] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 520.595899] ? sctp_asconf_mgmt+0x380/0x380 [ 520.600208] sctp_inet_connect+0x14b/0x1b0 [ 520.604441] __sys_connect+0x265/0x2c0 [ 520.608321] ? __ia32_sys_accept+0xb0/0xb0 [ 520.612557] ? __mutex_add_waiter+0x160/0x160 [ 520.617050] ? vfs_write+0x393/0x540 [ 520.620759] ? fput+0x2b/0x190 [ 520.623945] ? ksys_write+0x1c8/0x2a0 [ 520.628046] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 520.633410] ? trace_hardirqs_off_caller+0x6e/0x210 [ 520.638425] __x64_sys_connect+0x6f/0xb0 [ 520.642481] do_syscall_64+0xf9/0x670 [ 520.646621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.651801] RIP: 0033:0x45de59 [ 520.654984] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.674062] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 520.681765] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 520.689162] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 520.696435] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 520.703711] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005e 22:00:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x68, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 520.710983] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c [ 520.767423] tmpfs: No value for mount option '0x0000000000000003' 22:00:57 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) rmdir(&(0x7f0000000180)='./file0\x00') 22:00:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x4]}, 0x3}]}, &(0x7f0000000200)=0x10) [ 520.857505] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x40000, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0xb) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x58, 0x0, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xe481}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8617}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x60000041}, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:57 executing program 1 (fault-call:4 fault-nth:95): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 520.955660] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4403, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 521.046335] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:57 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 521.093954] FAULT_INJECTION: forcing a failure. [ 521.093954] name failslab, interval 1, probability 0, space 0, times 0 [ 521.124997] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 521.134805] CPU: 0 PID: 24842 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 521.142714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.152080] Call Trace: [ 521.154673] dump_stack+0x22c/0x33e [ 521.158297] should_fail.cold+0xa/0x2f [ 521.162203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 521.167311] ? find_held_lock+0x2d/0x110 [ 521.171386] ? sctp_bind_addr_state+0x1db/0x380 [ 521.176047] __should_failslab+0x153/0x1b6 [ 521.180373] should_failslab+0x5/0xf [ 521.184097] kmem_cache_alloc_trace+0x46/0x4b0 [ 521.189048] sctp_add_bind_addr+0x77/0x370 [ 521.193310] sctp_copy_local_addr_list+0x35b/0x520 [ 521.198255] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 521.203116] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 521.208319] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 521.213506] sctp_bind_addr_copy+0xde/0x470 [ 521.217885] __sctp_connect+0x713/0xd40 [ 521.222066] ? sctp_wfree+0x960/0x960 [ 521.225865] ? lock_sock_nested+0xa6/0x110 [ 521.230204] ? mark_held_locks+0xa6/0xf0 [ 521.234874] ? __local_bh_enable_ip+0x159/0x2a0 [ 521.239575] ? sctp_asconf_mgmt+0x380/0x380 [ 521.243917] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 521.249113] ? sctp_asconf_mgmt+0x380/0x380 [ 521.253432] sctp_inet_connect+0x14b/0x1b0 [ 521.257673] __sys_connect+0x265/0x2c0 [ 521.261575] ? __ia32_sys_accept+0xb0/0xb0 [ 521.265808] ? __mutex_add_waiter+0x160/0x160 [ 521.270408] ? vfs_write+0x393/0x540 [ 521.274129] ? fput+0x2b/0x190 [ 521.277326] ? ksys_write+0x1c8/0x2a0 [ 521.281119] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 521.286745] ? trace_hardirqs_off_caller+0x6e/0x210 [ 521.291763] __x64_sys_connect+0x6f/0xb0 [ 521.295831] do_syscall_64+0xf9/0x670 [ 521.299648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.304920] RIP: 0033:0x45de59 [ 521.308230] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.327724] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 521.335703] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 521.343757] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 521.351025] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 521.358299] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005f [ 521.365993] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6b, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:58 executing program 1 (fault-call:4 fault-nth:96): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 