[ 36.277167] audit: type=1800 audit(1538602997.197:22): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [ 36.322939] audit: type=1800 audit(1538602997.197:23): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2442 res=0 [ 36.342670] audit: type=1800 audit(1538602997.197:24): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2454 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.5' (ECDSA) to the list of known hosts. 2018/10/03 21:43:25 fuzzer started 2018/10/03 21:43:27 dialing manager at 10.128.0.26:46589 2018/10/03 21:43:27 syscalls: 1 2018/10/03 21:43:27 code coverage: enabled 2018/10/03 21:43:27 comparison tracing: enabled 2018/10/03 21:43:27 setuid sandbox: enabled 2018/10/03 21:43:27 namespace sandbox: enabled 2018/10/03 21:43:27 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/03 21:43:27 fault injection: enabled 2018/10/03 21:43:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/03 21:43:27 net packed injection: enabled 2018/10/03 21:43:27 net device setup: enabled 21:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x1a, &(0x7f0000000140)=ANY=[@ANYBLOB="b4000000000000009400000000000000950000000000000055f10f70eaec44269bfe9ab834811515fc8550513304b4c60bfb267780ed686ce28b596a1424e7d486a56fce1b6f5e087c521c3d727846e23e0d8dee62281b19658c388a28440e95e4463af276c14059999b48fee49283bd29b12dcfe352766c5f61e9dbd737a85dd94db7219f4007a97361565c53c46a2f80216136deec944649274845f6ce684393387964ff94b5b878ca640308bf2bd8375da8fcd834c6545ed1001f077f923db462280ec9bf6721459b2a0ef24e09d05d7afb59c1"], &(0x7f0000000000)='G2L\x00', 0x3, 0xc3, &(0x7f0000000040)=""/195}, 0x48) syzkaller login: [ 205.090376] IPVS: ftp: loaded support on port[0] = 21 21:46:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000001280)=""/20, 0x14}, 0x0) [ 205.326136] IPVS: ftp: loaded support on port[0] = 21 21:46:06 executing program 2: ioprio_set$uid(0x3, 0x0, 0x4000) [ 205.625882] IPVS: ftp: loaded support on port[0] = 21 21:46:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) [ 205.959719] IPVS: ftp: loaded support on port[0] = 21 21:46:07 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) [ 206.220117] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.226733] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.244805] device bridge_slave_0 entered promiscuous mode [ 206.330527] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.337041] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.384101] device bridge_slave_1 entered promiscuous mode [ 206.423613] IPVS: ftp: loaded support on port[0] = 21 [ 206.517862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.648640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 21:46:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000002b00)) [ 206.848310] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.875462] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.888062] device bridge_slave_0 entered promiscuous mode [ 206.995739] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.016589] IPVS: ftp: loaded support on port[0] = 21 [ 207.017155] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.031181] device bridge_slave_1 entered promiscuous mode [ 207.055896] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.094958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.146959] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.159457] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.169624] device bridge_slave_0 entered promiscuous mode [ 207.180841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.190547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.245325] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.264781] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.272090] device bridge_slave_1 entered promiscuous mode [ 207.297264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.311929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.391719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.496563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.535825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.690226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.749942] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.762215] team0: Port device team_slave_0 added [ 207.859374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.879633] team0: Port device team_slave_1 added [ 207.894092] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.909147] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.916939] device bridge_slave_0 entered promiscuous mode [ 207.925455] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.943029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.959941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.986606] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.013734] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.022018] device bridge_slave_1 entered promiscuous mode [ 208.036431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 208.058684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.079549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.107595] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.132496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 208.149835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.166202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.183923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.225550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 208.239469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.265927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.286902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.296816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.325628] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.338660] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.346330] device bridge_slave_0 entered promiscuous mode [ 208.353576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.367973] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.375587] team0: Port device team_slave_0 added [ 208.397854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.419218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.427584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.439246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.447069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.493016] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.501939] team0: Port device team_slave_1 added [ 208.521988] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.528393] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.539976] device bridge_slave_1 entered promiscuous mode [ 208.589470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.650106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.673444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.742081] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.754712] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.770234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.777655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.792760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.805487] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.829704] team0: Port device team_slave_0 added [ 208.836151] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.846947] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.863885] device bridge_slave_0 entered promiscuous mode [ 208.877910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.888322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.907558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.948585] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.955338] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.963128] device bridge_slave_1 entered promiscuous mode [ 208.970724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.983267] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.001940] team0: Port device team_slave_1 added [ 209.059646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.121738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.128937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.140891] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.148810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.163042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.178038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.200735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.222252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.242611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.274854] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.331274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.339244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.366429] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.425831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.438698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.452851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.503218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.519920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.535490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.557225] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.565640] team0: Port device team_slave_0 added [ 209.597355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.649237] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.656809] team0: Port device team_slave_1 added [ 209.670809] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.677168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.683840] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.690210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.713855] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.723982] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.772553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.827901] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.850455] team0: Port device team_slave_0 added [ 209.884998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.901115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.926265] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.939203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.973468] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.991080] team0: Port device team_slave_1 added [ 209.999313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.015813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.029771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.081416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.088787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.097409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.126935] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.133333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.139964] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.146301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.159439] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.168031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.189300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.209318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.224063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.259324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.274360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.284552] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.299063] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.306701] team0: Port device team_slave_0 added [ 210.331096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.342956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.362904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.382604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.391116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.426948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.449909] team0: Port device team_slave_1 added [ 210.542058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.654252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.739244] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.746400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.761639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.807482] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.814149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.820813] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.827154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.863730] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.872808] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.891852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.900028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.919687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.932820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.500660] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.507061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.513748] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.520130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.538179] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.545452] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.553335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.560515] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.566874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.576674] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.909429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.923749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.995344] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.001761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.008386] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.014778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.038581] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.949343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.963721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.212078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.291218] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.583208] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.649595] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.655750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.669647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.899658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.965748] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.981874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.991487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.022983] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.288162] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.302311] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.461459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.554981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.673047] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.688100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.709343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.813554] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.890842] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.935787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.045385] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.181927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.201964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.212645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.291224] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.313188] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.319573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.327943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.522474] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.613011] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.619657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.634443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.725418] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.946887] 8021q: adding VLAN 0 to HW filter on device team0 21:46:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x100) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000080)={0x400000000000000, 0x5000, 0x679d, 0x4, 0x18}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x800) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000100)=@fragment={0xc, 0x0, 0x1, 0x8, 0x0, 0x1f, 0x66}, 0x8) [ 217.340110] hrtimer: interrupt took 19495 ns 21:46:18 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x84, 0x0) r3 = fcntl$getown(r1, 0x9) syz_open_procfs(r3, &(0x7f0000000400)='net/ip_vs\x00') r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r5, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x1) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, &(0x7f00000002c0)={0x3, r5}) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000440)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x401) r10 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000300), 0x0) r11 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r9, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000325bd7000ffdbdf2501000000080001004e20000004000500e7bf97a263066b1bb1989c166199"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$KVM_RUN(r10, 0xae80, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000200), 0x10) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='/dev/audio\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000018ff4), 0xc, &(0x7f0000013ff1)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 217.470743] mmap: syz-executor0 (7505) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 217.521187] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 21:46:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000997000/0x3000)=nil) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000040)) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x600800) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x4, 0x4, 0x7, 0x0, 0x2, 0x7fffffff, 0x6, 0x9, 0xbd9, 0x100, 0xfffffffffffff000, 0x5}) [ 217.849386] sched: DL replenish lagged too much 21:46:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) socketpair(0xf, 0xe52aaaca84ca6720, 0xfffffffffffffffd, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, &(0x7f0000000380)={0x2, 0x0, @local}, &(0x7f00000003c0)=0x10, 0x80000) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4140, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x14) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000400)={0x9, 0xfff, 0x9, 0x9, 0x2, 0x36}, 0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0xff, 0x8002, 0x0, 0x100, r4}, 0x10) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r5, 0x8910, &(0x7f0000000280)="153f6234488dd25d766070") r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) write$P9_RREADDIR(r6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x122) 21:46:19 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000140)=0x80) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0xb, 0xfff, 0xd4, "58d57253cb93e01512d057ce281f1612f182cbe96d9976065213496c844da1609a1952620f148be6cece830a7eef48143b424ca7a94d955af5c18b2213dad30221adeafa4a46e2410bd1093ea5f6dc28ed68632afb6ae451c8de4d51b13ce62370e8b4d0d97be80f66bb7f4a90194ea233c3e469c44eaa30942dba504041c3fbe3e6f1a079b4129101e9c49b4ff0fbf20b2bed9ae96e25a5faa20e7e2b71dd673b1713897c4509e86b75709ad7f64dcccc9c169ff796161f8da2fde4249fbcf78341ee6485b394e5e26feb4fa9ab0f6073f30399"}, 0xde, 0x3) read(r0, &(0x7f0000000040)=""/187, 0xbb) 21:46:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x7, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000680)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}]}, 