521.473923] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:00:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4f8343, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000001c0)=""/54) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 521.609323] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 521.635020] FAULT_INJECTION: forcing a failure. [ 521.635020] name failslab, interval 1, probability 0, space 0, times 0 [ 521.647411] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:58 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6875676539616c776179732c6d706f6c3daab1e5dc7268656176650980c797b2fb59bbc3061caf788a32c8b11c6e353766da7708eb2afa5a5d9a1976"]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x1e, 0x37, 0x2, {0x0, 0x6, 0x100, 0xffffffffffffffff}}, 0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="04000000000053d16656093c918492cc0be78fdcae4330b7432b1d810b16bd0fbf7d942077dbff47e1624a2128323e73238e95b725e8cb815f1945f37689a002f6ca8205c64ddbc22a649253826206710f36f1340d1660ec8b28b21e6bc254d07212240a8e5ad57eac71807925b7b2297b81634c32b6785e6909160d712e66042fc3a031104a72a18d137445d81f5f81cca60b0da72145d72c7e2d29235324992d11d037"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 521.658940] CPU: 1 PID: 24878 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 521.666858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.676233] Call Trace: [ 521.678855] dump_stack+0x22c/0x33e [ 521.682525] should_fail.cold+0xa/0x2f [ 521.686445] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 521.691607] ? find_held_lock+0x2d/0x110 [ 521.696479] ? sctp_bind_addr_state+0x1db/0x380 [ 521.701607] __should_failslab+0x153/0x1b6 [ 521.705871] should_failslab+0x5/0xf [ 521.709850] kmem_cache_alloc_trace+0x46/0x4b0 [ 521.715311] sctp_add_bind_addr+0x77/0x370 [ 521.719594] sctp_copy_local_addr_list+0x35b/0x520 [ 521.724563] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 521.729524] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 521.734948] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 521.740154] sctp_bind_addr_copy+0xde/0x470 [ 521.744479] __sctp_connect+0x713/0xd40 [ 521.748900] ? sctp_wfree+0x960/0x960 [ 521.753497] ? lock_sock_nested+0xa6/0x110 22:00:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0xa]}, 0x3}]}, &(0x7f0000000200)=0x10) [ 521.757777] ? mark_held_locks+0xa6/0xf0 [ 521.761867] ? __local_bh_enable_ip+0x159/0x2a0 [ 521.766582] ? sctp_asconf_mgmt+0x380/0x380 [ 521.781582] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 521.786775] ? sctp_asconf_mgmt+0x380/0x380 [ 521.791360] sctp_inet_connect+0x14b/0x1b0 [ 521.796714] __sys_connect+0x265/0x2c0 [ 521.802449] ? __ia32_sys_accept+0xb0/0xb0 [ 521.806953] ? __mutex_add_waiter+0x160/0x160 [ 521.811728] ? vfs_write+0x393/0x540 [ 521.815799] ? fput+0x2b/0x190 [ 521.818998] ? ksys_write+0x1c8/0x2a0 [ 521.822981] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 521.828523] ? trace_hardirqs_off_caller+0x6e/0x210 [ 521.833562] __x64_sys_connect+0x6f/0xb0 [ 521.837631] do_syscall_64+0xf9/0x670 [ 521.841444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.846662] RIP: 0033:0x45de59 [ 521.849854] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.868756] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 521.876553] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 521.883983] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 521.891296] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 521.898651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000060 22:00:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/307]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x84, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x4}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x20}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000008}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) [ 521.905930] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:58 executing program 1 (fault-call:4 fault-nth:97): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4800, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 522.003982] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 522.044520] FAULT_INJECTION: forcing a failure. [ 522.044520] name failslab, interval 1, probability 0, space 0, times 0 [ 522.065843] tmpfs: No value for mount option 'huge9always' [ 522.083297] CPU: 1 PID: 24895 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 522.091358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.100726] Call Trace: [ 522.103331] dump_stack+0x22c/0x33e [ 522.107052] should_fail.cold+0xa/0x2f [ 522.110940] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.116045] ? find_held_lock+0x2d/0x110 [ 522.120103] ? sctp_bind_addr_state+0x1db/0x380 [ 522.125465] __should_failslab+0x153/0x1b6 [ 522.129695] should_failslab+0x5/0xf [ 522.133417] kmem_cache_alloc_trace+0x46/0x4b0 [ 522.137995] sctp_add_bind_addr+0x77/0x370 [ 522.142247] sctp_copy_local_addr_list+0x35b/0x520 [ 522.147255] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 522.152006] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 522.157196] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 522.162377] sctp_bind_addr_copy+0xde/0x470 [ 522.166750] __sctp_connect+0x713/0xd40 [ 522.170741] ? sctp_wfree+0x960/0x960 [ 522.174544] ? lock_sock_nested+0xa6/0x110 [ 522.178797] ? mark_held_locks+0xa6/0xf0 [ 522.182861] ? __local_bh_enable_ip+0x159/0x2a0 [ 522.187536] ? sctp_asconf_mgmt+0x380/0x380 [ 522.191873] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 522.197073] ? sctp_asconf_mgmt+0x380/0x380 [ 522.201382] sctp_inet_connect+0x14b/0x1b0 [ 522.205607] __sys_connect+0x265/0x2c0 [ 522.209585] ? __ia32_sys_accept+0xb0/0xb0 [ 522.213820] ? __mutex_add_waiter+0x160/0x160 [ 522.218400] ? vfs_write+0x393/0x540 [ 522.222111] ? fput+0x2b/0x190 [ 522.225386] ? ksys_write+0x1c8/0x2a0 [ 522.229178] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 522.234533] ? trace_hardirqs_off_caller+0x6e/0x210 [ 522.239549] __x64_sys_connect+0x6f/0xb0 [ 522.243721] do_syscall_64+0xf9/0x670 [ 522.247558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.252752] RIP: 0033:0x45de59 [ 522.255940] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.274851] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 522.282559] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 522.290512] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 522.297945] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 522.305414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000061 [ 522.312675] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6c, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x9, 0xf1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x200, 0x0, 0x0, 0xfffffffffffffffc]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 522.430923] tmpfs: No value for mount option 'huge9always' 22:00:59 executing program 1 (fault-call:4 fault-nth:98): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:00:59 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES16]) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x3b) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x19d7, 0x4) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r3, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa0008016005c2fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 522.564695] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 522.599614] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 522.676025] FAULT_INJECTION: forcing a failure. [ 522.676025] name failslab, interval 1, probability 0, space 0, times 0 [ 522.733029] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 522.745062] CPU: 0 PID: 24926 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 522.752969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.762408] Call Trace: [ 522.765022] dump_stack+0x22c/0x33e [ 522.768667] should_fail.cold+0xa/0x2f [ 522.772591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.777712] ? find_held_lock+0x2d/0x110 [ 522.781791] ? sctp_bind_addr_state+0x1db/0x380 [ 522.786479] __should_failslab+0x153/0x1b6 [ 522.790758] should_failslab+0x5/0xf [ 522.794491] kmem_cache_alloc_trace+0x46/0x4b0 [ 522.799185] sctp_add_bind_addr+0x77/0x370 [ 522.804491] sctp_copy_local_addr_list+0x35b/0x520 [ 522.809710] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 522.814591] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 522.820003] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 522.825231] sctp_bind_addr_copy+0xde/0x470 [ 522.829597] __sctp_connect+0x713/0xd40 [ 522.833611] ? sctp_wfree+0x960/0x960 [ 522.837449] ? lock_sock_nested+0xa6/0x110 [ 522.841731] ? mark_held_locks+0xa6/0xf0 [ 522.845820] ? __local_bh_enable_ip+0x159/0x2a0 [ 522.850523] ? sctp_asconf_mgmt+0x380/0x380 [ 522.854871] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 522.860258] ? sctp_asconf_mgmt+0x380/0x380 [ 522.864599] sctp_inet_connect+0x14b/0x1b0 [ 522.868863] __sys_connect+0x265/0x2c0 [ 522.872785] ? __ia32_sys_accept+0xb0/0xb0 [ 522.877046] ? __mutex_add_waiter+0x160/0x160 [ 522.881573] ? vfs_write+0x393/0x540 [ 522.885495] ? fput+0x2b/0x190 [ 522.888711] ? ksys_write+0x1c8/0x2a0 [ 522.892554] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 522.896104] tmpfs: No value for mount option 'ÿÿ' [ 522.897960] ? trace_hardirqs_off_caller+0x6e/0x210 [ 522.897985] __x64_sys_connect+0x6f/0xb0 [ 522.898007] do_syscall_64+0xf9/0x670 [ 522.898028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.898049] RIP: 0033:0x45de59 [ 522.926098] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.945024] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 522.952772] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 522.960071] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 522.967924] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 522.975348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000062 [ 522.982723] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:00:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000001c0)=0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000480)={'nat\x00', 