0x108) 21:46:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x408800, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@loopback, @rand_addr, 0x0}, &(0x7f0000000180)=0xc) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000300), 0x2) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getaddr={0x3c, 0x16, 0x800, 0x70bd26, 0x25dfdbfc, {0x2, 0xb8, 0x401, 0xff, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_LABEL={0x14, 0x3, 'ip6gretap0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="28010000170001000000000000000000e0000001000000000000000000000000000000000000000000000000000000000000ffffac1414007f000001000000000000000000000000fe8000000000000000000000000000aa00000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000eaffff0952ffffffe00000010000000000000000000000000000000000000000020000000000000019fe938bc31e3dca80d726984d35bc239006880af04f207a962a34d099c3b56f455ed228f5203da257365bee582ac671d7dd7e8a115527878bc0561685220f49891685ac6b00fbfa66f257e041c7292c6c0506f6ef4300000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x128}}, 0x0) [ 218.727410] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:46:19 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x2000000021, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f00000003c0)={0x0, 0x0, 0xfdfdffff}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) 21:46:20 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x2, 0x2, &(0x7f0000000080)=0x2}) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 21:46:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)={0x0, 0x2, 0x5, 0x1, 0x1}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7ffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r3, &(0x7f0000000440)="b3", &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') setns(r4, 0x4000000) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xffffffffffffffc1, 0x10000) 21:46:20 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x84, 0x0) r3 = fcntl$getown(r1, 0x9) syz_open_procfs(r3, &(0x7f0000000400)='net/ip_vs\x00') r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r5, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x1) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, &(0x7f00000002c0)={0x3, r5}) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000440)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x401) r10 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000300), 0x0) r11 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r9, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000325bd7000ffdbdf2501000000080001004e20000004000500e7bf97a263066b1bb1989c166199"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$KVM_RUN(r10, 0xae80, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000200), 0x10) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='/dev/audio\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000018ff4), 0xc, &(0x7f0000013ff1)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 21:46:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x7, &(0x7f00000002c0)=[{}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xc0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f00000000c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000300)) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e23, @multicast1}, 0x10) getsockname$inet(r0, &(0x7f00000003c0), &(0x7f0000000380)=0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_netdev_private(r1, 0x89fc, &(0x7f0000000140)="a536ee753df80872701a83aa466f4e79f798a59a92056f8c61e808decfa30be23a03979b61e15dc1ace8fc2c6f99fbddde17fda48b") getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000740)=""/106, &(0x7f0000000080)=0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0xfffffffffffffff7, 0x40000007fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 21:46:20 executing program 1: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x200000000000000, 0xffffff2f, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0xb}}, 0xffffff2c) 21:46:20 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000280)) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/211) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0xbe, &(0x7f0000000300)="6ff1a86487e1831e00547d59830b", &(0x7f0000000600)=""/190, 0x1ff}, 0x28) 21:46:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x565c, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) sendfile(r0, r1, &(0x7f0000002000), 0xffffffff000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000380)=0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) 21:46:20 executing program 3: userfaultfd(0x80000) r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) rmdir(&(0x7f0000000000)='./file0\x00') r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8000, 0x400a00) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x10000, 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="3297e0048854a6c08e2fe300000000000038fd0000000000c5de178c33fb6c3318d6ac2bd53329267bb8ee8c2a4441e160f97d2c91a4ccdcde8c813cc3e8fa903f33e71e46589cc1a175ecffec871e468abecf71be9caa9cb67e1120ac83f6e86207bb422f10b38027bc3fa9e33a8f90155a51d87d017be51dc9478e") r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80000000004, 0x80000000000000) ioctl$FS_IOC_FSGETXATTR(r2, 0x41045508, &(0x7f00000001c0)) 21:46:20 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r2 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) bind$xdp(r0, &(0x7f0000000440)={0x2c, 0x4, r1, 0xc, r2}, 0x10) r3 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) read(r3, &(0x7f0000000240)=""/195, 0xc3) dup2(r3, r4) 21:46:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x800000, 0x6}) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x48431e6e}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x200000) write$FUSE_WRITE(r1, &(0x7f0000000140)={0x18, 0x0, 0x1, {0x101}}, 0x18) r2 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) [ 219.486288] kauditd_printk_skb: 6 callbacks suppressed [ 219.486301] audit: type=1800 audit(1538603180.437:31): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16535 res=0 [ 219.618949] audit: type=1804 audit(1538603180.457:32): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir807474909/syzkaller.yNFauC/1/file0" dev="sda1" ino=16535 res=1 [ 219.626604] NOHZ: local_softirq_pending 08 21:46:20 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x1, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f00000002c0)={0x78, 0x0, 0x5, {0xd589, 0x7, 0x0, {0x0, 0x1b1c, 0x10001, 0x3, 0x6, 0x3, 0x5, 0x5, 0x9, 0x35, 0xd1cb, r1, r2, 0xbe, 0x61}}}, 0x78) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f0000000340)="fc00000048000711ab092500090700000a060040030000000000369321000100ff0100000005b20000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205215000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873ceadcca66450fbbabe564f2ea32763d78de5830fa3cc9196ccf2f2a442e300b577e382c4621227d960520127792ba64b9bb4170ff3fed2724aaf157c3077a54f677d7b99cde0902ddae4ef247fb311430cc4eee33790576de57", 0x150) 21:46:20 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80044100, &(0x7f0000001f64)) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/connector\x00') 21:46:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="f36e0f20e06635002000000f22e00f30f20f1024660fdb03b894008ed00f20d86635200000000f22d80f35650f01c90f30", 0x31}], 0x241, 0x0, &(0x7f0000000600), 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x48000, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000180)={0x2a, 0x9, 0x4, 0x1, 0xb, 0x40, 0x3, 0xce, 0x1}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:46:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0xa}, 0xfffffffffffffd60) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) epoll_create(0x6) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)) ioctl(r1, 0x1, &(0x7f0000000280)="74d927490922e1cfd769997406f7b823ee27ed09f0af918853475efb4f5f7f064e7816909f3fc9bfba47ea5cc6e24fe093ea45d46be5f13b1f13b3f33a4e76c0668ab7ae1b97ab26c103dd95f50ed69ac4b0a2fdba92a1610c49bcbfd511c847c3ff5adf4ce47df835353cc4b974834b6c50eaf218984477682d93fba7502c7754f13004f67e85ceff36eb29a4fbdae91ed3ed1fbc4573970576891ad1274fe9c9922c8eb7e2b8c40ba40902a5ff8ed92a100e2cfc64586823fa4fe89b173e62fa1fd5136819b98d872e01ea66df0771ba617337b95607edd3") r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0xfbc5, 0x2000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000400)={{0x2, 0x4e23, @broadcast}, {0x6, @dev={[], 0x13}}, 0x42, {0x2, 0x4e22}, 'veth0_to_bridge\x00'}) write$P9_RMKDIR(r2, &(0x7f0000000140)={0x14, 0x49, 0x1, {0x44, 0x3, 0x1}}, 0x14) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x126) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) 21:46:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffa000/0x1000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xcacd, 0x400) write$vnet(r3, &(0x7f0000000400)={0x1, {&(0x7f0000000140)=""/19, 0x13, &(0x7f00000002c0)=""/181, 0xffffffffffffffff, 0x7}}, 0x68) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl$KVM_SET_GUEST_DEBUG(r2, 0xc018ae85, &(0x7f0000000080)) 21:46:21 executing program 4: r0 = add_key$keyring(&(0x7f0000001200)='keyring\x00', &(0x7f0000001240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_crypto(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@delrng={0x10, 0x14, 0x200, 0x70bd26, 0x25dfdbfe, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) keyctl$setperm(0x5, r0, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100), 0x0, r0) [ 220.295926] audit: type=1804 audit(1538603181.247:33): pid=7712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir807474909/syzkaller.yNFauC/1/file0" dev="sda1" ino=16535 res=1 [ 220.369448] syz-executor5 (7712) used greatest stack depth: 16208 bytes left [ 220.383350] syz-executor5 (7706) used greatest stack depth: 14032 bytes left 21:46:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x565c, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) sendfile(r0, r1, &(0x7f0000002000), 0xffffffff000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000380)=0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) 21:46:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="f36e0f20e06635002000000f22e00f30f20f1024660fdb03b894008ed00f20d86635200000000f22d80f35650f01c90f30", 0x31}], 0x241, 0x0, &(0x7f0000000600), 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x48000, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000180)={0x2a, 0x9, 0x4, 0x1, 0xb, 0x40, 0x3, 0xce, 0x1}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:46:23 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='cpuset.effective_cpus\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000a00)='./file0//ile0\x00', &(0x7f0000000a40)='security.SMACK64EXEC\x00', &(0x7f0000000a80)='port1\x00', 0x6, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000b80)={0x1002, 0x0, 0x0, 0xfffffffffffffff9, 0x80000001}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000900)={&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000500)=""/251, 0xfb}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f0000000700)=""/157, 0x9d}], 0x4, &(0x7f00000008c0)=""/3, 0x3, 0x84}, 0x0) getsockname$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240), 0x31b, 0x0, &(0x7f0000000280), 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r2, 0x400, 0x3) pipe2(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) futimesat(r4, &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={{}, {0x0, 0x7530}}) write$selinux_attr(r4, &(0x7f0000000b40)='system_u:object_r:policy_src_t:s0\x00', 0x22) rmdir(&(0x7f0000000340)='./file0//ile0\x00') setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f00000000c0), 0x4) 21:46:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000a0a07021dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) r2 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="0350738ef77a127708d72b1ca1e5a3969ab28785c7fe8f04460fa11ca6acd413f468683c9fea9b1585e044fd8f94e3a394185f94dd158c2838bbf3f2088b12ac", 0x40, 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='/dev/zero\x00', r2) 21:46:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000040)=""/89) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x705000) 21:46:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x565c, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) sendfile(r0, r1, &(0x7f0000002000), 0xffffffff000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000380)=0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) 21:46:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) recvmmsg(r0, &(0x7f0000003c40)=[{{&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000240)=""/216, 0xd8}, {&(0x7f00000000c0)=""/20, 0x14}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000500)=""/219, 0xdb}, {&(0x7f0000000600)=""/208, 0xd0}], 0x5, &(0x7f0000000780)=""/67, 0x43, 0x100}, 0x8}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000800)=""/192, 0xc0}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000009c0)=""/67, 0x43}, {&(0x7f0000000a40)=""/134, 0x86}, {&(0x7f0000000140)=""/64, 0x40}, {&(0x7f0000000b00)=""/120, 0x78}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000d00)=""/111, 0x6f}, {&(0x7f0000000d80)=""/98, 0x62}], 0xa, &(0x7f0000000ec0)=""/193, 0xc1, 0x1}, 0x4}, {{&(0x7f0000000fc0)=@can, 0x80, &(0x7f0000001200)=[{&(0x7f0000001040)=""/208, 0xd0}, {&(0x7f0000001140)=""/165, 0xa5}], 0x2, &(0x7f0000001240)=""/142, 0x8e, 0x1}, 0x9}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000001300)=""/41, 0x29}, {&(0x7f0000001340)=""/81, 0x51}, {&(0x7f00000013c0)=""/86, 0x56}, {&(0x7f0000001440)=""/30, 0x1e}, {&(0x7f0000001480)}, {&(0x7f00000014c0)=""/27, 0x1b}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/58, 0x3a}, {&(0x7f0000002540)=""/145, 0x91}], 0x9, &(0x7f00000026c0)=""/4096, 0x1000, 0xfffffffffffffffa}, 0x3}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f00000036c0)=""/71, 0x47}, {&(0x7f0000003740)=""/94, 0x5e}], 0x2, &(0x7f0000003800)=""/153, 0x99, 0x7f}, 0x80000000}, {{&(0x7f00000038c0)=@ax25, 0x80, &(0x7f0000003b00)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000003940)=""/191, 0xbf}, {&(0x7f0000003a00)=""/240, 0xf0}], 0x3, &(0x7f0000003b40)=""/232, 0xe8, 0x3}, 0x777}], 0x6, 0x20, &(0x7f0000003dc0)={0x77359400}) getsockname$llc(r3, &(0x7f0000003e00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000003e40)=0x10) r4 = mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000009, 0x36032, r2, 0x18) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x14, 0x0, &(0x7f0000003e80)=[@increfs_done={0x40106308, r4}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000180)={0x3, 0x9}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000000"], 0x14}}, 0x0) socket(0x7, 0x807fe, 0x8000000) [ 222.479843] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. [ 222.497823] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 21:46:23 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket(0x10, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x12, 0x1, 0x6d}) sendfile(r0, r1, &(0x7f00000000c0), 0x4000000000000003) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000000)) [ 222.516930] audit: type=1800 audit(1538603183.467:34): pid=7771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16520 res=0 [ 222.537303] audit: type=1804 audit(1538603183.497:35): pid=7771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir807474909/syzkaller.yNFauC/2/file0" dev="sda1" ino=16520 res=1 [ 222.612514] binder: 7770:7772 BC_INCREFS_DONE node 1 has no pending increfs request [ 222.616752] audit: type=1800 audit(1538603183.517:36): pid=7773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16537 res=0 21:46:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r4, 0x0, 0x2000000000000081, &(0x7f0000013ff4)={@loopback, @rand_addr, @multicast2}, 0x78) close(r4) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r4, r5, 0x0) 21:46:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001740)=[@textreal={0x8, &(0x7f00000014c0)="0fb64d0f0f01760dba4300b8ff00ef0f2328baf80c66b8d48ba28166efbafc0c66b80000000066efbaf80c66b896848e8766efbafc0ced66b9010000000f320f20c06635100000000f22c0660f00170f0119", 0x52}], 0x1, 0x20, &(0x7f0000001980), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 222.640619] audit: type=1804 audit(1538603183.517:37): pid=7766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir547650556/syzkaller.KsNOST/8/file0" dev="sda1" ino=16537 res=1 [ 222.649775] binder: 7770:7772 ioctl 401070c9 20000180 returned -22 21:46:23 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8408a) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) r2 = fcntl$getown(r1, 0x9) r3 = getpgid(r2) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x8, 0x9, 0x3, 0x8, 0x0, 0x4f, 0x800, 0x4, 0x81, 0x3ff, 0x81, 0x100, 0x4, 0x9, 0x7, 0x401, 0x80000001, 0x0, 0x5, 0xff, 0x23, 0x5, 0x47b, 0x5, 0x7, 0x1, 0x0, 0x4, 0xb748, 0x3, 0x1000, 0x301, 0xffffffffffff0000, 0x3f, 0x7fff, 0x25, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x1201, 0xfff, 0x101, 0x0, 0x4102, 0x3, 0xfffffffffffffffc}, r3, 0x7, r0, 0x2) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000180)=0x4, 0x4) ioctl$RTC_WIE_OFF(r0, 0x7010) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x6bf2cb8}, 0x2) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000001c0)) fallocate(r0, 0x10, 0x0, 0xa343) 21:46:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) write$input_event(r2, &(0x7f00000000c0)={{}, 0x13, 0x4, 0xfffffffffffffffd}, 0x18) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000280)="290000002000190000003fffffffda060200000000e80001060000040d000300ea1100000005000000", 0x29}], 0x1) [ 223.299026] syz-executor5 (7759) used greatest stack depth: 13064 bytes left [ 223.320467] binder_alloc: binder_alloc_mmap_handler: 7770 20000000-20002000 already mapped failed -16 [ 223.330564] binder: BINDER_SET_CONTEXT_MGR already set [ 223.337654] binder: 7770:7806 BC_INCREFS_DONE u0000000000000000 no match 21:46:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x565c, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d", 0x200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) sendfile(r0, r1, &(0x7f0000002000), 0xffffffff000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000380)=0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) 21:46:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) timerfd_create(0x6, 0x2000800) listen(r0, 0x4) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x8000, 0x8, 0x20, 0x1a, 0x4, 0x0, 0x0, 0x28d7c25c, 0x3}, 0xb) capget(&(0x7f0000000040)={0x200f1526, r2}, &(0x7f0000000080)={0x30000, 0x1, 0x9, 0x0, 0x1}) 21:46:24 executing program 4: prctl$intptr(0x0, 0x0) geteuid() ioprio_get$uid(0x0, 0x0) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getgroups(0x0, &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) getgroups(0x0, &(0x7f0000001e00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000002040)) getgroups(0x0, &(0x7f0000002080)) socket$inet6_udp(0xa, 0x2, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002100)=0x14) signalfd(0xffffffffffffff9c, &(0x7f0000002140), 0x8) mq_open(&(0x7f0000002180)='net/ip_tables_names\x00', 0x0, 0x0, &(0x7f00000021c0)) accept(0xffffffffffffff9c, &(0x7f0000002200)=@hci, &(0x7f0000002280)=0x80) openat$md(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/md0\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000002300)={0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000002340)) openat$md(0xffffffffffffff9c, &(0x7f0000002380)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000023c0)='/dev/null\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000002400)='/dev/ppp\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002700)=@abs, &(0x7f0000002780)=0x6e) syz_open_dev$vcsa(&(0x7f00000027c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) getgroups(0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000002900)='net/tcp6\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002980), &(0x7f00000029c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000002a00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a40)) lstat(&(0x7f0000002a80)='./file0\x00', &(0x7f0000002ac0)) openat$nullb(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/nullb0\x00', 