0x1000, "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"}, &(0x7f0000000240)=0x1024) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:00:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0xfc]}, 0x3}]}, &(0x7f0000000200)=0x10) 22:00:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x74, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:00:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4c00, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 523.331151] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:00:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x20000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./bus\x00') mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f00000001c0)={0x401, 0x9, 0x8}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000240)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 523.374567] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 523.430039] tmpfs: No value for mount option 'ÿÿ' 22:01:00 executing program 1 (fault-call:4 fault-nth:99): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:01:00 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x101080, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000001c0)={0x71}) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x2, @default, @bpq0='bpq0\x00', 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 523.504043] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 523.529932] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 523.617864] overlayfs: failed to clone upperpath 22:01:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x7a, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:01:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x5500, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) [ 523.715337] FAULT_INJECTION: forcing a failure. [ 523.715337] name failslab, interval 1, probability 0, space 0, times 0 [ 523.744781] overlayfs: failed to clone upperpath [ 523.777029] CPU: 0 PID: 24995 Comm: syz-executor.1 Not tainted 4.19.152-syzkaller #0 [ 523.784975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.794346] Call Trace: [ 523.796952] dump_stack+0x22c/0x33e [ 523.800579] should_fail.cold+0xa/0x2f [ 523.804461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 523.809562] ? find_held_lock+0x2d/0x110 [ 523.813634] ? sctp_bind_addr_state+0x1db/0x380 [ 523.818350] __should_failslab+0x153/0x1b6 [ 523.822723] should_failslab+0x5/0xf [ 523.826445] kmem_cache_alloc_trace+0x46/0x4b0 [ 523.831058] sctp_add_bind_addr+0x77/0x370 [ 523.838056] sctp_copy_local_addr_list+0x35b/0x520 [ 523.843140] ? sctp_inet_bind_verify+0x1f0/0x1f0 [ 523.847932] ? sctp_auth_asoc_copy_shkeys+0x21f/0x2d0 [ 523.853262] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 523.858470] sctp_bind_addr_copy+0xde/0x470 [ 523.862829] __sctp_connect+0x713/0xd40 [ 523.866862] ? sctp_wfree+0x960/0x960 [ 523.870669] ? lock_sock_nested+0xa6/0x110 [ 523.874932] ? mark_held_locks+0xa6/0xf0 [ 523.879427] ? __local_bh_enable_ip+0x159/0x2a0 [ 523.884093] ? sctp_asconf_mgmt+0x380/0x380 [ 523.888412] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 523.893600] ? sctp_asconf_mgmt+0x380/0x380 [ 523.897915] sctp_inet_connect+0x14b/0x1b0 [ 523.902148] __sys_connect+0x265/0x2c0 [ 523.906293] ? __ia32_sys_accept+0xb0/0xb0 [ 523.910531] ? __mutex_add_waiter+0x160/0x160 [ 523.915042] ? vfs_write+0x393/0x540 [ 523.918750] ? fput+0x2b/0x190 [ 523.921939] ? ksys_write+0x1c8/0x2a0 [ 523.925735] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 523.931095] ? trace_hardirqs_off_caller+0x6e/0x210 [ 523.936124] __x64_sys_connect+0x6f/0xb0 [ 523.940183] do_syscall_64+0xf9/0x670 [ 523.943992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.949175] RIP: 0033:0x45de59 [ 523.952378] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.971282] RSP: 002b:00007f73b21a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 523.979084] RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 [ 523.986661] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000004 [ 523.993932] RBP: 00007f73b21a7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 524.001194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000063 [ 524.008473] R13: 00007ffe89678f0f R14: 00007f73b21a89c0 R15: 000000000118bf2c 22:01:00 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f0000000080)={0x5, 0x4, 0x9}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000180)=""/160, 0xa0) ioctl$CHAR_RAW_REPORTZONE(r2, 