0x0, 0x0) mq_open(&(0x7f0000002b80)='$\x00', 0x0, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000002bc0)='/dev/vhci\x00', 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/vhost-net\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000002c40)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000002c80)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000002cc0)) syz_open_dev$sndseq(&(0x7f0000002d00)='/dev/snd/seq\x00', 0x0, 0x0) inotify_init() accept$unix(0xffffffffffffffff, &(0x7f0000002d40)=@abs, &(0x7f0000002dc0)=0x6e) syz_open_dev$binder(&(0x7f0000002e00)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002e40)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000003340)='vmnet1&$\x00', 0x0, 0x0, &(0x7f0000003380)) openat$zero(0xffffffffffffff9c, &(0x7f00000033c0)='/dev/zero\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003400)) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket$inet_udp(0x2, 0x2, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000003440)='/dev/urandom\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000003480)='/dev/cuse\x00', 0x2, 0x0) socket(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000034c0), 0x2c) openat$full(0xffffffffffffff9c, &(0x7f0000003500)='/dev/full\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000047c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000004800)='/dev/rtc#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000004840)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000048c0)=0x80) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000004900)='cgroup.threads\x00', 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000ce80)) getpid() lstat(&(0x7f000000d1c0)='./file0\x00', &(0x7f000000d200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f000000d280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f000000d2c0), &(0x7f000000d300)=0xc) syz_open_dev$dmmidi(&(0x7f000000d340)='/dev/dmmidi#\x00', 0x0, 0x0) open(&(0x7f000000d380)='./file0\x00', 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f000000d3c0)) lstat(&(0x7f000000d440)='./file0\x00', &(0x7f000000d480)) openat$snapshot(0xffffffffffffff9c, &(0x7f000000d740)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f000000d780)='/dev/input/mouse#\x00', 0x0, 0x0) getpid() getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f000000d7c0)) getegid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f000000d800)='./file0\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket$unix(0x1, 0x0, 0x0) syz_open_dev$mouse(&(0x7f000000d840)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f000000d880)='/dev/audio#\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f000000d8c0)='/dev/dsp#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f000000d900)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f000000d940), 0x0) openat$audio(0xffffffffffffff9c, &(0x7f000000d980)='/dev/audio\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000da80), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_names\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xfffffffffffffdfa) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000440)=""/236, &(0x7f0000000280)=0xec) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 21:46:24 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) unshare(0x400) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0xff500000}, 0x6) r1 = getuid() fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x101, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000140)="ce8bf55fa827f84abc6b3038ee15bdecebda6e1678750bab8b6349865c0c36f05bcd6ef5ef3640936995703f03fc791fcbb2052674b6f0c3dda0175999e92cf0874a0d4f2ba684146bdf9d38674fb1119256d064a035ba1994873cbc19abc497ed44fd5c03450a291ea21809028e68df7c8349e0b52ed7ca2fd893f5266603792c02e001293339da0e68074d9eb85e48fceeb586ab4f7c", 0x97, 0xda}, {&(0x7f0000000340)="ed3996bac96369e6b89208d323ac0993283ba5b503c4262b4c90d1b54fd22e33bad47683277cf066138c670e1954dba7892b18441aeb1e6c5d3f77aa8dd420464b59425924004ff2afb6e8253071d0eb785a251e105c6ffb41db58d10cf232763a0cd2ce1437aa", 0x67, 0x1}], 0x800400, &(0x7f0000000480)=ANY=[@ANYBLOB='dax,uid<', @ANYRESDEC=r1, @ANYBLOB="2c61707072616973655f74797065ee696d617369672c657569643e", @ANYRESDEC=r2, @ANYBLOB=',fsmagic=0x0000000000000001,\x00']) 21:46:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000400)="153f6234488d6d5d766070") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) r2 = dup3(r0, r0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000040)=0xd, 0x4) 21:46:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) recvmmsg(r0, &(0x7f0000003c40)=[{{&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000240)=""/216, 0xd8}, {&(0x7f00000000c0)=""/20, 0x14}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000500)=""/219, 0xdb}, {&(0x7f0000000600)=""/208, 0xd0}], 0x5, &(0x7f0000000780)=""/67, 0x43, 0x100}, 0x8}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000800)=""/192, 0xc0}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000009c0)=""/67, 0x43}, {&(0x7f0000000a40)=""/134, 0x86}, {&(0x7f0000000140)=""/64, 0x40}, {&(0x7f0000000b00)=""/120, 0x78}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000d00)=""/111, 0x6f}, {&(0x7f0000000d80)=""/98, 0x62}], 0xa, &(0x7f0000000ec0)=""/193, 0xc1, 0x1}, 0x4}, {{&(0x7f0000000fc0)=@can, 0x80, &(0x7f0000001200)=[{&(0x7f0000001040)=""/208, 0xd0}, {&(0x7f0000001140)=""/165, 0xa5}], 0x2, &(0x7f0000001240)=""/142, 0x8e, 0x1}, 0x9}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000001300)=""/41, 0x29}, {&(0x7f0000001340)=""/81, 0x51}, {&(0x7f00000013c0)=""/86, 0x56}, {&(0x7f0000001440)=""/30, 0x1e}, {&(0x7f0000001480)}, {&(0x7f00000014c0)=""/27, 0x1b}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/58, 0x3a}, {&(0x7f0000002540)=""/145, 0x91}], 0x9, &(0x7f00000026c0)=""/4096, 0x1000, 0xfffffffffffffffa}, 0x3}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f00000036c0)=""/71, 0x47}, {&(0x7f0000003740)=""/94, 0x5e}], 0x2, &(0x7f0000003800)=""/153, 0x99, 0x7f}, 0x80000000}, {{&(0x7f00000038c0)=@ax25, 0x80, &(0x7f0000003b00)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000003940)=""/191, 0xbf}, {&(0x7f0000003a00)=""/240, 0xf0}], 0x3, &(0x7f0000003b40)=""/232, 0xe8, 0x3}, 0x777}], 0x6, 0x20, &(0x7f0000003dc0)={0x77359400}) getsockname$llc(r3, &(0x7f0000003e00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000003e40)=0x10) r4 = mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000009, 0x36032, r2, 0x18) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x14, 0x0, &(0x7f0000003e80)=[@increfs_done={0x40106308, r4}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000180)={0x3, 0x9}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000000"], 0x14}}, 0x0) socket(0x7, 0x807fe, 0x8000000) [ 223.344743] binder: 7770:7784 ioctl 40046207 0 returned -16 [ 223.345263] binder_alloc: 7770: binder_alloc_buf, no vma [ 223.352357] binder: 7770:7805 ioctl 401070c9 20000180 returned -22 [ 223.357594] binder: 7770:7806 transaction failed 29189/-3, size 0-0 line 2973 [ 223.371234] binder: send failed reply for transaction 2 to 7770:7772 [ 223.377883] binder: undelivered TRANSACTION_ERROR: 29189 [ 223.468510] binder: 7818:7819 BC_INCREFS_DONE node 4 has no pending increfs request [ 223.481241] audit: type=1800 audit(1538603184.437:38): pid=7824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16535 res=0 [ 223.507174] XFS (loop5): unknown mount option [uid<00000000000000000000]. 21:46:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) recvmmsg(r0, &(0x7f0000003c40)=[{{&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000240)=""/216, 0xd8}, {&(0x7f00000000c0)=""/20, 0x14}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000500)=""/219, 0xdb}, {&(0x7f0000000600)=""/208, 0xd0}], 0x5, &(0x7f0000000780)=""/67, 0x43, 0x100}, 0x8}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000800)=""/192, 0xc0}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000009c0)=""/67, 0x43}, {&(0x7f0000000a40)=""/134, 0x86}, {&(0x7f0000000140)=""/64, 0x40}, {&(0x7f0000000b00)=""/120, 0x78}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000d00)=""/111, 0x6f}, {&(0x7f0000000d80)=""/98, 0x62}], 0xa, &(0x7f0000000ec0)=""/193, 0xc1, 0x1}, 0x4}, {{&(0x7f0000000fc0)=@can, 0x80, &(0x7f0000001200)=[{&(0x7f0000001040)=""/208, 0xd0}, {&(0x7f0000001140)=""/165, 0xa5}], 0x2, &(0x7f0000001240)=""/142, 0x8e, 0x1}, 0x9}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000001300)=""/41, 0x29}, {&(0x7f0000001340)=""/81, 0x51}, {&(0x7f00000013c0)=""/86, 0x56}, {&(0x7f0000001440)=""/30, 0x1e}, {&(0x7f0000001480)}, {&(0x7f00000014c0)=""/27, 0x1b}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/58, 0x3a}, {&(0x7f0000002540)=""/145, 0x91}], 0x9, &(0x7f00000026c0)=""/4096, 0x1000, 0xfffffffffffffffa}, 0x3}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f00000036c0)=""/71, 0x47}, {&(0x7f0000003740)=""/94, 0x5e}], 0x2, &(0x7f0000003800)=""/153, 0x99, 0x7f}, 0x80000000}, {{&(0x7f00000038c0)=@ax25, 0x80, &(0x7f0000003b00)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000003940)=""/191, 0xbf}, {&(0x7f0000003a00)=""/240, 0xf0}], 0x3, &(0x7f0000003b40)=""/232, 0xe8, 0x3}, 0x777}], 0x6, 0x20, &(0x7f0000003dc0)={0x77359400}) getsockname$llc(r3, &(0x7f0000003e00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000003e40)=0x10) r4 = mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000009, 0x36032, r2, 0x18) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x14, 0x0, &(0x7f0000003e80)=[@increfs_done={0x40106308, r4}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000180)={0x3, 0x9}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000000"], 0x14}}, 0x0) socket(0x7, 0x807fe, 0x8000000) [ 223.517636] binder: 7818:7831 ioctl 401070c9 20000180 returned -22 [ 223.556299] audit: type=1804 audit(1538603184.437:39): pid=7824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir547650556/syzkaller.KsNOST/9/file0" dev="sda1" ino=16535 res=1 [ 223.594140] binder: BINDER_SET_CONTEXT_MGR already set 21:46:24 executing program 3: seccomp(0x1, 0x1, &(0x7f0000000240)={0x7, &(0x7f0000000140)=[{0xf78, 0x2, 0x8, 0xfffffffffffffffa}, {0x1f, 0x1, 0x8, 0x80}, {0xffff, 0x9ba, 0x6, 0x7}, {0xb65, 0x82d, 0xfffffffffffff749, 0xfffffffffffffffd}, {0x4, 0x0, 0xfff, 0x7f}, {0x539, 0x5, 0x9, 0x9}, {0x6, 0xfffffffffffffff7, 0x4, 0xffffffff}]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) [ 223.606478] binder: 7838:7840 ioctl 40046207 0 returned -16 21:46:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') ioctl$sock_bt(r0, 0x541b, &(0x7f0000000040)="52ce6df0896164bec38a760857e30829c1fd1b343498b68b7c6fd76f384f4c1c34fc3cef0d9875c843") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0x5, @local, 0x7}}, 0x20, 0x8000, 0x6, "a9f6376ac77645ee8114fa14596b829454f9fdbdb9f036de9bd1d8f384eca2278498bb4ed096db2f75ff8cebcec0a1b1e987b38a94bd376fc8f99539e5feae6d9a381ccfd94d1148e295854f149b1971"}, 0xd8) close(r0) [ 223.655397] binder: 7838:7840 BC_INCREFS_DONE u0000000000000000 no match [ 223.694887] binder: 7838:7840 ioctl 401070c9 20000180 returned -22 21:46:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x20000440) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), 0x14) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x6, 0x2, 0x1, 0xe, 0x2, 0xffffffffffffff81, 0x4}, 0x20) 21:46:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x0, @broadcast}], 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x400) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000006c0)={{0x9, 0x432}, 'port0\x00', 0x20, 0x2, 0x0, 0x4, 0x0, 0x800, 0x8c, 0x0, 0x0, 0x9}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0x13}, 0x100}}, 0x8, 0xffffffffffff0000}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080)={0xdac, 0x3, 0x8008, 0x9, 0x133, 0xfffffffffffff82e, 0x7, 0x81, r3}, 0x20) socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000180)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000005c0)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0xffff}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x100000000, @mcast2, 0xfffffffffffffb5d}}, 0x1, 0x0, 0x6, 0x0, 0x8}, 0x98) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000540)=0x4) openat$cgroup_ro(r1, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) 21:46:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') ioctl$sock_bt(r0, 0x541b, &(0x7f0000000040)="52ce6df0896164bec38a760857e30829c1fd1b343498b68b7c6fd76f384f4c1c34fc3cef0d9875c843") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0x5, @local, 0x7}}, 0x20, 0x8000, 0x6, "a9f6376ac77645ee8114fa14596b829454f9fdbdb9f036de9bd1d8f384eca2278498bb4ed096db2f75ff8cebcec0a1b1e987b38a94bd376fc8f99539e5feae6d9a381ccfd94d1148e295854f149b1971"}, 0xd8) close(r0) [ 224.244144] binder: send failed reply for transaction 5 to 7818:7819 [ 224.251238] binder: send failed reply for transaction 6 to 7838:7840 [ 224.258450] binder: undelivered TRANSACTION_ERROR: 29189 21:46:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000da2000/0x1000)=nil, 0x1000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x0, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2b63707520eaa6b4753c4660a752cebf88806172a09c777224c34bac7d52ec12bc57a92eb191fbd09579"], 0x5) 21:46:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x1f, 0x10800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={r1, r2, 0x5, 0x1}, 0x10) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000180)="a88e9671760e915aec0c3779b09bdaad408898152fc50c4511a18c797877b8c956b3dc8a2ed18b241b7f1aedee6e572b75c6548ce66ef2debc9aae3a89f84a6bf4c53206f714d36bbc36bc8484dfe532cf8139d09170cfc73a8169a0d9e7239b7306b4689c92ba7c2d3baf2b6688f4073da1c325240a6100adf456f1f94cc7c86c3293c5d2f343c1dbd0a7012234ec310316018b0f3f52be210f47e817b8992e677b87e637c6f685d46deec80cc693e6b75b500c6fb01cdc113d5b4e0e", &(0x7f00000000c0)=""/48}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, r4, 0x0, 0xa, &(0x7f0000000640)='@security\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(r4, 0x9) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) r5 = getpgid(0xffffffffffffffff) r6 = getpgid(r5) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f0000000440)={{0x9, 0x6, 0x5, 0x200, 'syz1\x00', 0x40}, 0x5, 0x18, 0x67b7, r6, 0x6, 0x5, 'syz1\x00', &(0x7f0000000400)=['$eth1\x00', '/dev/vga_arbiter\x00', '/dev/vga_arbiter\x00', 'security\x00', '\x00', '{\'bdevuser\x00'], 0x3d, [], [0xd1, 0x4, 0x63dc, 0x200]}) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x8000, 0x0) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000040)={0x100000001, 0x5, 0xdf, &(0x7f00000002c0)="c0256e2282c1aebd4db52bb127fd5435eaa8cb7ae3050728bec56c2799c0975312c3fbc4b9188c1b0b96282566651645ca1944c85ec9e315d620c60c0659d836eaa14ea3f97f48750e76765a83c61509e473a4a86f0a004024ba506f332dcce1846439e6eb2bdf30b480b53200aceb440bb95375a60fc9efb4fa6715e1dc3219644bcefce8416ef467c715b4bf8abbe09a99391931f81028d1d78423c57747ae04649c1f05cb33ff8637f87367d5f20197232995112e39c20ad02c8b10a28e24ec716023e778ff806ba0302df96a4ab6421bd007c34c387e36a4b93fcec0f2"}) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) 21:46:25 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x7) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7a, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, "020003fe040000000000031703ffffe78be5e600000000000000030809a7e633"}) 21:46:25 executing program 0: openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{&(0x7f0000000100)=@ipx, 0x21, &(0x7f0000000180), 0x1}, 0xffffffffffffffff}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x4c000000) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x3, 0xeb4, 0xc22, 0x7f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5e24) 21:46:25 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getpeername(r0, &(0x7f00000003c0)=@can, &(0x7f00000000c0)=0xfffffffffffffeda) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000100)={'bond0\x00', 0x800}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f00000001c0)=@req) socketpair$inet6(0xa, 0x80e, 0x7, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r5+10000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfa7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x7, 0x8000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) 21:46:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={"7261770000000000000000000000000000000000000000001b00"}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x10000, 0x0) r4 = dup(r3) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) 21:46:25 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x367, 0x1, 0x0, {0x8}}, 0x18) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000002000/0x4000)=nil) ioctl(r0, 0x2, &(0x7f00000000c0)="990c026dd1b58238809171b431abf0fdf8") getresgid(&(0x7f0000003600), &(0x7f0000000fc0), &(0x7f0000000000)) [ 224.374519] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:46:25 executing program 0: r0 = userfaultfd(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffff9c}) connect$rds(r1, &(0x7f0000000180)={0x2, 0x4e22, @loopback}, 0x10) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000580)) read(r0, &(0x7f0000000240)=""/141, 0x8d) r3 = gettid() r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x8001) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) ioctl$sock_SIOCOUTQNSD(r5, 0x894b, &(0x7f00000000c0)) dup2(r2, r0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 21:46:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20000002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40000000}) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000140)={@broadcast, @remote, 0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bcsf0\x00', 0x0}) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) accept4$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14, 0x80000) accept$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'bridge0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) accept$packet(r0, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000900)={@empty, @multicast1, 0x0}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000980)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@multicast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000c80)=0xe8) getpeername$packet(r0, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14) recvmmsg(r0, &(0x7f0000005a80)=[{{&(0x7f0000001140)=@xdp, 0x80, &(0x7f0000002380)=[{&(0x7f00000011c0)=""/121, 0x79}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f0000001240)=""/25, 0x19}, {&(0x7f00000022c0)=""/179, 0xb3}], 0x4, &(0x7f00000023c0)=""/81, 0x51, 0xfffffffffffffff9}, 0x5}, {{&(0x7f0000002440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002880)=[{&(0x7f00000024c0)=""/238, 0xee}, {&(0x7f00000025c0)=""/155, 0x9b}, {&(0x7f0000002680)=""/114, 0x72}, {&(0x7f0000002700)=""/104, 0x68}, {&(0x7f0000002780)=""/194, 0xc2}], 0x5, &(0x7f0000002900)=""/52, 0x34, 0x7332}, 0x1000}, {{&(0x7f0000002940)=@nfc_llcp, 0x80, &(0x7f0000002c40)=[{&(0x7f00000029c0)=""/73, 0x49}, {&(0x7f0000002a40)=""/6, 0x6}, {&(0x7f0000002a80)=""/228, 0xe4}, {&(0x7f0000002b80)=""/191, 0xbf}], 0x4, 0x0, 0x0, 0x7}, 0xd9}, {{0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f0000002c80)=""/249, 0xf9}, {&(0x7f0000002d80)=""/40, 0x28}], 0x2, 0x0, 0x0, 0x7}, 0x1}, {{&(0x7f0000002e00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002e80)=""/78, 0x4e}], 0x1, &(0x7f0000002f40)=""/4096, 0x1000, 0x18}, 0x6}, {{&(0x7f0000003f40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003fc0)=""/88, 0x58}, {&(0x7f0000004040)=""/206, 0xce}, {&(0x7f0000004140)=""/77, 0x4d}], 0x3, &(0x7f0000004200)=""/28, 0x1c, 0x3}, 0xfffffffffffffffe}, {{&(0x7f0000004240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000054c0)=[{&(0x7f00000042c0)=""/4096, 0x1000}, {&(0x7f00000052c0)=""/161, 0xa1}, {&(0x7f0000005380)=""/185, 0xb9}, {&(0x7f0000005440)=""/98, 0x62}], 0x4, 0x0, 0x0, 0x10000}, 0x101}, {{&(0x7f0000005500)=@ipx, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005580)=""/41, 0x29}], 0x1, &(0x7f0000005600)=""/238, 0xee, 0x7}}, {{0x0, 0x0, &(0x7f00000057c0)=[{&(0x7f0000005700)=""/117, 0x75}, {&(0x7f0000005780)=""/22, 0x16}], 0x2, &(0x7f0000005800)=""/201, 0xc9, 0x3}, 0x8f}, {{&(0x7f0000005900)=@hci, 0x80, &(0x7f0000005a40)=[{&(0x7f0000005980)=""/186, 0xba}], 0x1, 0x0, 0x0, 0x8000}}], 0xa, 0x40000001, &(0x7f0000005d00)={0x77359400}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000005d40)={@mcast2, 0x0}, &(0x7f0000005d80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005dc0)={'team0\x00', 0x0}) accept4$packet(r0, &(0x7f0000005e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005e40)=0x14, 0x800) accept4$packet(r0, &(0x7f0000005f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005fc0)=0x14, 0x80000) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000066c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000006680)={&(0x7f0000006000)={0x644, r1, 0x8, 0x70bd29, 0x8d33, {}, [{{0x8, 0x1, r2}, {0x168, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r6}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r7}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r9}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x2, 0xa6, 0x2, 0x1000}]}}}]}}, {{0x8, 0x1, r12}, {0x1b0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x134, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}]}, 0x644}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) 21:46:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4400000010000100000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0c96cc2200000000240012000c00010065727370616e00001400020008000300000000000800020000000000e71db2e40e"], 0x44}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x3, 0x101000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000140)="d5a043a4856fd366fdfeda141058c87b7a1e24aadd8f451cc92a4151111c232b648f7e06113d18ff2facd2", &(0x7f0000000200)=""/103}, 0x18) r3 = getpgrp(0xffffffffffffffff) kcmp(r1, r3, 0x7, r0, r0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x20080) 21:46:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000da2000/0x1000)=nil, 0x1000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x0, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2b63707520eaa6b4753c4660a752cebf88806172a09c777224c34bac7d52ec12bc57a92eb191fbd09579"], 0x5) 21:46:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00ff0f00000000000037e8c8919f6ccff7b087576f0d15a804fbf37d0f67f8e60d768b92dc0a790a9064d02fa824fb124d06e53a5ff457be6652ceb5666b41ca52885155508c84b25cc8a5260e9f1eec7cb2c25a1e5cd7cbc3b692892d8cb4b40042356ddaff1522e35ef1c30a8509de859aa343997da2ea1cbc31e76eac3c180fa3b653d7874f20428dd5379be9ce39203fb6417722c688a7b5b36f0f1d9cb379eabba327a16b11eff6057e78d3c64350d9d2214da8cfb1d0df30428612883cb10ca0fc590a83f2a158af2a7a1ec82dd211dfbd0495a1ce0134"], 0x37}) [ 224.689095] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 224.699028] netlink: 'syz-executor2': attribute type 2 has an invalid length. [ 224.726145] netlink: 'syz-executor2': attribute type 3 has an invalid length. 21:46:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) clone(0x402102001ff5, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x600103) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r0}) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xe9, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_SET_MSCBIT(r0, 0xc06855c8, 0x730000) [ 224.747792] binder: 7914:7915 unknown command 1048320 [ 224.761043] netlink: 'syz-executor2': attribute type 2 has an invalid length. [ 224.765535] binder: 7914:7915 ioctl c0306201 200001c0 returned -22 [ 224.802025] binder_alloc: binder_alloc_mmap_handler: 7914 20001000-20004000 already mapped failed -16 [ 224.830860] binder: BINDER_SET_CONTEXT_MGR already set [ 224.840410] binder: 7914:7915 ioctl 40046207 0 returned -16 [ 224.851946] binder: 7914:7920 unknown command 1048320 [ 224.857299] binder: 7914:7920 ioctl c0306201 200001c0 returned -22 21:46:26 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f00000001c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000", 0x24) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 21:46:26 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x20) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./bus/file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) mount$overlay(0x0, &(0x7f0000000200)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x2, &(0x7f0000000580)=ANY=[]) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8)=0x3301c, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) io_submit(0x0, 0x282, &(0x7f0000001840)) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000100)={'bcsf0\x00', 0x3ff}) 21:46:26 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x100000000000001, 0x5b) r1 = dup(r0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000240)={0x4, 0x8001}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d6, @mcast1, 0x4}, 0x1c) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xaf, 0x2, 0xa0, "1f115c88a047d29a498427ce2c67cc09", "2b066812e3fe657fab0f7e04e28167d841793b6c1e5456aaca8df9eef9f81e053ee0b606195cdae9796d3b2f0bb712ec435f30e559df69da76fe2ada0e5f8fdaf3f311293a219f33dee135590d8774438a9728250ce5425bc1e72dc1daf0327e39e94f0a4cc55890e3de04a77daaadfd9601cf4ac7d87e14fe3482e952d1dd5c8efcc9ee771ebcf81e4b54838b4961b7c84a25e9cc21f0239c7a"}, 0xaf, 0x2) sendmmsg(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0x10}], 0x10}}], 0x4000350, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/13, 0xd) 21:46:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0xc018ae85, &(0x7f0000000140)=ANY=[@ANYBLOB="29fcf94e2696bc95"]) 21:46:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000080)=""/16, 0x1}) getsockopt$inet6_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), &(0x7f0000013000)=0x221) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000200)={0x7109, 0x0, 0x100000000, 0x7, [], [], [], 0x401, 0x4, 0x800, 0x0, "8178f389aaccea7c8f487ce013469cee"}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 21:46:26 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096102, &(0x7f00008da000)={{0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, [0xfe]}, {0x0, @random="4224458fe6c2"}, 0x0, {0x2, 0x0, @local}}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, [], [{0x7, 0x5c0, 0x7c, 0x100000001, 0x40, 0x4}, {0x9d73, 0xfffffffffffffffe, 0x3, 0x3, 0x200, 0x20}], [[], [], [], [], []]}) [ 225.206954] QAT: Invalid ioctl [ 225.220633] QAT: Invalid ioctl [ 225.246821] overlayfs: missing 'lowerdir' 21:46:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x100000000000, 0x0, 0x0, 0x80000}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r2, &(0x7f00000053c0)=[{{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x3, 0x4, 0x2}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000003c0)="60b821490b77c230d9c9f0c7ba583782ce45e6f173ab0c32786d36be4bc5e77fb6e25d2d578f7a9108a8e1abb5b4c39ec870dcc51f82490a497c6a9f624b499314692d309404b603ae3f53930972d0c7ac5e7a92e98625fcac24bb823232903bc169bdb78d93ba05c6c5c19826bc823b1f72d536eb4f15c64f0be1c064f346f7842a60bc473b8f12372afaa5878e353ec16316df93a61fa12a1d61374fe97e9221e37f2d00f8d3cf5b55261f2b462690170e77f74a0ab8eb60bb733faa1da316bde0913d00e4bb0c4fbee79fa358357972285e82e1b3194454689d6256db3723d338efcfc05b737187913639890fa7c245ac28981c9e06acd57a032a87135eec4121bb7f00148626e1af6ecc609c527e9eaf260d9f2139b66c652963b1d5bc2366159ede5f9211f2ae0ba240f385377b2027d8bd7a5f0a95672e87fe1056d4a76825874ff823e24e5c709f006402389adf6b730dcf9b486ec53d37a1fa5fb5050c0fac392ebbdaacbb6bee15c981ba792ea40b0a164d949f9a39fc3eb70a452458f21046dad44c09cd301d6507fe528f1ae9bd9c57120d11be3c9dfb0040aa39cc47152255f578961c25b67e98c59ea23e37e499708f06cf3a409f587396da744acedfd91ea20198575acbda9f34afefbadf7892441ad079112e1370dccd462cd21b00801da3f904d60b7eb74f782d53687fcf47c9a9932d24a00813c3886c390c014706ea7f0bbae27361fbaa926f3ed18bcaae40c09c7ca14ebf022fe5cbb90150e9d805af897051b8ba798c955636f1278f113a188074c06c0ccbb0f0d45fd04c55aeb760a09fe036648fed4d7b1852aaca4dc78fc261597acac21e619a985201b47e8591cb2238b505f2f931e2834af2011fe53aed521af22a3adab001705b8bd1639990df9c477ce5b1f27aa80d9434b830c923de968537d080b1519266f8471951a00d15bc5011d0a66dd108569746dafea87bf125bad8a7e9b029005f0cfbef712d2a95cc95fbd9c515f6d1f9e71f05ca29336950a4391b2fcde62c341a1a9bc0cdd42d08a30cd49bff120b088fe9fb94263d4423213843cea0cd0b4e36e8acd03f9c78ee834bc03459ea18834883f99111a26a6c7655b30c194ea82d1f63c9ca92fcccec3a89ed625a645f3de260d2cb8b1ff3ded8ef1a1054c4b92a6fe0f7506dad8a0705f6a596db58b21a0cf8e4714dbd0c7519e460eca34c39bd390e29cb624eb5a310c7462b5f71e03847780f54a0bf4838876219b6c7b6544999e9d061b2f72d9c5ebd321dbf122c219834484cc2a42547cacf7af607c72211331c84b053ab713b0625383583e9eb71d26c55e8ece97bdbf987b3ca0623d61466448008b98327ac91a8ee706a6ba22e03170505bfc1c93006913990d05a1a2aecf865df9f763d3681c29e232e1f76461dd7b7f3d2dae5eb454107d4dba94bd850a50c50899ed36148d8b7db933e7049861a821d5f466cb32f22a433ca335f6352275d1834123bc2c7412f5340c83d630d97f50de56375de1b4ef9ca30a1913259e2e0ef6e8423c9e957a66989821722a93f28c0f900daafa80e0a691e4892bf1b53ffcff05877efe97bdf0a7e138b0b4804bc6a8cffca57f2d0c976102a2ae188315114032a2f9af041dba64c1ded457028fa0b79326bed086a88e20d9471fc6dede2ffac6343067d2e5f684383df74bbfe694c40160ccbb5d1e857961d813e7387ebdb7ab80bb490fe79acfbe8a7200767646643a7d6419ebbe3c8216bdcfebad57a9f969e5d11acec432c0b7968ae5ea5282f027e0cc36e51434f75c1866f8d36295700e89635fd15e875a5e400e31e2ba3b4cb7bc48d3af0c16804939e7c45758cb047f51201ae09e7b9299c2d468258f1864b9d63e0fbe371fd396cfd587ea958c3e1126b19eaefe9f8dc3caa211b5477062cb3a844022c25473794d04e0b560f685d72ef5dfa6842645437ccda4215e510725bc4ed459c87f8582741aa6e12ce4e6659eb04e0df3324db6f680d425bfcdc33f70808890a52306a05475c26687868b8043a70e4ae00643ac0ae7ef5525e2fbcb9d95deade1b02b47d411982e4c9cc9af6ba1d93fcfc47c87656c9b782db8b9ac3f09316aab540635032400ad8c8165d704334fed0d8a2db4e8d743203213d43bce527e127e24af32d8a9ccbe3567cda74b912e9a686c639613358dbe31f16407cc390bdb0e0ee987cf966279f335c38f328553628612cd3a7c2a2944a7b4b7111251993e899b71444c61a3ee83791fc89d4e4a39a06a01cb0b21a30359c2a9ec7fdb05af1c4c5a22814fac627a501a50015f11db908b885a8de57698d736faeca251f809e9c0c98b39a1e019f2d1a23ae1d8c2f74efc8c1968b4e42631fb3b2dc370653d9aa63c66ca2c1ef224a6b6156c1f25f3074dbb28228f19b4e28726993b3e37eee171faccc7fc9d1f5224f8834a8c2d8cae99a1540888a1d3f4e56cb644daced5d730d71f258dffa0896dfb5c95ee0d5f250015e5096a26904e34249c95e4b9f87b3e6364d4afb611502cea087c36356408f25ced3a2459a352f9692e7406fe4d1fd1de4ba9fa6dfc6be9acf4c30548e375ddcd7409d00cd8b0577030e35c61019f18297afa67c770fea12e9cf23d205d614a4317cf325bf67173a0f094c4236e6ea7c61a21f4051598c9d1235fdfbc542666aa9a20b332569dc717c698d4fe1de210d4b242423ccf53dbb64c1cbd3286758c6a9c5fa1c77f32579b7878f196fa0712935beef09f89a2701c61df522f63cd2879f708ebd156729771f0a9bc31f8477ab7083d03347abb686e458f1ae4cc1526c5678a6c1dfb70695aa4d21ed5f60c242c256eaf79ceb8eb5afb7692d8c21824e7dd9009a3af7e4c9d7bed1e7eb2723ba07a6adbc0ae26d9b46833a43f9a0ebeda6e4cb404ec045bf8879e4ae42724244a20fec252a6401ca8c4d05d36ce018c6933b845628bb51585ebfdf47fe4378c12c0981a7d896a163e846433497e9bcccd02524d87f994c2dcfcff704f9e82008d2bb18be0815e3f1afc91b35e9bdad23dd95fafa247170cd1ad6c5baaba531ffe6a20832d259c61464a4bfc477430bf5b50dc7b96e4740afcc8ada5ebbc21f6c0a6fe03905ae8422028b6b32b476418ed9e8d9203e95c5c5c9c3cd4f14ba0174afb36b55e5bb68cf7734fbb87d283cfd544fda3ac1bb1b64500977714de8ceea1ff097a7610cd12943c7d950624f2984d94da52c5bbc9f4091e7bdbc07368448bb1f9aefbd8562462098b030185f03d53d2f97490b3355d62efa67b93111bf98ba25ae9d357010cdf4313cbd782c0c58842b99096479bacd2ed9f9f331dfed89b9ec1a7e5ebf9b0722bca0b43a4f45d611c3aceaacbcd8eb2d4792e2bb4acff31a1b2086ee8268edb492334e45890defdb7401b3f338ab76d9ef39ff07e7da91de7c3bdac1e20b3f1a4b2a53f20981083f83a3d6bdd8d1ca23996bd0dd68c5a3a45b8a3ec8585a2a7ef05ce034d06750e9fe959fa11ce9942b4fcea2199ff2a330f9292a79cb33d7fac6be93927b24ab16bae791bec12ce5390584dd979e3588227872a72ffe767f261cdda0d9a5af77b01a0d0e9b878589b0d2e148f1d4795e43c9569dc782be665d860ab3f9dabe24b949dcb057e7fd8250bb5bd0b58f0b74590d63def4c2ba392f1fa9b37a847d161061e78d553b05ba1b151f9b1d3b6fceae6f2235f5f22e6a8498078514b32e6b63b9865576438972c5f4a38cdc5d0a4d7cbf80b7cd19571f6f678a8b83a73876d7e65b6e463342f067994075c088cdb0fec7992b17f50338c3dec3a6e01fad6ecc62d36496133b69fef99229976acaae12c02b7c6c5f3cba1167ce03b99a3596c8c83309d8158629fa75f555c855d8390c02bc9eb5840e985d4785b75fc6c3cf382bf34d9be9994daec0816a39c37a0b4d1fecb9eb85d6908af8c9fb20a293ea96e931e1ef70ae420a007a9862f812bae7905412bd1faa88151c0595be336352461ce995338c4787292bd61e6efa4e6dd8259ec26bc0b675b64c74d8f8f28d5fc3344724990f270a43a791f69c486f9d07a808499927644982f46682eb47bf481b549b7df19532c05241550fbc98fbe98afea944dbd989a90a7625bcebe033477d14088bea22ef861ad620bc9d4240f29c868390df56013621a456b9a2cce052dc98d1fea5d2c23112bdd1f486cea9665ae7e13123311a5d259faecc78dd40dc71beabd738454b6901a34a894e898d50b1e84e218b40023bbb2ec33aded645b4ae0db5b0d761fbe78897478c9f3a58a14c7406b52fa729b398d8137374bbccba8ff1f5aa92bd4ffa2af5c8a764e64538452127fa39499b2c3366e1af68c949fbb87c30f52fa6b4d5d7e3be1e35b0d7934b6f4663606664424de8be699a92a56527bfb75d8397a5ef7b3b290c772e7bafd836db7723108f4d2620476a9c4bc020b714b6a4d01fb1151c633d585664a5021172f26300b0fb8f475cf54ee97abcb53367af002bd95bda656646da4cf7548c54e0f2fd4ea55c1fa6c3899b411a5950538313d9cce5111c4b403f74f4119a8fc1ffcec6f0d43c47ca1942e6a7b4390d1fe13d5775ada3df52c92b8a2a822abd9bf17678f08f65bad18b2fcd3187ff65360d579555cd316ad4fca483c2ac87437b4739cca5da99bfc64c3d28ac4ca824041fd89cc86b1127ac2a02abdd3e6adf7bba6d620ace776161f8f982429a7c0e00792a000fbf7295a228bca905410256fd751be57a3d3f121d5c9b1ee5f88010bf3fbde24cfab31202cf53f82d159ef3851478a3e35a282fe745364aae0b1812980a17cae7d1529a4ea1b9a963ae06a8b10b2774c37aa7c63121f9fc8bb9b6ec1ffb0725ef473725bb1e7b634838e895dad2291ac0e24e1226da3f3fccd95618c19c048c0c76af9fc637ba25e4b1b760f95ccdad00312e9311b2c22abbb45ab6e45d7cc05b23948e891f29ff7fa39ec30bc8251830ff56ad557785176a5dc9a8d1a37d619be0167f90f148cc1071799bebb99e36ec5604530e2bb64650a3fe63dc4d46df9f680cab7c9840c3f655b3020ce651fccde2c936c75bf77b881e1bdc9e2692a5a855377804ab82470bcfea2ef64f9bb64111fa2ec366629a804af5b064b225f2477525c7a965e93a583d9acc84c6f4ec8975ad4ceb1642c7b4f9cf2ee47abf0a6033545225b0ed9b30f4435e33c004501483fe85002f512273ada9bf25e200561a78507eaaf0402ead624d025c655e688c538a840d7a8715f6ee9e0f549230adb266d1c94d50e6b66d47892f4e9c13279c9cc3d6bf0da15771a4d16f75b0019dcdb1464af74e0a198e61b76b28d6c07c7056b3dbeb7e6e12793b58d22bbbc951f18cd9bc139c51d20ebfea1e88c4a0cc06f7ffbc43198d89e669c2cd1fff936a1bfe7250944e9fab57ea33bf62aa1336b3dbafd6c5bf7ee8772f63d3e3493ec6a970c21b00f3e521fdb3dbb6ce149f83340d0f09043479b4ce0a35203b4ee5f084727ccf2b67ea2547078e71f89e7fcbcce035eb13e68d958700629feb5d62bd589a9d5a77edc220061ed94ae951ddcad9d894b54b1f322f36ad0244d85dc013108619a0aebdd956637603a73440c87a945a8a6edb460f26272d720d421948ab6240658d536172b42a95e12324cc351307db95b90f849a95c1865921396567fbf9ef37127879b70405774c837a9c24c4187478786bf14a96d3454dd66730fbafc4a77b6ef966e1b74a61d133a454d58933409eff9652db1eab65d7abbb8d51ad42b696c6f3fe3f713a9ec9bc2aecad94", 0x1000}, {&(0x7f00000000c0)="830257795b60b1a0171cdf6a6f59476a38f6eebefd8b16f36f9c09626fc5001e1892860a507fc75bad5a4c753b634a8da0fb4c008a2648a620dad984d14788c58afae1ae3ac9456a6abe3e7d1e33d88cb28454aa83eb3b036f853c5a309f21d165b56e684b3e21fa77717bf6852011509961cd663dfe20dcf993741402250bb5dc07105759a05827685a5a320ff0b92233", 0x91}, {&(0x7f00000001c0)="6764c1f9f7d33706d221108c51a3962827aefac3c59ee4d795465b2ebb6afc20cb8905e48ce23db67b7ef7753741c99b2bb1af3672657bf33f3c69f32269ac20f7f92148aa3cc59988024f2c89e8817bd8a5e87125c5d50188ef050aeb4f7d09486534942548cfb5ed4a068d56d49555b0160c0d3e6c2b8a7a45e19489d20d7008", 0x81}], 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"], 0x1020}, 0x34}, {{&(0x7f0000002400)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ipddp0\x00'}}, 0x80, &(0x7f0000002840)=[{&(0x7f0000002480)="c487ad230d678c13a8402cc49b2d800e0d8baf79e8948284ba3ac924d9257611898d05f28f06760bd35ca2f92b94afea4e97f4354f964c078c6b5402f7d25647d9503ebbfc249c67334e7037a8ab7fbd516db4f520d904e6ac717d33a145a7ff380236780d495807373004490efe0e8673a6fdb7e7d6a3473ac60f1c26d6ced034f61c62ad8d86612f0026f1e7952525c7f458c9466592c62454a1ae91", 0x9d}, {&(0x7f0000002540)="31197c89d9e7e4be3103101e", 0xc}, {&(0x7f0000002580)="5924726852cff4978a891faf7d0ebde7502175974da2b9fc1b537c9c9aa6d9e368148e0e31b2f6c9cea62f5d35355151815392aed897746eaeca608bde7a7c88ddc8bc3eb33e1214fb31b7133946fdc53e64009cc67147aecc25dde7975475e9c64ffb8fd150e37ad1e94ff003d19e63cd526033a2806ec56422a10fafe5d0c2d6363a17a9e2fb5205eac26260c9394d6afb4a4c9e6d728fd34f986b5a5830207b67f74f9762f1ceaf24fbd51ed9c12eac6662ab52360225", 0xb8}, {&(0x7f0000002640)="d02a4bfd3e8da81ac5d8fcf2cb01626165cd254c1cf74a4c291ed2aefb187af181a9afc4598e3141b4945b3968f21d16a0d714bc1b9b6f84cd24dbcf4cd93ad01153ceaa62b2b55ed437813727a1df41d3be30d74e6e7f702ae360d54ca358ed6bb5876b06e6444b9e1c0aa42e17bad870b2152e9feb388f95e629ebea09d8a56168abf26abff8768053b0ddb1db519cee9303c7e17708d67955f2f3b39ad558b1bae03bc3eea4e0c286b3fff871c94316e857a6812a06f1524253917247f80346c72ee484a825c7", 0xc8}, {&(0x7f0000002740)="790f1b30d0767ffe0e3627957d928f888c806e1332cfc6f7b4dc698f16474bc7f3849e803171310f17cde503141b5cfeee0477f050c0714c5ad03b3716dc93e7b887df18bfeda94fc10fc81aad0d54de72fe9e5d055a9061d4376a8e3e8278b41eb68784cef4787b050c32de70fdb1b8f7a09c418e4e4883937a6c082379edfddfb6f94bb803b39875a99ab5ecd7e281d93e5fd2e48ae2bc3e5ec1147c2711b9031d876a670a918c553c3adc61ae4ba990055e17e1ca58473a5467df9059dc4cbcb20e5e7954f253b6fe9bd875ff5a3b959be3de61bb86e2bb2006e97029", 0xde}], 0x5, &(0x7f00000028c0)=[{0x78, 0x10c, 0xf3, "3b2e6540b01a4bee66ddbdc23b0e96b9142205391d60197755397c197f66d73ad4a0d5664d27d97bbbaff0fc87ebfee3d430d1a29d87b125266c16c4bcf241692cdcb99275bfa97b67c9c5a7f9de1de193e66b4078bfedc6e053920fb028229b6bb95d"}, {0xa8, 0x110, 0x80, "45023257ef503177e860c06524caaf3f32b4dbddf0eb43f2051ff0284ca89c81732a2d0760a287a7c49817ac280ab140e1cfb476aff022bcabc21be24eb0d70252b47bc4d3d44cdba1c137b1af2fd835a80e3e9af9c0b41b9778eb10b956e5e36d7c91f50a8412832374b7b9de1463d6c3ebadb534ab9996ecde6fcd229cb569b3faadac819162377b24b220eb5d302a9f7614548a1e97"}], 0x120, 0x4000050}, 0x200}, {{&(0x7f0000002a00)=@pppoe={0x18, 0x0, {0x0, @local, 'gretap0\x00'}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002a80)="bee46e833f5e4dbb2850b3182878756a4eb2b7ddfef4d55d2923c455375d0ad7e14d5287aa97222cb290b88be789ed9250216b2823e40e34d539fdb3c0b8f10ca8817693584eeada5e97d711c74c7af7a76de1b1392dc395c2e07cd0a08b1b30865cd8a718ce49fc27a4e36fe173379021386475818487458a054fa7fe97155989f882daed77f7ac485d677702d56bafc53210c09f1dffc1d0a345d2ea38a61cc812846643c4e691b64f17763ba0656d638cbf6218c2dd7942ae0225aec5b1c3003c728fcfdfe7649ab2136192e1a4e223669746501e9fd1", 0xd8}, {&(0x7f0000002b80)="d0c20a5fae95dd29bbf23e1b9d260d8d3b1e983e36b7c6b367b88b33df4d01c90eccdfb6efb7602d40c806d77f2b4707a23185b213cb129a6c1e17d34d1563e64efb06da30f0316ed8e4e765ffa574ad4293f2e1e0975915df6d0e", 0x5b}], 0x2, 0x0, 0x0, 0x4001}, 0x6}, {{&(0x7f0000002c40)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @rand_addr=0x7fffffff}, 