0xc0101282, &(0x7f0000000440)=ANY=[@ANYBLOB="d1460000000000000a0000000000000062bf886e000000000500000000000000feffffffffffffff1f81fd800000000000000000000000000000000000000000000000000000000000000000000000000600000000000000c20000000000000001010000000000008101082000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000900000000000000010000000100000000070617000000000000000000000000000000000000000000000000000000000000000000000000020000000000000002000000000000000800000000000000040408810000000000000000000000000000000000000000000000000000000000000000000000000800000000000000080000000000000004000000000000000781ff43000000000000000000000000000000000000000000000000000000000000000000000000030000000000000006000000000000000180000000000000040807020000000000000000000000000000000000000000000000000000000000000000000000003300000000000000010000000000000085000000000000001f04ff01000000000000000000000000000000000000000000000000000000000000000000000000010400000000000002000000000000000600000000000000070204050000000000000000000000000000000000000000000000000000000000000000000000000500000000000000800000000000000040000000000000000303028b00000000000000000000000000000000000000000000000000000000000000000000000000000100000000000100000401000000400000000000000001fb00ff0000000000000000000000000000000000000000000000000000000000000000000000008fd31ce0"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x490481, 0x104) 22:01:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000200)=0x10) [ 524.172133] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. [ 524.263414] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 524.296573] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:01:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x2]}, 0x3}]}, &(0x7f0000000200)=0x10) 22:01:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x5803, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:01:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x92, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) 22:01:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x26, 0x1, &(0x7f0000000380)=[{&(0x7f0000000240)="fc67c529cd1ea3c4d6d4b46327c1a61cdeac2ac1ba8189bf2b2d0471709fb149d7bc0fe565215adc59ba7b8a8112670493029f", 0x33, 0x100}], 0x223800, &(0x7f0000000480)={[{'/dev/kvm\x00'}, {'&/!.$'}, {'/dev/kvm\x00'}, {'/dev/kvm\x00'}, {'#&\xb7&'}, {'%%/,'}, {'/dev/kvm\x00'}, {'/dev/kvm\x00'}, {'/dev/kvm\x00'}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@obj_type={'obj_type', 0x3d, '/dev/kvm\x00'}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffffa6067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x5, 0x0, {}, {0xee01}, 0x2, 0x101}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:01:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 524.757090] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 524.864539] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:01:01 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r2 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x1ff, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) [ 524.945376] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:01:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xcb, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=']) [ 525.073149] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:01:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000380)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067c3100020000090400000000000000f6ffffff000000ffffffffffffffe20a0000f2ffff07620a0a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r3, 0xf507, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r4, 0x10f, 0x84, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 22:01:01 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRESOCT]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x40201, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0x95, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 22:01:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x6000, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='usrjquota=s']) 22:01:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) [ 525.331284] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 525.359463] tmpfs: No value for mount option '01777777777777777777777' [ 525.412846] tmpfs: No value for mount option '01777777777777777777777' [ 525.476719] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:01:02 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0x3, 0x4e20, 0x0, @loopback}, 0x1c) [ 525.529290] REISERFS warning (device loop5): super-6515 reiserfs_parse_options: journaled quota format not specified. 22:01:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000002a00)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x4]}, 0x3}]}, &(0x7f0000000200)=0x10) 22:01:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x4, 0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000440)=ANY=[@ANYBLOB="03000000000020c3067d3100020000090400000000000000f6ffffff26067d5b01000000000000ffffffffffffffe2100000f2ffff0700000a00000072"]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x20000004cb]}) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x28) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x7ff, @local, 0xfffffeff}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x5}, @in={0x2, 0x4e24, @private=0xa010101}], 0x48) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f62, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:01:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0xd