0x0, 0x1, 0x1, 0x4}}, 0x80, &(0x7f0000003040)=[{&(0x7f0000002cc0)="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", 0xfa}, {&(0x7f0000002dc0)="c1857a2c162bbab5618c9c93d599d2c3620baeadb66d45012c06ef2b22c2f25528a097eda7ae7f3ec786d221eb612c00f9e6634148e05bd1d09b7ba44863f07dd5c83812372df07548d67b7f68183ada92e2f4c6686512747db3ecb2c61e81aac55d887beb288c3441ffa065566ee4db2a674bdcbb7b02d8a57904c2b94194ddb898c76a07e936646f189f0a24e22af9234a923405af5dfe493704e7dbaf6fc559b3ae5fd7ecf8c312e30497ac405b93e3ec184e3fc638737f33f318e5cdae1822c0ea54ae2b78892729ce4ed8450954d793f821c716fe2a7357f5cfe1f02b904fe37e5e2c52a92ee85eebee69ea7c3d899964", 0xf3}, {&(0x7f0000002ec0)="cd6303489fdbdeaa6463580e0664aec1b2d91451919e884a7765db268420a0c46d4da7426c34edea7940d2355c40a1f7401cd81cd13f3e7e3db13221d1d1fcfe0b4c75d5b15be2ed3d97931b7113062ddf4615d8c563473d31a09bd7bc9f76b431733bfa5ec2ca81e3225c8d07a98082092cd258b4437bf861140dddcb3946693721f9", 0x83}, {&(0x7f0000002f80)="fefe19e1640d185426c5ff235ca2538602fdea9a8008ef788bdda7f1af6823e09de6a6c3f1c20e14d697b9d95ad9c6bef304ef4408499887440c96e20aef41f0a29af2cc32774a2cd9159646c87bba24ed2368471dbc258eb72861ea0c693a2c128ea46d56544990088abfd1c1f6a6e5dc8d8700c56b0c683041a0db6f7fcdb9bb2dee80f13c25172f1d21", 0x8b}], 0x4, &(0x7f00000054c0)=[{0x20, 0x11c, 0x1, "75de7cf8cd4caceceae3ef"}, {0x70, 0x84, 0x100000001, "aaf7c5ae29dee260e5da02ffe8180e258e7bb201ff965f164dfb2e7ca1d886a1c152272e7951e2674c77e43b56a7c330a102c831f3261504d3ca306a92ffd88e345c9d45462e0a3bbd17c6833532c284d6056d4d89b5a5cb72e7c6a8fe"}, {0x10, 0x117, 0x7}, {0x1010, 0x11e, 0x1, "a57c52efc82ae88cf8d7c038a6e589767ae90c378d468b8ddc75aeb4a190c483afd041d7e2ab54975e87761d337d5305a7dbed3bbfcd3e7366810120dfe5272d78ee8dd102ac735e0f3d87c7b8e9894f3f65880908c5dd81944c52e1b373cbe3552904b2be74177afa16c0d16c098a64dd6891a0906611ada2f2bed14567713d0184fe06a5c71c25f2f63ebb83b9f8a824e2d612de028e3f9b2256fd0d5d408d388431e84603fd8e78f8ef8a98fab752d1c89280e977617f6bb68b86875746160d29bd4fa83861b8ec7a2e0c19aa35a497387e11d56c0c7c1ed5dd177b8a4adcb458e25c520402c255421e80ab8676c871f3121dd35827bd422bc3932d39dc558e14c9ada8843b8dda1c9316971f5890dbd7ef8dea27edb20ddcfa1cc6ae8f0af88315de90428907853e89bc916dca0bece6f13a914b3653967768db2a4cd27acba7fe4add13544071501b8228cf5db20a20df3c3a268d1044b501788ac7fd5fe6f93fe3e2cf83d18583915a2b4bfb0ff0eb0c0ea1ff64b915ede3f349b736647a74ae5a1c4a8bfed10a3adc8d6bf52966636e0b6fe0f42eb396649510cd490132e4b3970984e76bcc23231b691ac671ced860a06714bdb8bc6779e0c7bd12e770f2250579b14ca5261a3c07a3172e528beca5b61cf4e54da2cf6aefe3fab8195036bf8bd133160441cdffbcfadc7025dfb440fa6b78927e755642b5e0c1d472f6ee94eaa4751979e570a4147594865339c96b7070d9253e560b0fb92c9bf223c14669ee65795b495053232827016ca6d07cb948a114198f74d3c83e625ddfb1d194e598066da0247e968931a478ad08fc6377bd2224b03e33ed107e3b43f6032e5c0fa76722b286e705eea75d133d7848f330cc296e5c6046343833ebf0ceaadf31c3eeb9f697c2408b0a16709cbddd3f67b06d275abef280d22b1ac1b5986e17f33471b8e23f036b3a5e1c7e991c8867bbedbc5de7067bb81f04d68f34fd1b9ad28b1e157e8eb7cf7c39e6ea5222f04f0193b56c8a5eee98e4eb826e14552fd68af24b7d381ad743e18beea8dca2ddfc26499e8d6072b22797cb0c193a69a9aa109d86fe68070b7664e1dab09814a53a886e7d6106f4853070f62c6bbcaa947df61813a8d19111b98518296462408a5c3f573e5a72f57a1f2e6b9fb372de21feb3d90c4ca3d76ed2935473c5d92551a5e4b2b8f12d2ae24f4129b76b80ce3b1dc61020425db28a5ac704a89e93d4d1da1deaface55d5bf62e122b455ec1e36fc5dd2c00fb375e29ed0f1caa0b5fbbb91d16c553af04a2d3aa9673463431688843eb28d817b9a30429c5454e91e67a28ef6306e9745f384b86db3e8e47cf90381a69ed08be0b98cff497a2f228a44ed06a6e12c1e7938a3a4b26f829d20b69c64fe5caf00f8892ff9d2c179ed643dbb924595612c7167cd6ea8769bbbf1ddd5c1afbe532274cb3ed54ab33526e0ac37810ab1049bbb21c372ef45a997c37f8598608ee72eadab1a9f6c789943990e368023ad35088e1f33e12374fb231d7c91c11ccb2971717637471eea657b2498bdd63ead4484de214cc5144834359a4b1c3f39ce562d0aa71052f3569f4cf1d40705883680f9689b08966a81304491b79517440c5074299e2513860a49b6c193eeb3b6a673d52843eab5660f54278067cd50766a72c2db14c8c3c4db0bad104b13ecfbfcd4b231bace1d521a8f97df2296ff9e9e989149cbda89a61411fb21f441f6b273c73fe841ffc1377c6520f135241fca959b22b53c782faec9e01e5afef604146c830abfea090224ed822e85d355afc7b74d446b75d308ccc5f434d87a4490af6c1b3b29f0835eda20436a24fb460a0d29c6832973f03fabd630fbbab3cf862b15fb728d9c44ff8aeee7ae98c9e5c0736e2a6e226563156c121dd7c6fa78b70bba5889e4239dce122b049fe5cd42ce73c5acad8be997b0a6eef9cc4a3f86a4aeb7305c2290d780491fc25bf78551fe1e9cdf528a7a548eae93e593841b13d56f8367c369a4be537e25bdbc94e292a18cc2f216ac96157d0adad42d4cd10cb1032f5ba0edbe640aed7b468b7b4b69d9fd1b3e3264bb159521fbb9236bb1fcb3ea996ded67092ebcac5b6afe1a58f19fc973827bb5cadfcfb2011c1b1bacc7f58b1fd08c6ce3772296e32c2435e38234b6a2edffa5ef2ca55779d6a19628614cdf364e9337f02d40bbb4a9712ddbfceb2e80f7fcf4b5f0cdd80a43ceae1201edeb394740bbcd18a3af2e7350b25618cde2db16f4fbbc9517c004dc4cec545b2b56d59b9cd6efd30b8b08cd0fb59bbc28765eddcd5523f9e8824852e44b1d4f4d7f776068ce4e5c87f65086bc4ccfd7e63395e6dd083d2f44f9e3635b6a2e0674ab53a56e71be5b7803aab6020f15dd2fa099f5d83aa0ebdc3ee3a1e15452b8d14fd146d037f85c29c63e0f6e79691146805a5d6647fd1057608dc837608350f1107d14a6ce6d527f16523f4ada01c940bf3a0d978c8c1cb4c6f5112b91080ba7453c49aabe9f8046de07299c82e9fd3d60fee1aba135a63bfda1903c6f48d07e308b551eba730d7fc0e611b6c32c2700ea78c7975e127ad455ccb0cb656fd2af5ef6c0e03df37627493d2a3404d231cc83875cfd7d34fcc76c904cce4ea85b2d3966e5d5de05bfba044332611f410322e2a31a0711a9f89fd0803ca589f92b6b94919906bdd981d309c5b277df92275c7646fb8adbbf8e085d264b406f1c5503fc2f08737a4c3dba33e092fc2550ee79e3d6c2c7d3d5d3c88a20817dfc88cde8eaf822d9fcd76ffe08438386ae97212b96fc7ed2bacfa90218bf0b59aeff0ebffdb0b77ff61f7e5a7723e9bfbcb1816e8ef0d09f2023fb0113fbe6c366eed639c426fd773b4ae09ada84b2a60e23aa98693853f541d41d8a20b335766e8f9b006dbc9ecf69054094b6432d0c88d921cd9a6ebeb9dad0082e7a790a7c67c0df119957652ea18dcf262fbfcaca23570f9b23e07176aa1dc32929665946e1cbc8bdeb5313c9e1f45692aa98b482b1d1dc11d027668ac40baa1634dbe4c88a818ee358303752f73feab35479f16a8186e45aec8c8d8ebbada659dd4c946189e1801395be87b657f4623d36d177fd9788e938de122303301064febe0f2c7e50807b444f7f7298b7a7e05fd0582f3618b8b04347c7c577fcf6c0f2465b27cfa3fee4a1a3f7644c2117579f529f7c582886e64155e48ebfbd2663773eda7e53edc2262cc2335e425d7c9cfeabc9fef5d9441d77d2b9ff371826271f7e7b6507f9c7f4fa69b0098bee9dfee4c93022aedf80d51c5aca22e6cc7a5da1217e7a8d8fd9cb324aaf158c262c4f1f81b9c4e57e31019f4ca6eef1bbbd42951c41eb5cd32ffe55d86c8a30162a64a2305302db2fde0829bccdffb4ff872f54343bd524ca82500d9d254520fed18b6bfd4591a7f4b281785b20c8966471133f80044557d953354250ad6ccb8131d5ef9708809834bbad049af2bc04ea53bbcece839fc5a6f2b5239fc4e70209f0cb6841f0714cc054a35de869868442af47b1e00dfeb930442445d4e1ce83507dc9c9b8f9d20762cb5a5ae79f81400caf1fb5c69ee0ec747e89e2715d57080cfbe09658d0d6a4a3dc3c0a0285fa31173144261e2d47fb7ea62c086ff492fc0f872530620101149e1af38bf6e783c35a97a016a4d489d0aeed3fd3cc114a19054bd4d4c40a3e373f104859221b4e35b0212d621a677d2bd3546ac5c64a1e2a3c9c581c19cee8fa807dc8688d2b62cb0433b5845565ca716bcbde76e55a9c68b93f1ce69762475dfdec4feb7b5bde1ff0070006e507c2f968d4c41ad0c14f6923339843ff4bce68afe9ef5823c22317e9455bff55f04e6163fd799958aebc9df841e66567820551978304854b054fac0db406ff4325b9fbcd4e37fc8e1fbb7dc32d639b2bd2777f3f159e11d2626f8931f6d7a7154c5b5be9e2dff0196e55d9346eed55863d9c77745eb768f59461881970f99ea5854e27251f208b89751eb2d9f890157f4e645fb42fe974cf356c8ff2cf7a6c8b8ad0a51282bc96835a34a4dbb237f3b6202db256942f95b75bd1083f68c312af435e2cfa663d0a8c805dacb14c20d82c195d566ff0cc3c7ec682365064bbd6977fd5e1c17477311996b6506902177eb47714a9f140e73840074169e316e13d6412f0d736c81f9a9a90e8044b402681c0a9ed402a697410c1bfb30a2765c9b485eba8a298ad3ec7c5adf239424de78b5358cc7e3f6c2635665762bb2528951ba13ca6d0d3e890a1aa90264e7e991f0345d5cdaead4ec7931d56b61fefd76de4a0702a51d37557eebe3e2df1bb07e66eb096e48f1797e77ae2d573402cef3dbbd92603426a2982562ddd966a78e4d93a8f16d10f7bc87c09f40ff9616220a971227d0794a3d974be559db9bc0dbc9932655d9132716ddda335049a4153fa67fd91960ca131e077a0f30e63dd031fff1be385e702083670409087b275ddf6733e067314dbfc9cf83b3111c391be76941ed8999474fcb4006d199c5a11e80919bb533e47c2973113b44a8b2046b4b8eba648a34a2fe77e2141b5e9c6982579a341e93dd4c095952e3a5bdfe9f0a77f82e3836de5281f6016cbf32779f76df7d13df11dca37491ee20b9002c01cfb410e2d7de99aa3bd22d30bfd89af16557e9f040b07ce3582726998556cc0da53871b6d306fd9d93ac2ce7bb1e255163616073c5ffef8478c90303f289e726b821355a43dde779ac56eafcd5c7d89a41e7fe41d6049129e5eb3c50b29af8dbd8ec6bbd5439afd47a941ea4621c527ebb3e464ae7ec1b97a15515df6128bddceaf4150ed3b2e0d8000e9496d3554977c4efcbea4a132ac0c2129c2fab5af3a8b6d6e0bf28d6ad3c80ae610c8719da0b56138e21fa8a83fa7f7b84b83c84e4035c31ffccfdc80f19e57c7c7ca0f1b935fae77cb9ae9a7cf44962589aec1139577e44651d05a469444b161d1ad01dd153a5463561962594fa69d97922f62a977e2f9857586b406c7bb7831562313d16ca333dc7f733f6dc0d06cdcbd6d9ce68dfb577b005faef847f99ff6822b570877e7401c3ba058d811728679899328a41c98641ea25a942c7c37b4b3c696978b5a9793182ef6e1e4af4b825610595d82cb073d3e8229f22ef7c0ed2546e261dfcf7c95fcaa5c456debd0bc0130a9854fb6e3f29a5314456250d112fdcb40cb85cc0abeecfc2a133e7178aa823f764acbbf106128374dbb724128d59e32b609af109cab17df2d7094ff77a17fa566662b5aae72fb6a487c39dbb114d45c8188628f94302a1d8e65e822227fcf68bad973f8967fae93ae20d1a9d87b07651a357388736e588458446e2290e0aa9d03bec46fd4b0e8812eb3f7cd4b5b9d04acccbcbb5feb1341c9c4fcc95eed8be5a1ae3317205b1e83c716899da74f8d1d7257637fb374fabce99d83b8dd8ecd31de0b41f91e67c200bf0d3d0130d39d457cbba29b898f355b94785f63c65696be569957a755d8a145abdf7b886c6e55610ee20d992086dc428e30c1647a3257bd9c4f22b92303b069dbcb1f4726938b7ce18cdb65edfaf9d6b3133daadd61423cf3df3ef14f1d13903a088bd837e6594f9cf3d470dd8f45459796ce11a0db9ba95c66976d9f6367ec22c86edba8b98cc6c62b8e160e92d7a9e80936b4f10272cb6f0d66313ed5811858bc7369220bc83d9d0e71f047933d5234e0cddecb013d011bc970fef6e1794a12c217372d77f0720fa05f7ad00c930729d7f29ec404a621ccfa0df27f7fe8e21d49b69b2026b456"}, {0x80, 0x1, 0x9, "6fe6ce34cdd93bdf85eddb64f9c6ca173031c76a3e607b32bb217c4d82bedc62185de39ec765cda7263285950e05bc109a3f1adbf7adbad22705fada32581585199f4cf4482bc3fef47009f09b873bf18777ba0370b58215a5c709f9403f51c1b3dc91cea01d1fa585a873ca"}, {0xa0, 0x0, 0x4, "27d9d37e39d585674c09721eb7d75b8df7b3ad1ebedcad1b116e37c58e8effc5227e0b3b3513029b0dc33290b43f98aaea354b15e27208a8e6ebee4b5907c6eecdb297f5d970ef2bd2ab2c962deb14a44b3f8769ce81516fca8a0ea722f5b46934f40bcad90caa0dc0a7bba6c18ed9ad1c56d93afb0deccc76db8463b3a4b2996127a92f8aa122a99d7647066bd81af0"}, {0x40, 0x107, 0x0, "d4da3e18be493b32f371530e6049bc7e1e0e8653c1a714dc633af62af52d3503ec8f5ae5a83f3ccc119963"}, {0xf0, 0x1ba, 0x8, "4e68053e2655f9b5202b0fb7479c81669e1a6173237dea5871d875405548d1a2938e579ee571bb40fe5efeb40c656be59ada48213102ff6731ccca4256cbf54f7d732b268fae27acf8e9eda72445b1ef0696bbb8df62895ea09ef92908c05683bece2df55916b204e98e52d7dad22327cbc2277bd06c027f99fe2cf63769092bc192d5e6288e03bc0db4b76f65d26df4e8335bd9ab1097b56121dcb8c2d14f13905aa238786f11fae36f29826a486573e282685009a0c3755fe4ba18a4a62464d1340f61c877a4c2f532bb6f8ee4e32d2b7da258fc6b4fc75fb5a71ce3"}, {0x1010, 0x115, 0x7fffffff, "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"}], 0x2310, 0x20004800}, 0x3f}], 0x4, 0xeffdffff00000000) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000013c0)=0x2) 21:46:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000000)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000000c0)={0x10000000000081, 0x0, [0x3]}) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f00000003c0)={0xfffffe00, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6}]}}) [ 225.272677] audit: type=1804 audit(1538603186.227:40): pid=7938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/12/bus" dev="sda1" ino=16529 res=1 21:46:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x101400) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x7, 0x30}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r3, 0x9, 0x0, 0x5}, &(0x7f0000000340)=0x10) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000200)={0x4, 0x5, 0xffff}) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="eb58b850f85f75059b956d36da34851d97906d6b66732e6661", 0x19, 0x5}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="80"]) ioctl$TUNSETLINK(r1, 0x400454cd, 0x337) 21:46:26 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r2 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write$9p(r2, &(0x7f0000000140)="d6", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) mq_getsetattr(r2, &(0x7f0000000000)={0x4, 0x1000, 0x4, 0xee, 0x100, 0xfffffffffffffff7, 0x1, 0x1}, &(0x7f0000000080)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r3 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000200)) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0xe, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socket$inet(0x2, 0x80003, 0x4) r4 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0xba9, 0x100) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f00000002c0)={0x9, 0x8, 0x2}, 0x10) syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f00000000c0)) [ 225.415136] audit: type=1804 audit(1538603186.267:41): pid=7949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/12/bus" dev="sda1" ino=16529 res=1 [ 225.464169] FAT-fs (loop0): Unrecognized mount option "€" or missing value 21:46:26 executing program 3: r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x23) semget(0x0, 0x4, 0x100) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x0, 0xa18, 0x0, {0x0, 0x3f}, {0x3f122a83, 0xff}, @cond=[{0x6, 0x9, 0x3, 0x3, 0x4, 0x3f}, {0xff, 0xffffffffffffffe1, 0x101, 0xffffffff, 0x9, 0xc0}]}) clone(0x218000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) [ 225.519958] binder: 7965:7966 ioctl c018620b 20000200 returned -14 21:46:26 executing program 3: r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000003d00)=0x6e) sendmmsg(r0, &(0x7f0000003c80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="273c3b4a0d9617c2c9cd97e5826ef40c456df76bbffcee4c58737d764c6dcbb7b24e769084e1966c5cc9e57202938e4e16dd4b69f72ac1ffd8eb36958451a5aad65bc841179b8f99f00fdaecea5156dda28f066149e3c7e4d9f397c3959969e93e4e5ae41960907018555b4920849b733f8206be73f38e9357720a49b72797c6100b25b8fee7be9649486dbf31b479c738040ef37755c8b9d9f3bca86912c4471d290ffee26e8a5ec79ad80049f9c535a4a0cfcdd53b2d34fe0073ea6037c51a97589667222f96f9d3e4feb7aaed799b09387a6f929a9b58885eb562c5fb39aeb75ad11fa88f60886e330e2d44f27ec5", 0xf0}, {&(0x7f00000001c0)="85b0ebb21ca5e879e85f471cb628b37ffd37356decd77d44f67c706cb4674966906cef297e169a85", 0x28}, {&(0x7f0000000200)="fb5870", 0x3}, {&(0x7f0000000240)="84ec0d01e5910cc4ee6ee38053330bd18e7fcfeca394f131e9a6c9772cb1a4e37c5bcc062779eef7b8e30551365d609eea43b32bf65b146a4ace6b958cde3eb0c684ebbe780927d59a37f1d0310554910091903de0aab629c6795e69d687d6ef2595efa4b37b30f11ae059a8e97f048f066f7b8780199c85a3156f143740b98b319e5f676f6c09e9fbb71b16b9507c5d92c9e57a6bac66257e9aaf8c1729c4", 0x9f}, {&(0x7f0000000300)="f9728b22adda3240d66ac908b5549288b77389dfadb63e0a7bfa5d484d4315014b1aa7437dd78f9eef99ea4fb17d5365716fae41400bdb8015c5f126fd001b45146abfad1668ff6068b5da9739026651a1d936cb9f36d5288a00fa69521ca0359cdad3886b900cb3fea54077641266d7d77a3980480bd1cd1d0c0cc8bbf76e7e944eaa0e7644394f6faf8e5627128411a96f47a83236b0c6d32d8e72a86e3402067df98d4097d93edbb1038449feadb4d14331f6", 0xb4}], 0x5, &(0x7f0000000440)=[{0xd0, 0x1ff, 0x6, "bc54c8744722f0cd1ae694c78fea10b543c08a3004b1c11b2b96086c965b0686d7faf211a43da2036ef983395a062f9f8265a15965133596be2239fed0c6f587a9190eef0f1ee8386c7c4851e5956b6401ca06e676efc0b33c501e00bcf69edf6ab8d1b3fe6c3bc498ddbb250d64ebe6ea53e60cc2f94d94ecddc3390a87418a05a1b5b965c0f3d23b497a136b339876a0c47a000d70fe5b31fc4a75bd34834a234ec3933975d8e4b63b8e253888eb318c4561b50012970ca1"}, {0x1010, 0x10e, 0x3, "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"}, {0x38, 0x11b, 0x2, "861055ee1cda2bdfb4b46e15d7daa1cd68111683db3d917412d1b15523f84683595b376f2433bd08"}, {0x98, 0xff, 0x100000000, "f9a3e7159276e280b0a224a718e9cfdd1b4f76faf9d76a5e9038c4fec30f5d792099d56c71033d63cd7da7bc7cb0ed289e593d1fe4fa878de47f16d38bf330489173a781514e4079c0602b6fad83cd8d4f675bef84d506f95a6feada3958621c51510f0e2796c3840e1e1f12e7d0d80bfa31c34bfa1ba7595c1b109a777c4b8ac65846a846"}, {0x30, 0x10f, 0x5, "66efabda9eef9e1724c8a7e11c4c139f6f717740f5454928e8ad017afd4125"}, {0x28, 0x13f, 0xfff, "d2941bbcdd0dc29a0116a7d7cabf4a4b0c60"}, {0xa8, 0x10f, 0x80000000, "b930491ade861c2341851df69f30af528b65e5d63873340f0771e4af691f4bc6cafd87781c56c2dda826f7eb47118a5f6f5eff3cb9821c677cb196260b78797ef2aa408600e40fd13c3df6fcf7011806cd03602374deb3b8599758327c34ad994c370c52f7a8869197651b63135e3f9565fdd196a8a4bf457a86e8af5d491083b2ff4d348fba6c8d984961d92be4daf617b5d63c53906f49"}, {0xd0, 0x11d, 0x0, "ccd5282a59289b2641ca3dd1c738feeaaade47d4ee6b9fb69b76f90121406e7a5527573f5061c46960e5227486a5028877b59899ffb04c98264992af1a7c9404a304bf1d9130070d6f6acf349bea5bc43da59148a355616a43afc7c00f596cb492db42ad9dcf5e56e399844e661be2c753360a06760eea46ecdfe84bc79a2ff782a60e832d9ede464685b7c0e32623d7792260838eedcb73ecff460b3f7d15589b871c96e0fc33a33add516fffd2c69756d32bab671cabb16517f0"}], 0x1380, 0x40004}, 0x1}, {{&(0x7f00000017c0)=@nl=@unspec, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001840)="bb66ae2f17abc5556e0dcc4f10643186a26d122d9d622c90195f91defab2a8591737046cd5bb04934338448a7513ba1678e699cdb0091f029508589235d607878ebd1fe46a2e66493e2223b4254954a5522b2f323b52ef5640b9df305cd72571cec43b08a48eb32fd437ca63ba550c4ebffe64a5c907a8a82646101d3467b2c2024c6c109e3583698b4baf66cc85e0cf1266a6", 0x93}, {&(0x7f0000001900)="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", 0xfe}], 0x2, &(0x7f0000001a40)=[{0x1010, 0x1bf, 0x6, "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"}, {0x30, 0x0, 0x1f, "065d8ffed29733c744a2455ac804fbee27f9624c3e9f514f50e3c5673eecf17a"}, {0x30, 0x1, 0x100000000, "cd8a52050b54a2207e639080fdde3c78a28657362403700256baad5f4d4e28"}, {0xb8, 0x0, 0x3, "1e9ff50d354a283736e20cdc847e8d2d8d444311bfc610fcac0f424f0064be3644566f5167b497a3f48c4d60e653de6c17b80abfb4cae711f5b62a2172a34c2a381fa847a44f63c3b828c2678ce3406c3493fef4d2ca71119fae4c9ff9abaae3640c4c676c2d95bd1137219ed55c2493ce9bc66e160c09cee4c7272a267b93005c9f66d28c32e0db6503c229fa15e1c90f37c194b8e8e0bee75c91565a4cc5832999ec51"}, {0xd0, 0x88, 0x83c2, "193941be52e5968aa77c65955debe7e18fad3556541312a638d9ed76f95068acc15394550c17a134d817f4cc9c1eceaddb6bcb255ab60edef4adfa5113bfd3df63f78957ed3389948db154856d3fd85f08cfeefe03664e65e5303c194988c3364fb784f4f6acb24d3b5e9ce72aef312c6cb0134d8f29bc65df96c89d71792be5c49d692b87f1bfe66df265c4501565a7e2579fe5efe8b92c6a5a4d724340967591a30c8cb8adb3d4edff7d1fa9ca811b4066391d0d0c27847233bd85"}, {0x10, 0x118, 0x9}, {0x1010, 0x114, 0x7fffffff, "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"}], 0x2218}, 0x8}], 0x2, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000808fc8)={&(0x7f0000e87000), 0xc, &(0x7f0000a3bff8)={&(0x7f0000e69fb8)=@ipmr_newroute={0x40, 0x18, 0xc21, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, [@RTA_MULTIPATH={0x17}]}, 0x40}}, 0x0) [ 225.603323] binder: 7965:7974 ioctl c018620b 20000200 returned -14 [ 225.622162] FAT-fs (loop0): Unrecognized mount option "€" or missing value 21:46:26 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) open$dir(&(0x7f0000000380)='./file0\x00', 0x480040, 0x8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',fsmagic=0x0000000000000020,subj_user=,uid<', @ANYRESDEC=r3, @ANYBLOB="2c6675636c8020010000000000643e000000000000000700010000000100", @ANYRESDEC=r3, @ANYBLOB=',mask=^MAY_READ,euid=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) [ 225.710276] audit: type=1804 audit(1538603186.667:42): pid=7938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/12/bus" dev="sda1" ino=16529 res=1 [ 225.738644] overlayfs: missing 'lowerdir' [ 225.855100] audit: type=1804 audit(1538603186.687:43): pid=7949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/12/bus" dev="sda1" ino=16529 res=1 21:46:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffe66) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000000)=""/99, &(0x7f0000000080)=0x63) 21:46:26 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000012c0)='./file0/bus\x00', 0x0) ioctl$void(r1, 0xc0045878) r2 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) r3 = dup(r2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2011, r3, 0x0) ioctl(r0, 0x80184132, &(0x7f0000000000)) 21:46:26 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x800087) sendto$inet6(r0, &(0x7f0000000080), 0xfc00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 21:46:26 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000540)=0xe8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x25}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0}, 0x48) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x200, &(0x7f0000000200)="2781ae494af595c9a719fd8b600817e609000000b1510000000000000000000000") r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x280000, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000380)={0x8a, 0x6, 0x0, {0x2, 0x2, 0x61, 0x0, '\\GPLcgrouptrusted@\'security^:md5sumposix_acl_access[*-&.selinuxcpusetmd5sumposix_acl_access:--\\@@'}}, 0x8a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0x5d, &(0x7f0000000100)="79e313e31150f3ff3ed3be97d835", &(0x7f0000000140)=""/93, 0x1650}, 0x28) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/250) 21:46:26 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = getpid() wait4(r0, &(0x7f0000000100), 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x0) linkat(r2, &(0x7f00000005c0)='./bus\x00', r1, &(0x7f0000000640)='./bus\x00', 0x400) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000480)) openat$cgroup_procs(r1, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") statx(r4, &(0x7f0000000140)='./bus\x00', 0x6000, 0x1, &(0x7f0000000840)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000004c0)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000740)=""/194) fcntl$setstatus(r5, 0x4, 0x6100) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @loopback}, {0x0, @remote}, 0x72, {0x2, 0x4e21, @broadcast}, 'bond_slave_1\x00'}) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x5, 0x10000) dup(0xffffffffffffffff) 21:46:26 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x100000000000001, 0x5b) r1 = dup(r0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000240)={0x4, 0x8001}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d6, @mcast1, 0x4}, 0x1c) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xaf, 0x2, 0xa0, "1f115c88a047d29a498427ce2c67cc09", "2b066812e3fe657fab0f7e04e28167d841793b6c1e5456aaca8df9eef9f81e053ee0b606195cdae9796d3b2f0bb712ec435f30e559df69da76fe2ada0e5f8fdaf3f311293a219f33dee135590d8774438a9728250ce5425bc1e72dc1daf0327e39e94f0a4cc55890e3de04a77daaadfd9601cf4ac7d87e14fe3482e952d1dd5c8efcc9ee771ebcf81e4b54838b4961b7c84a25e9cc21f0239c7a"}, 0xaf, 0x2) sendmmsg(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0x10}], 0x10}}], 0x4000350, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/13, 0xd) [ 226.023502] audit: type=1804 audit(1538603186.757:44): pid=7953 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/12/bus" dev="sda1" ino=16529 res=1 21:46:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480), 0x83, &(0x7f0000000440)={&(0x7f0000000380)={0x14, 0x22, 0x0, 0x0, 0x0, {0x5801}}, 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000780)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x38) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x600}) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000002c0)='selinux\x00', 0x8, 0x3) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xfeffffff}, 0xc, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) 21:46:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x800, 0xff, &(0x7f0000000040)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000100)={0x1d, 0x1}) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000080)=0x5) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000140)={0x2, 0x0, [0x17b]}) 21:46:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0xffffffffb27f2d49) sendmmsg(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, &(0x7f00000012c0)}}, {{&(0x7f0000001300)=@rc, 0x80, &(0x7f0000004740), 0x0, &(0x7f00000047c0)}}], 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x2) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x800, 0x1) [ 226.158436] audit: type=1804 audit(1538603186.757:45): pid=7938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/12/bus" dev="sda1" ino=16529 res=1 21:46:27 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x2a2800, 0x0) readlinkat(r0, &(0x7f000090fff8)='./file0\x00', &(0x7f0000728000)=""/145, 0x91) r1 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x200, 0x7, &(0x7f0000000540)=[{&(0x7f00000000c0)="e7fd84a18f1dae", 0x7, 0x8}, {&(0x7f0000000100)="df72a02de6b85bbe0bc55c439745ea86bfb62c4caa0d76941a22be71fc8e7325231d8163ffc4712c6ca4224230abbbe8fb3f76f6ce571e05508e8518b46e492044d25cee3a58c839a2acda09ef1f3e125c521879e6e6e36ea4ed68f1112c62b37a9a619830f58be06258812791379e4f8cce9ad80aaeaaf2b3764aa2d7b2a5252ce631e7514b143b4fe53b035b2dd97bf289342e5862ce61adf668d3ac072a0fa6277da682edb497759909b62bc416c1e3fce3e11b4d7e510e2cf38fa8a2b391b1816534f7136616201defdafd38ebc75ee967ba64eeb797c06b307f", 0xdc, 0x81}, {&(0x7f0000000200)="915998ab96a4af3e001b29ddf519561d30aa8c4a2cf79f31fc372897c8522ccfe6ff6590f74da02a5c5945e9769793cbcb4f846a1d6d2d639ffc2b4b537973effb0705ed6c7875f843e2e5", 0x4b, 0xfffffffeffffffff}, {&(0x7f0000000280)="97e1d0372c67cd5cdb40504ac84bbb9f3668af4ac5be8dbf50a1a037058257eb7075b353a36853f304562794878ef51a1ae2854c06204a5b339a69d24a04b94e92fd3f1c03873d06867f8076a72d5f9f5ec8d214dd40ab3de87421aacad141bc2658c1f596a1e9a0859e827e8adbb6586ca6bab1160150b36d09813759bb8f51b499d29383d0b7d8ea094ca86ac06db26a23a3945fcd", 0x96, 0x7}, {&(0x7f0000000340)="3639cdbef4fdf70236334a3e4c9cfe7f46d0f9e920c6174165f26c72967d927ea7d1cdda0a7faa8ca15977489340ceee866282408666fe5fac3e1e6c714678922260eab8d481e7637131d263", 0x4c, 0x100000001}, {&(0x7f00000003c0)="4208b2676d5a7fce8d8cfbd2ec777b47ec18093118cc94bc5dc463def5372f79262902556eb45960e1e068770f16d284a85a27a4312ded365afcf61047b42e08bb9eda621e7f40af639d29a1b1b38b1770f971293eccbf325edbffb6a9db91c3a9fa05fec7b4fd55d69f7cf7bbe5b813361b352113072b23cceae46c7d1bc51677ff08f3f402196c8466ec2fc81e4a7dd31c64919c", 0x95, 0x7}, {&(0x7f0000000480)="14107846d071e2109e52b0f4b8f79a1d37b85442d548b98cb43978dad18b019c1c74d11a21d672f5bf677897af6a602d3c38cc9527f127e88c7013f4843229f440da8305cf966c709d3d5863e0bf20fcb35512e8291990102ea3526485ad8eb3404fc4b60c6caec25b998cc8f017d2ca799b2075522055decf3bcacb60e725a7699126b9480741e6273122b1ed0751ae0aecd661755d51991ec0e12946e046f86e5db7fce0019f111ac8c1b802aa80602db4e292a8b8c926b598f3", 0xbb, 0xeb8}], 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r1, @ANYBLOB=',resize,voquota,errors=remount-ro,fowner<', @ANYRESDEC=r2, @ANYBLOB=',mask=MAY_READ,euid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) [ 226.286522] audit: type=1804 audit(1538603186.967:46): pid=8003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir929625351/syzkaller.l7z9dO/13/file0/bus" dev="sda1" ino=16535 res=1 21:46:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x930, 0x4) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000bc0)="f5", 0x1, 0x0, &(0x7f0000000cc0), 0x10) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/222, 0xde}], 0x1, &(0x7f0000000240)=""/22, 0x16}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x0, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000003c0)) [ 226.357301] jfs: Unrecognized mount option "voquota" or missing value 21:46:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)={0x1, 0x1, [0x4]}) r0 = msgget$private(0x0, 0x4) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000000c0)=""/170) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000840)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000002c0)=0x573) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12001}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r2, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000800) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x5) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000880)={0x2, 0x4e23, @remote}, 0x10) [ 226.451621] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 226.480092] jfs: Unrecognized mount option "voquota" or missing value 21:46:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) io_setup(0x40, &(0x7f0000000000)=0x0) io_getevents(r1, 0x76, 0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000100)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x1) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) chroot(&(0x7f0000000280)='./file0\x00') setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 226.494620] audit: type=1804 audit(1538603186.977:47): pid=8013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir929625351/syzkaller.l7z9dO/13/file0/bus" dev="sda1" ino=16535 res=1 [ 226.530730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:27 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20200, 0x10) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x8, &(0x7f00000000c0)=0x1) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x5, 0x1, 0x1, r0}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) sendto$packet(r1, &(0x7f0000000180)="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", 0x1000, 0x10, 0x0, 0x0) ioctl$KVM_SET_CPUID(r1, 0x8008551c, &(0x7f0000000140)={0x1, 0x3, [{}]}) 21:46:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) write$uinput_user_dev(r0, &(0x7f0000000240)={'syz0\x00', {0xfffffffffffffffe, 0x3, 0x9, 0x6}, 0x41, [0x4, 0x6, 0x4, 0x3, 0x1, 0x100000000, 0x9c00000000000000, 0x100000001, 0xa3d, 0x0, 0x100000000, 0x4, 0x7, 0x3, 0x26, 0x2, 0x1, 0x5, 0x4, 0x40, 0x7fffffff, 0x7ff, 0x401, 0x100, 0x1, 0x100, 0x7, 0x8, 0x5, 0xc, 0x8014, 0xb779, 0x8, 0x800, 0x48, 0x8001, 0xb15f, 0x100000001, 0x1, 0x8001, 0xffffffffffff50e3, 0x1, 0x3f, 0xffffffffffffff81, 0x6, 0x6, 0x5, 0x7, 0xffffffffffffffc1, 0x2123, 0x8b, 0x8c, 0x2, 0x80, 0x5, 0x8, 0x6cd9, 0x8, 0x8, 0x8, 0x5, 0x5, 0x9, 0x6], [0x20, 0x8, 0x1f, 0x2, 0x8000, 0xfff, 0x39c5d141, 0x7fffffff, 0x4, 0xfffff00000000000, 0x0, 0x8a1, 0x8, 0x7fffffff, 0x1, 0x7, 0x3, 0xc007, 0x9, 0x180000000, 0x3, 0x0, 0x7, 0x2, 0x4, 0x1, 0xff, 0x5, 0x81, 0x40, 0x6, 0x7, 0x5d48, 0x1, 0x3, 0x4, 0x1000, 0x0, 0x401, 0x7, 0x2, 0xb64, 0x1c00000000000, 0xdb, 0x5, 0x9, 0x1000, 0x1, 0x575, 0x0, 0xa80, 0x7f, 0x1, 0x0, 0x0, 0x6, 0x80, 0x10001, 0x20, 0x3, 0x5, 0x3, 0xf184, 0x8], [0x8001, 0x2, 0x8, 0x2, 0x1f, 0x1, 0x2, 0x3, 0x7fff, 0x40, 0x0, 0x7ff, 0x8000, 0x36, 0x1, 0xe0, 0x3, 0x140000, 0x8, 0x81, 0x3, 0x6bb, 0xcc, 0x8e, 0x200, 0x1, 0x3aa, 0xfffffffffffffffc, 0x3, 0x7f, 0xd070, 0x0, 0x4, 0x27, 0x5, 0x0, 0x5, 0x5, 0x7fff, 0x4, 0x80000001, 0x0, 0x7, 0xf11, 0x3, 0x800, 0x100, 0x9, 0xfffffffffffffffe, 0x9, 0x9, 0x100000000, 0x0, 0x3, 0x4, 0x8, 0x1, 0x6, 0x9, 0x467e, 0x7b8, 0xfffffffffffff001, 0xffffffffffff1796, 0x1], [0xd, 0x1, 0x3, 0x6, 0x6, 0xbd1, 0xa5ce, 0xff, 0x1, 0x5, 0x40, 0x63e1, 0x7fffffff, 0x3, 0x3f, 0x100, 0xf5, 0x1f, 0x1000, 0x9, 0x4, 0x9, 0x7, 0x3f, 0x8001, 0x3, 0x7d3f211, 0xffff, 0xffff, 0x4, 0x6, 0x6, 0x0, 0x6, 0x9, 0x2, 0x7ff, 0x1, 0x1, 0x7f, 0x8fa9, 0x6, 0x2, 0x6e, 0x9f, 0x46, 0x16d, 0xc44, 0x8, 0xbcb, 0x2, 0x10000, 0x3, 0xff, 0x8000, 0x5, 0x1, 0xa5, 0x1f, 0x7, 0x0, 0x23e, 0x0, 0x4]}, 0x45c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_DEV_SETUP(r0, 0x406855c9, &(0x7f00000001c0)={{}, 'syz0\x00'}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x4, 0x5, @tid=r1}, &(0x7f0000000080)) ptrace$getregs(0xe, r1, 0x9, &(0x7f0000000000)=""/49) 21:46:27 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x800000000b348, 0x2) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='$vboxnet1,posix_acl_access#\x00', r0}, 0x10) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000780)="4982ef8464d0b11a770dfe0e9361a85b6d9466ed385ec28a3e91dd40e20f4b23af170300000099af97a5e73f025babc1b973f8791849e66ba177d7ffe18d9fca718506afe89a2c0aa945dbea8bdef4b320513f3672ef4727d44a4684ac8916b9ddadac03000000d85cdb866c9b615e7788a2c80081b2ac8383f8397b48b9296b2582d8ee9345d0f9cea8d0cb6701c60348b416ddd44d500856c0adf196b6fe6a3adc53e7ca664a391b8e5d3f03ef6036d855439261b41a907ec1f6ec191282d23ce2e40243c4688d8efd63b2cd630aac5c57ee9965da9281cbdcbd19fa183a50761d62cf646bacfeed118828620645481c849a0834026a11b63116548ec9cbe3") setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x15, 0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000280)='veth1_to_bridge\x00') getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() symlink(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00') r6 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) getgroups(0x7, &(0x7f00000006c0)=[r2, r3, r4, r5, r6, r7, r8]) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x4, 0x1, {0xa, 0x4e21, 0x7, @mcast2, 0x7f}}}, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) truncate(&(0x7f00000002c0)='./file0\x00', 0x4) recvmmsg(r0, &(0x7f00000020c0)=[{{&(0x7f0000000a40)=@ax25, 0x80, &(0x7f0000001b00)=[{&(0x7f0000000ac0)=""/7, 0x7}, {&(0x7f0000000b00)=""/4096, 0x1000}], 0x2, &(0x7f0000001b40)=""/39, 0x27, 0x5}, 0x10001}, {{&(0x7f0000001b80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001c00)=""/121, 0x79}], 0x1, &(0x7f0000001cc0)=""/174, 0xae, 0x3}, 0x5}, {{&(0x7f0000001d80)=@sco, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001e00)=""/158, 0x9e}], 0x1, 0x0, 0x0, 0xea}, 0x838c}, {{&(0x7f0000001f00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001f80)=""/30, 0x1e}], 0x1, &(0x7f0000002000)=""/129, 0x81, 0x3}, 0x3}], 0x4, 0x100, &(0x7f00000021c0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002200)={'gretap0\x00', r10}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0xc0385720, &(0x7f0000000140)=0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r9, 0x40106614, &(0x7f00000000c0)={0x0, @speck128}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) 21:46:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x7f, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000008, 0x40010, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4e, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="12634840020000000000000004000000000000000000000010000000000000000000000018000000000000005000000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="ba7b00000300010000000000"], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="780000493a0000005800000000000000f66c43b22e993880380000000000000000000000000000000000000000000000680000000000000040000000000000000000000000000000400000000000a429484a61aa2fdc5b49cb8246770000"], @ANYRES16=r1, @ANYRES64=r2], 0x5d, 0x0, &(0x7f00000003c0)="77908b7a3155943dd9aa0ab62c141815d47767a7e98eed60c4350efaa12cb8824e7e25a33c89fc1f2a5f8152506149da520843e2940e76924b66a2ca215b5eada1f05f4b0436b7b660efa3100a523cf1e337a8b28ff2deb2d157a9a0de"}) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext={0xffffffff}, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="d709c5741d0bd38ba04a621f39606bdd91f112201776ed782bd4"], &(0x7f0000000100)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 21:46:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4010ae67, &(0x7f0000000300)) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000280)) socketpair(0x1b, 0x5, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000080)={0x2, 0x8001}) 21:46:28 executing program 1: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x100000006) open$dir(&(0x7f0000000340)='./file0\x00', 0x40, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="01509518000100", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 21:46:28 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) close(r2) poll(&(0x7f0000000000)=[{r1}, {r1}, {r1}], 0x3, 0x0) 21:46:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="000100000008000066000000c9030000ec000000010000000000000009000000002000000020000000010000000000006e5fbe5a0000ffff53ef0100010000006e5fbe5a000000000000000001000000000000000b000000800000002c", 0x5d, 0x400}], 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00']) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) sync() [ 227.129402] syz-executor3 (8008) used greatest stack depth: 11968 bytes left 21:46:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2000, 0x0) getdents(r1, &(0x7f00000003c0)=""/255, 0x4673508dea4173ac) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3000004, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)) ioctl$KVM_NMI(r1, 0xae9a) [ 227.170012] 9pnet: Insufficient options for proto=fd [ 227.178688] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 21:46:28 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x4, 0x2) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000180)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x5}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0xcf, &(0x7f0000000340)=""/207}, 0x48) [ 227.214997] 9pnet: Insufficient options for proto=fd [ 227.229070] EXT4-fs (loop0): fragment/cluster size (524288) != block size (1024) 21:46:28 executing program 5: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522002000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000340)) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000300)=0x6, 0x8) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="c3cb7e8e845bfba1efa7b591b9344b2502b41ba564b9bbb8b8b57673f775a58fc8df501f31154b73", 0x28}, {&(0x7f00000013c0)="7c18fdc3", 0x4}, {&(0x7f0000001400)="fe93925e8dc6e0426a8458973d97a8865e06b98feaadbe6747cd7233fa5fb7b47ea9edcc35042ecf850c76500b6f557691a91818c7ec6b33216bfaef094483a3fc9aac04adba", 0x46}, {&(0x7f0000001480)="0351d852c24653bb88830a995311d239a1190b04687938e1cb0e473a93ffa858dc4dd3ceff78598e78", 0x29}, {&(0x7f00000014c0)="81d3525d69c52b80ecc2413d4a2e93394d3fe6dd93c55c7a", 0x18}, {&(0x7f0000001500)="02809dc238c3e556ca7efdd3c761fe1f8f135448211abb7a45bf773770d9a6495c219d9445d89203beee787ac8311dcfb23327e11ab460b92dfafe11fa78022bdb86586eb6bdbfc39704720876fc205c04ed55a44bb19c6fecf8faf039233324145fe06452031d89a8302d64533bd8acd173b7926033b19af7e0c72541427f66124105319efad9f476af17396f857cc73d8d7764c783a6de26825fef99f61182a3d54453df1b939668d4ba1b0ac93b2c826e56e4905fe4ea3882e4239979effcec99f59b550b1963632d5989b1f7ba13109770aa", 0xd4}, {&(0x7f0000001600)="9b9bf107c9de4e73deba3f583e911a5c6dfcef81fbb1702d92963dc37591b1264f24948fa31c15020096920b2b873813be337e53e24fb3fbe29c9ef8af75bb94f031b192e269594d58c57edea2636817e1866e1140ee765cff296289354f18844fcacd74b3fa85f7e0d8e47accae21830c18003d462f5417a3c06575045218d3", 0x80}, {&(0x7f0000001680)="864f691039e083f2f2306855cf1e0b510b2b56660bc86d6495dc4855d20bd3308e80ca18096f78a78d8a0d0124703187888ce12e47acccf1f5ac9d5bb89713463f58613251fb55c1e97205b72a5b6fe0b6aa149baa2c28088f000c97d009095f4a5fabd2a88c4cb483a15808d5e966517fa8f1d8c0ed8f7ef88262364d83e8bbc4", 0x81}, {&(0x7f0000001740)="7e191ac9265b576ffcc7690e2401299502f288a80b8d42c0e9e27a733f8d6a07e6bf3baf568a61fce448ba1e8499e89fb8fe9b4397b9e6b5573cc28557a5a49606b76b1fa89103878dce924abd974ae3912e23d4c519366210", 0x59}], 0xa}, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000019c0)={0x100000000000000, 0x0, 0x4, 0x1, 0x20}) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}, 0x2, 0x1000}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r3, 0x9}, &(0x7f0000000280)=0x8) accept$packet(r2, &(0x7f0000001900)={0x11, 0x0, 0x0}, &(0x7f0000001940)=0x14) sendto$packet(r2, &(0x7f0000001880)="e1b890f9f49fbcc7342a0777b41aed07619fdd5db77926291a245d27adc8386e9e65a0554db06730c8f3d73b144b24cf14de82897c05fcaf67ea0bf8dbb4db5891fa4bab56b2e7e7bba29f88a83e6ebb526b2f998205e45a22332560ab695c1e509b864fb554818f55e8", 0x6a, 0x4, &(0x7f0000001980)={0x11, 0x19, r4, 0x1, 0x5, 0x6, @remote}, 0x14) 21:46:28 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000040)="eacf2934b67cb0276e78a48d566c27779fb003385dab1c9aba", 0x19, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x812, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000340)=""/4096, 0x1000}, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 21:46:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000003c0)={{0x40}, 'port1\x00', 0x14, 0x100000, 0x6091, 0x1, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x401}) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000240)={0x51, &(0x7f0000000140)="f0f19602b8350c828a5bccc68d1b1843dd6e2d4bb3b0be734afd9790f921866eeefeab7d442a4ceede36786f9fefa66716ed5116d150bb09f89e2d0464c0d89a911caf8087400b0aab3725a447a069faa6"}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e21, 0x5, @mcast1, 0x80000000}, {0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xc}, 0x33b}, 0x60, [0x0, 0x0, 0x0, 0xef, 0x7, 0x7, 0x0, 0x3]}, 0x5c) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000280)) [ 227.318578] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 227.358095] EXT4-fs (loop0): fragment/cluster size (524288) != block size (1024) 21:46:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000180)="152d62354801005d766070") recvfrom$packet(r1, &(0x7f00000001c0)=""/122, 0x7a, 0x0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x705000) socketpair(0x3, 0x805, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000080)) 21:46:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x12000, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x0, 0x3}, 0x14) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000100)=0x2fc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$get_persistent(0x1d, r2, 0x0) 21:46:28 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x84}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 227.412589] binder: 8127:8129 ioctl c018620c 20000280 returned -1 [ 227.434585] binder: 8127:8134 ioctl c018620c 20000280 returned -1 21:46:28 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) request_key(&(0x7f0000000080)="72787270149be5bdc14c6d7c12573393d00d5f3e6300", &(0x7f0000000040)={"0300", 0x2}, &(0x7f0000000000)="520972757374e363797367725665783a4465", 0x0) 21:46:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x2, 0x42201) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000002c0)="9a5b518e59f4af8d0bce6d4a08b39172", 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc8070031") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000200)='syz1\x00') r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) fsetxattr(r3, &(0x7f00000000c0)=@random={'system.', '\'GPLproc\x00'}, &(0x7f0000000100)='IPVS\x00', 0x5, 0x3) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x1, 0x0) write$sndseq(r4, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control={0x0, 0x5}}], 0x30) r5 = dup2(r1, r4) chmod(&(0x7f0000000300)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') write$tun(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) fchdir(r5) 21:46:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$kcm(0xa, 0x80007, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x21, 0x4, 0x7}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f00000002c0)}, 0x10) 21:46:28 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x7, &(0x7f0000000080), &(0x7f0000000240)}, 0x78) 21:46:28 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffc, 0x0, 0x0, 0xffff, 0x0, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x71, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="dbce89f3c132685e9500"]) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) bind$unix(r1, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) ppoll(&(0x7f0000000140)=[{r0}, {r0, 0x40}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={0x5}, 0x8) 21:46:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x0, 0x2, {0xffffffffffffffff, 0x1, 0x0, 0x3, 0xfffffffffffffff9}}) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x4011, r1, 0x0) munmap(&(0x7f00001c0000/0x4000)=nil, 0x4000) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x100, 0x204400) bind$rds(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) mmap(&(0x7f00001c0000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) [ 227.676241] kernel msg: ebtables bug: please report to author: Entries_size never zero 21:46:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffffff01) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40000, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:46:28 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000300, 0x6000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x200000000000008, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="000000001b5ebebb447030aeb22945e167342939f549033780d617de4264fecab44536c1c80b5b56006fbd2eb634aee28626881d8aff06b55a90850b1f73a54bdd5cf990ab6891e587022b3198f2cd6baa9116967b1b2118abc80430c05e30838d492c39b165b27eedbbf142874d9a1f35bbab5103fbb081b11eedd6e0ef28b42e5b63775148c98d634a4919da0af3a60709feb624460ce073e2089698e7d7bf380e3ad5b8760875e48f245ba0b7d4289088b98c134ff2b8a3aa5c532d75ea2c5321766794adc7"], &(0x7f0000000280)=0x1) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 227.721480] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 227.760433] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "ÛΉóÁ2h^•" 21:46:28 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001280)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001180)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) ioctl$KDDISABIO(r1, 0x4b37) fcntl$dupfd(r2, 0x406, r2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e21, @loopback}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r2, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0x10, &(0x7f0000000500)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f0000000580)=0x10) r4 = socket$inet6(0xa, 0x40000080806, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0xc3813, r3, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x20000003) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) write(r6, &(0x7f0000000180)="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", 0x1000) ioctl$int_in(r5, 0x5452, &(0x7f00000000c0)=0x2) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f00000011c0)=ANY=[@ANYBLOB="003d22a58cf3ea1c8755465686c3f4a7366db4f9d0439372fc8a773e0cf0c8271131ec5dcb717356c245a1db1db0cf84f6f698ba5e9efe45a4e8b023955c662449c22debbadc2bd7ebf8f1bb7e451e5670a8fffc853982c878d60300000000000000bcdff71a6a65bbf89c9db4db32832804383caffb089fb7e89ee8930fcb3c9f52aefaedb84fb976bc3bb6bd84248b0f6ab68231f522413390047929394783a5"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 21:46:28 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = socket$inet(0x2, 0x8008000000003, 0x2f) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40100, 0x0) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f00000002c0)={0x7f, 0x8a0, 0x1000, 0x4}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="ba") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0xffe5) sendto$inet(r2, &(0x7f00000001c0), 0x29c, 0x0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) iopl(0x7) ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f0000000300)=0x7ff) unlink(&(0x7f0000000100)='./file0\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x7, 0x20, 0x1}, {0xffffffffffffd11e, 0x7e3, 0x1ff, 0x4}]}) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f00000000c0)='\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000480)={r5, 0x77, "33fc4471498464ed6e8f4a31d9b7d3245e23aa09ed5126206c2285b9323b43ee91886b7014f1d2f46e75364ad4f8fb65cf3d00b20fbe9e17cec8ca02cd051b3296c2400acf47d571cb78b740a7444f7e822976be349767ba165b77737083f1c3874891aa3541bd025caf60d2e7b4f78c5af98cb302afb9"}, &(0x7f0000000500)=0x7f) 21:46:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x4000000000000000, 0x57ac, 0x0, 0x3, 0x10001, 0x3dca, 0x7, {0x0, @in={{0x2, 0x4e21, @local}}, 0xbe5, 0xfffffffffffffff9, 0x7, 0x8001, 0x7a14}}, &(0x7f0000000180)=0xb0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x3, 0x101000) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x110003, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@pcr={'pcr', 0x3d, 0x2}}, {@smackfsroot={'smackfsroot', 0x3d, 'userwlan0cpuset'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@obj_type={'obj_type', 0x3d, 'ipddp0\x00'}}]}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85512, &(0x7f0000001000)) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x4000000007, 0x0) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e22}}) 21:46:28 executing program 2: ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)=0xffff) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1205531, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x5}, 0x8) 21:46:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4c00, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0xf540) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1001010}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000010000000000257dee9d921b4b3bf1dba30168208b5a5b5465ec410eaf43ced9c0e25ae6dc3c6927eecc4310e683fd3b3935da38c2e8739af68b07a2a5a5f102c03c30f9e0c3941c1a248e740589d18cbddf871b9d77bf1f37ae1d85cf5bb6cc560a56f5992f5e0701d6349e5aa6d5f53e41869403c94b85e426fd001b58e19e93f62c8f1f12e1ab4461819ed13cf3d00934a4f30043d8df1bed87f4fb7d5f1203c5d487cf2dd681931d9ae4b2585"], 0x14}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) ioctl(r2, 0xc020660b, &(0x7f0000000000)) 21:46:28 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x80000000040000, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) getsockname(r3, &(0x7f00000004c0)=@nl=@unspec, &(0x7f0000000180)=0x80) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$TIOCGLCKTRMIOS(r5, 0x5456, &(0x7f0000000380)={0x2, 0x10001, 0x4, 0xffffffff, 0x0, 0x10001, 0xcf3, 0x0, 0x2, 0xffffffffffffffe1, 0x1, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000001c0)={{0x4, 0x1, 0x0, 0x6, 0x8, 0x3ff}, 0x40, 0x4, 0x7, 0x40, 0x6, "24488ae5a89e888efb78d6354463c71c88f9689c7dab1064fd4e8adb71bbf1a01efddaec3468786aa9bb1a7c2ecca548dcc92d234e5f4cd2297cb63154b9ee17d67470bf01a8dd9a5a586eb317ed329bf387d20b694d72a6141d1e5d9541a3794ab762c8d9e6d029025f85dcecb10795e3a8c6ab871caa790884a0a38887aa5b"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:46:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x4000000000000000, 0x57ac, 0x0, 0x3, 0x10001, 0x3dca, 0x7, {0x0, @in={{0x2, 0x4e21, @local}}, 0xbe5, 0xfffffffffffffff9, 0x7, 0x8001, 0x7a14}}, &(0x7f0000000180)=0xb0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x3, 0x101000) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x110003, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@pcr={'pcr', 0x3d, 0x2}}, {@smackfsroot={'smackfsroot', 0x3d, 'userwlan0cpuset'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@obj_type={'obj_type', 0x3d, 'ipddp0\x00'}}]}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85512, &(0x7f0000001000)) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x4000000007, 0x0) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e22}}) [ 228.021792] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 21:46:29 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 228.086397] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.094379] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.285738] print_req_error: I/O error, dev loop3, sector 0 [ 228.291896] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 228.299834] print_req_error: I/O error, dev loop3, sector 8 [ 228.305578] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 228.313625] print_req_error: I/O error, dev loop3, sector 16 [ 228.319631] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 228.327347] print_req_error: I/O error, dev loop3, sector 24 [ 228.333648] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 228.341551] print_req_error: I/O error, dev loop3, sector 32 [ 228.347403] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 228.355492] print_req_error: I/O error, dev loop3, sector 40 [ 228.361534] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 228.369576] print_req_error: I/O error, dev loop3, sector 48 [ 228.375431] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 228.383484] print_req_error: I/O error, dev loop3, sector 56 [ 228.389529] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 228.397243] print_req_error: I/O error, dev loop3, sector 64 [ 228.404547] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 228.412455] print_req_error: I/O error, dev loop3, sector 72 [ 228.418308] Buffer I/O error on dev loop3, logical block 9, lost async page write 21:46:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) 21:46:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x4000000000000000, 0x57ac, 0x0, 0x3, 0x10001, 0x3dca, 0x7, {0x0, @in={{0x2, 0x4e21, @local}}, 0xbe5, 0xfffffffffffffff9, 0x7, 0x8001, 0x7a14}}, &(0x7f0000000180)=0xb0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x3, 0x101000) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x110003, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@pcr={'pcr', 0x3d, 0x2}}, {@smackfsroot={'smackfsroot', 0x3d, 'userwlan0cpuset'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@obj_type={'obj_type', 0x3d, 'ipddp0\x00'}}]}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85512, &(0x7f0000001000)) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x4000000007, 0x0) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e22}}) 21:46:29 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20001, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xdc, r2, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x40}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x19c}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80200000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}]}, 0xdc}}, 0x40) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0xfffffffffffffffd, 0x40, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r0) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f00000002c0)={0x1, r0}) [ 228.922099] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.928494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.935200] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.941574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.948246] device bridge0 entered promiscuous mode [ 228.953905] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.961378] bridge0: port 2(bridge_slave_1) entered disabled state 21:46:29 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x400, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000100)) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0xfffffffffffffff9, 0x420000) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="040000000001000000000500f06758eef69ecdca1e7e9ff1845fe9eceb855d652613e8dae62e84ef45df4931c2a1dd996d16aec1e6129179724a978f3e3c5e7caad4dc6eb82177886ee9051e66a2c330d1daf302fd95b1c597e6a3"], &(0x7f00000000c0)=0xc) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000004c0)=""/177) openat$ashmem(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ashmem\x00', 0x610001, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040)=0xb52a, 0x4) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r1, 0x0, 0x2, &(0x7f0000000240)='/\x00', r4}, 0x30) msgctl$IPC_RMID(r2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @multicast2}, &(0x7f0000000680)=0xc) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000580)=ANY=[]) syz_init_net_socket$llc(0x1a, 0x0, 0x0) 21:46:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgid(0xffffffffffffffff) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x1, 0x3, 0x68, 0x4, 0x0, 0x5, 0x41, 0xd, 0x80, 0x8, 0x100000001, 0x1830, 0x9, 0x2, 0x9, 0x7, 0x4, 0xfff, 0x5, 0x5, 0x7abf, 0x2, 0x5, 0x0, 0x6, 0x10000, 0x3, 0x2, 0x6, 0x1cd, 0xe860, 0x4, 0x0, 0x4, 0x4, 0xff, 0x0, 0x80e4, 0x4, @perf_config_ext={0xffffffffffffffff, 0x61fb}, 0x4, 0x8cbd, 0x401, 0x3, 0x5, 0x7fff, 0x2bc0000000000}, r2, 0xc, r3, 0x3) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$input_event(r4, &(0x7f0000000100)={{0x0, 0x2710}, 0x2, 0x1, 0xfffffffffffffff7}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000002f0019010000000000000000030000ffff0000000800010004000000"], 0x20}}, 0x0) 21:46:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400000, 0x0) setns(r2, 0x20000) ioctl(r1, 0x0, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'syz_tun\x00'}) uselib(&(0x7f0000000140)='./file0\x00') 21:46:29 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 228.967798] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.004868] device bridge0 left promiscuous mode [ 229.033950] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 229.053691] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" [ 229.116924] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" 21:46:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f000043fff8)={0x19980330}, &(0x7f0000092000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f00000001c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff000000eeb7060000000000012d64050000000000650404000100000f0704000009000000b7050000000000004e0a00fe00000000850000001a000000b70000000000000095000000000000007a62b3246c85653cd543febd3feb3a"], &(0x7f0000000100)='GPL\x00'}, 0x48) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x5, &(0x7f0000001500)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="f02819366b727a24ca0c63c4799e0cf3e16b1b52841619f1707f234259862a2bfa7c603823cec8793357c252ba8fdf760cb24760ac8a0064ce89c67ee597c5decdec11ad901c2b0f7dd68f2b9bd879d605a897922798866a142a967b6d07b48702a3cd9dae2f75d2d1683ae84ead980992ef6efb987e877acf125a7b0d1a8eedf70d942131cce35c8fba4e0f4c3b27103da44467e4d984a0e370dafd98a95d48", 0xa0, 0x8229}, {&(0x7f0000000180)="b8df9c", 0x3, 0xc00000000}, {&(0x7f0000001300)="a20044377d32d20e5774ca4fbfa729fa7c27e90c7d72e7375cbff7dd31fa64c18330e672ab2d67c36fdca40fd26eb96867b1a672be61f118647ec8835a199f3ef441e4acf75201a4f8d6037fff8a1bcc0a718258f5f0ef391f32e42e172d193d390a616b9243b56ab8f1b71da20c0963e4b136d4714e00d682502e24a9ce670573eca5aee0e0cbcf6571197bc547d5afc746cf97908d6300042d45fe312dc73f0e1288fa13b63de2b47cb3786e0508e8bb53aaceaeed42602627cadc1284a88dff8d93814acb738e728e7b7f53d5490bae28e3682ba5d9b3950258e481d30cb1a5bfdd191e4dc0e3831ec522cdbf7063b2c3", 0xf2, 0x5}, {&(0x7f0000001400)="b81b24ed20d4eb69016448968b86fd1164046991366afbc3829854ec324378b28ed1eb85cc01121fbfb2f745930367e19225fe4e7616da679cedff4eb0a8f45a17f807677280098369e0b439d2ef527d9415fb28dd90d757c9d74f987aa6840e8fb18f65056a9b2686123813b3d7b24130adb709fefb266ba1bdecd300c710c523e8d64b0c32f2b1d9c31d114b3ddfc103adf6f2114152c16b30ef09235ff78dc465fd3b409779fa45cd38cb8edd03f12d477c69a4a7eb091b764c73b2c331c31f9805fd841ff9583a76ed2834186d5ba38702ffe14c21c0564fe53cdaaaea9b24d6db2bded6aed937ef624dc36bb781821405", 0xf3, 0x9}], 0x10000, 0x0) [ 229.188775] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.195316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.201988] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.208355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.227154] device bridge0 entered promiscuous mode [ 229.232907] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:46:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000007880)=[{{&(0x7f00000006c0)=@vsock, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000a00)=""/94, 0x5e}], 0x1, &(0x7f0000001c00)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0xffffffffffffff7f, 0x3, {0x3, 0x3, 0x7ff, 0x3, 0x6}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={r0, r2}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x40, &(0x7f00000065c0)={0x0, r4+30000000}) 21:46:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000003c0)="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", 0xffffffffffffffdf) close(0xffffffffffffffff) [ 229.259387] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) [ 229.327939] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:46:30 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000740)="2400000009061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e1df4552ae4", 0x29}], 0x1}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x6980) socket$inet_udplite(0x2, 0x2, 0x88) 21:46:30 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x80000) recvmmsg(0xffffffffffffff9c, &(0x7f0000006000)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/239, 0xef}, {&(0x7f0000000180)=""/120, 0x78}], 0x2, 0x0, 0x0, 0x80}, 0x4}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/236, 0xec}, {&(0x7f0000001480)=""/216, 0xd8}, {&(0x7f0000001580)=""/234, 0xea}], 0x4, &(0x7f0000001680)=""/157, 0x9d, 0x1efe}, 0x67e4}, {{&(0x7f0000001740)=@rc, 0x80, &(0x7f0000002a80)=[{&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)}, {&(0x7f0000002800)=""/207, 0xcf}, {&(0x7f0000002900)=""/20, 0x14}, {&(0x7f0000002940)=""/80, 0x50}, {&(0x7f00000029c0)=""/6, 0x6}, {&(0x7f0000002a00)=""/78, 0x4e}], 0x7, 0x0, 0x0, 0x3}, 0xfffffffffffffffa}, {{&(0x7f0000002b00)=@l2, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002b80)=""/130, 0x82}, {&(0x7f0000002c40)=""/214, 0xd6}, {&(0x7f0000002d40)=""/112, 0x70}, {&(0x7f0000002dc0)=""/116, 0x74}, {&(0x7f0000002e40)=""/66, 0x42}], 0x5, &(0x7f0000002f40)=""/140, 0x8c, 0xc4}, 0x2}, {{&(0x7f0000003000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000004240)=[{&(0x7f0000003080)=""/140, 0x8c}, {&(0x7f0000003140)=""/4096, 0x1000}, {&(0x7f0000004140)=""/173, 0xad}, {&(0x7f0000004200)=""/33, 0x21}], 0x4, &(0x7f0000004280)=""/71, 0x47, 0x6}, 0x400}, {{&(0x7f0000004300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000004380), 0x0, 0x0, 0x0, 0x1}, 0x9}, {{&(0x7f00000043c0)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000004540)=[{&(0x7f0000004440)=""/79, 0x4f}, {&(0x7f00000044c0)=""/76, 0x4c}], 0x2, &(0x7f0000004580)=""/187, 0xbb, 0x1}, 0x40}, {{&(0x7f0000004640)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004780)=[{&(0x7f00000046c0)=""/190, 0xbe}], 0x1, &(0x7f00000047c0)=""/227, 0xe3, 0x100}, 0x804a}, {{&(0x7f00000048c0)=@generic, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000004940)=""/220, 0xdc}, {&(0x7f0000004a40)=""/208, 0xd0}, {&(0x7f0000004b40)=""/176, 0xb0}, {&(0x7f0000004c00)=""/4096, 0x1000}, {&(0x7f0000005c00)=""/156, 0x9c}, {&(0x7f0000005cc0)=""/211, 0xd3}, {&(0x7f0000005dc0)=""/216, 0xd8}], 0x7, &(0x7f0000005f40)=""/135, 0x87, 0x5}, 0x10000}], 0x9, 0x40, &(0x7f0000006240)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006280)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000006380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000063c0)={{{@in6=@local, @in6, 0x4e22, 0x3, 0x4e22, 0x7f, 0xa, 0x80, 0x20, 0x3a, r2, r3}, {0x1, 0xed1, 0x664d, 0x4, 0x5, 0x6c7, 0x20, 0x6}, {0x3, 0x20000000, 0x7, 0x80}, 0x7ff, 0x6e6bbe, 0x1, 0x1, 0x2}, {{@in6, 0x4d2, 0x7f}, 0x2, @in=@rand_addr=0x5, 0x3506, 0x1, 0x1, 0x2, 0x9, 0x3, 0x8000}}, 0xe8) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f00000064c0)=ANY=[@ANYBLOB="046304400000000009631040", @ANYRES64=0x0, @ANYBLOB="0000000000000000842a631ea6a9f475f734da67c8c222c471a53521c5a1370daf19914fdc691699e05d838a94a572462b213665e3aca159f1643a0291c39426d36420fa4c5dc52e75153a918f6ee68600662b7840025b0a50d1aa89af94ad5982108d7390bdf39b5b48ab4b8cb4b493f04b53111bc90b7fbc54a0c3e602ab09ffd81f12af89d4779d065cbef4bfd1e57a2bf2477889fecac86804447c74a8bf96326346981211ef3ccbd0bca1bad1d8a9922eac6692c4"], 0x0, 0x0, &(0x7f0000000280)}) [ 229.389333] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=3c3c3e36) [ 229.444419] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 229.452868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 229.464101] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 229.485794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 21:46:30 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f00000002c0)=0xc) r2 = dup(0xffffffffffffff9c) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000240)) r3 = socket$alg(0x26, 0x5, 0x0) clone(0x4001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r4 = getpid() bind$alg(r3, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic-generic\x00'}, 0x58) setpriority(0x0, r1, 0x0) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) setsockopt$ALG_SET_KEY(r3, 0x117, 0x5, &(0x7f0000000080), 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000280)={@empty, r0}, 0x14) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x2, 0xffffffffffffff9c}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee1, &(0x7f00000001c0)={0x0, 0x80000001, 0x0, &(0x7f0000000080)=0x3}) 21:46:30 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:30 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000003c0)=0x2, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f00000000c0)=0x44) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000540)={&(0x7f0000000400)}) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) getpeername$netlink(r1, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000380)={0x0, 0x5, 0x3, 0x0, 0x80}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x4000001) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000005c0)={0x0, 0x40, 0x6, 0x0, 0xfffffffffffff49c}) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000600)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[{0x2, 0x7}], 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) [ 229.559699] binder: 8328:8329 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 229.581170] binder: 8328:8329 BC_ACQUIRE_DONE u0000000000000000 no match [ 229.610516] binder: 8328:8331 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 229.633782] binder: 8328:8331 BC_ACQUIRE_DONE u0000000000000000 no match 21:46:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"0000000000000000000000000200"}) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000300)={0x0, 0x23, "0571f7ff4ec2284683886f711b9798a37982636a15efc6ac289012bf032db881288016"}, &(0x7f0000000540)=0x2b) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000580)={r2, 0xf74}, 0x8) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) io_setup(0x6, &(0x7f0000000340)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000dc9ff0)={0x2, 0x4e20, @rand_addr}, 0xffffffffffffff2b) setsockopt$inet_tcp_int(r4, 0x6, 0x2, &(0x7f00000000c0)=0x3, 0x4) lookup_dcookie(0x8000, &(0x7f0000000480)=""/72, 0x48) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000005c0)={0x0, 0x80000001, 0xa148, 0x480, 0x4, 0x3, 0x6}, 0xc) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x4}, 0x8) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f00000001c0)=0x1, 0x4) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0xfe45) sendmsg$alg(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)="a08e7a60014506868498fb858a9fa0a79529e02f5065eeb5c8f56693dbbec5051e025dc2c46af5bf0847a220e53939fe16424973387859c3bcc506310c6cdf09f53321366cd4de10676bf7c42301f5158d5ff62a787fa00ba9e3d36eb6579d220b1d739721173e8ca3fd70db75ae368779cb3798280b3321e2291c23e3c079fd529565ec3d4b76b02b4a42268172ca10b76cfb573b277083de6c90c0ba4db8855fbc54c55eb3f8d5c23ccb6e1a44e7f4cc9d9e004d2984c04ba50e95ab4987bd03989c6a70b459918a12934fca6d3d6ccfdcd91577ba03ee7910aae4cec340", 0xdf}], 0x1, &(0x7f0000000800), 0x0, 0x80}, 0x40000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000880)="7a0fdb2c3ac6e2f099b457434687b406e47d324188afb2011ba48f8ab5d38904b1bcc422821c292630003f068f1b7173d58e3c579b5798ba87c88b25e4d2e40370310cdc04f2190236c3315df8c634263a3b808a236076d304e72c7c9069ec87cce7e50b6790c10c748e314457d609ae35d6c6aad81914f3d4fcdb583dd25bdc388a8541d76dcdce40eb72ce12bee1949d44013d7e39c9f03a0467023b45f3d04fe91414fcc775b8f71a8d98d2207562a695e1a0ec6ddda974fd9a04222c51ae2931f427620e94be3e4946ca211696b27216c7d5", 0xd4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mq_getsetattr(r4, &(0x7f0000000040)={0x6, 0xf82, 0x0, 0x2, 0x1, 0x9ed, 0x5, 0x80}, &(0x7f0000000180)) ioctl$TUNSETLINK(r0, 0x400454cd, 0xffff) shutdown(r4, 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xa61, 0x6, [0x5, 0x7ff, 0xfff, 0x2, 0x5, 0x1]}, &(0x7f0000000380)=0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e20}}}, 0x84) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r4, &(0x7f000099bf26), 0x143, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000600)={r5, 0x4, 0x8, 0x5}, 0x10) 21:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) write$P9_RWRITE(r1, &(0x7f00000001c0)={0xb, 0x77, 0x1, 0x5}, 0xb) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x0, 0x207, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000001780)={&(0x7f0000000040), 0xc, &(0x7f0000001740)={&(0x7f00000000c0)={0x14, 0x3, 0x7, 0x21}, 0x14}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000140)) [ 229.869143] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:46:30 executing program 0: syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYBLOB="2c636173655f73656e7369746976653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030302c73686f777c7379735f66696c65733d7965732c756d61736b3d3030303030303030303030e1f66b873030303030302c6e6c733d63703835322c000000"]) [ 229.988942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.015467] ntfs: (device loop0): parse_options(): Unrecognized mount option fmaswLãÐMÄÚ&00000000000000000. 21:46:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000007880)=[{{&(0x7f00000006c0)=@vsock, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000a00)=""/94, 0x5e}], 0x1, &(0x7f0000001c00)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0xffffffffffffff7f, 0x3, {0x3, 0x3, 0x7ff, 0x3, 0x6}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={r0, r2}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x40, &(0x7f00000065c0)={0x0, r4+30000000}) 21:46:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xfffffffffffffffe, 0x52, r0, 0x0) alarm(0x3ff) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000140)) [ 230.048988] ntfs: (device loop0): parse_options(): Invalid umask option argument: ©¥000000000000000000000 21:46:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000007880)=[{{&(0x7f00000006c0)=@vsock, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000a00)=""/94, 0x5e}], 0x1, &(0x7f0000001c00)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0xffffffffffffff7f, 0x3, {0x3, 0x3, 0x7ff, 0x3, 0x6}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={r0, r2}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x40, &(0x7f00000065c0)={0x0, r4+30000000}) 21:46:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x70e000) 21:46:31 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xf, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xf53, 0x3, [0x6c, 0x48be, 0x59b]}, &(0x7f0000000080)=0xe) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x28, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x1}, &(0x7f0000000140)=0x8) fcntl$dupfd(r0, 0x406, r1) 21:46:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x608000) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000180)={0x0, 0x6}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000380)) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1e) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)=ANY=[@ANYBLOB="4ae72320fc150fbb12dad521af6c06bc2b822f5863f996fe291333ebf20342318d6c175ae107313ec0f5d15b4febc0a1d915fe001e85511ea4d73d11122fd40a3b310729264c020ef2d715603dad354b357ae6f8623690d608572d5ff9f8e020fa7de5107cef0dc039a55360e9e25bff01a50b1804897124"], &(0x7f0000000340)=0x1) dup3(r0, r4, 0x80000) 21:46:31 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"00ac720000000000ec973f820f7c4000", 0x103}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) close(r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@loopback, @in6=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:46:31 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x5) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) 21:46:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000007880)=[{{&(0x7f00000006c0)=@vsock, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000a00)=""/94, 0x5e}], 0x1, &(0x7f0000001c00)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0xffffffffffffff7f, 0x3, {0x3, 0x3, 0x7ff, 0x3, 0x6}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={r0, r2}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x40, &(0x7f00000065c0)={0x0, r4+30000000}) 21:46:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000580)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 230.985360] netlink: 'syz-executor5': attribute type 12 has an invalid length. 21:46:32 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:32 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 231.077582] netlink: 'syz-executor5': attribute type 12 has an invalid length. 21:46:32 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x3, 0x100000001) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r1, &(0x7f0000000080), 0x7299, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 21:46:32 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000680)="2a656375726974792e6361706162696c697479ff", &(0x7f0000000240)=@v2, 0x10, 0x0) 21:46:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x3, 0x81, 0x0, 0x70, 0x100000001, 0xff, 0x400, 0x0, 0x3f, 0x0, 0x4, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r2 = dup(r1) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe}, 0x1c) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x43}, 0x90) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000000)=0x4) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 21:46:32 executing program 5: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) [ 231.292320] __ntfs_error: 2 callbacks suppressed [ 231.292329] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:32 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 231.385743] overlayfs: './file0' not a directory [ 231.395260] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:32 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xfffffffffffffdd9, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 21:46:32 executing program 4: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) 21:46:32 executing program 2: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) unlink(&(0x7f0000000000)='./bus\x00') 21:46:32 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:32 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:32 executing program 1: unshare(0x20000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000500)}, 0x0) 21:46:32 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x800000000001, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[]], 0x8) sendto$inet(r0, &(0x7f0000000580)="89", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) close(r0) 21:46:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x22) fcntl$setstatus(r1, 0x4, 0x42c00) listen(r1, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffdb4, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) accept4(r1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) [ 231.936089] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:46:33 executing program 5: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) 21:46:33 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000100)=@in={0x2, 0x4e20}, 0x80) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000200)=0x80000001, 0x4) sendto$inet(r0, &(0x7f0000000200), 0x110, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 21:46:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000013c0)=0x401, 0x4) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0), 0x0, &(0x7f00000010c0)=""/164, 0xa4}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 232.253540] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:46:33 executing program 4: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) 21:46:33 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 21:46:33 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={"626f6e6430000000000600000100", @ifru_settings={0x1, 0x8, @fr_pvc=&(0x7f0000000040)}}) 21:46:33 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) accept$alg(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={"626f6e6430000000000600000100", @ifru_settings={0x1, 0x8, @fr_pvc=&(0x7f0000000040)}}) 21:46:33 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) accept$alg(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:33 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) accept$alg(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) 21:46:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={"626f6e6430000000000600000100", @ifru_settings={0x1, 0x8, @fr_pvc=&(0x7f0000000040)}}) 21:46:34 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 21:46:34 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 233.401545] print_req_error: 621 callbacks suppressed [ 233.401562] print_req_error: I/O error, dev loop3, sector 0 [ 233.412840] buffer_io_error: 620 callbacks suppressed [ 233.412870] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 233.426059] print_req_error: I/O error, dev loop3, sector 8 [ 233.431865] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 233.439878] print_req_error: I/O error, dev loop3, sector 16 [ 233.445824] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 233.453893] print_req_error: I/O error, dev loop3, sector 24 [ 233.459877] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 233.469187] print_req_error: I/O error, dev loop3, sector 32 [ 233.475095] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 233.483015] print_req_error: I/O error, dev loop3, sector 40 [ 233.488957] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 233.496895] print_req_error: I/O error, dev loop3, sector 48 [ 233.502877] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 233.510984] print_req_error: I/O error, dev loop3, sector 56 [ 233.516876] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 233.524860] print_req_error: I/O error, dev loop3, sector 64 [ 233.530848] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 233.539758] print_req_error: I/O error, dev loop3, sector 72 21:46:34 executing program 4: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) 21:46:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xae03000000000000, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 21:46:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) 21:46:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 21:46:34 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x400c000, &(0x7f000083b000)={0x2, 0x4e20}, 0x10) connect(r0, &(0x7f0000000100)=@nl=@unspec, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') sendfile(r0, r2, &(0x7f0000000000), 0x7ffff000) [ 233.545779] Buffer I/O error on dev loop3, logical block 9, lost async page write 21:46:34 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:34 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x0, 0x0, &(0x7f0000002000)}) 21:46:34 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10, &(0x7f0000000080)=""/40, &(0x7f0000001000)=0x28) [ 233.722041] binder: 8635:8637 unknown command 0 [ 233.764439] binder: 8635:8637 ioctl c0306201 20007000 returned -22 21:46:34 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="baa00066b86ecd000066ef0f20e06635004000000f22e00f4bf0660f38df1e000066b95d02000066b86f00000066ba000000000f300f01d766b9800000c00f326635010000000f30660fdc066cb5baf80c66b8101d4d8366efbafc0c66b86e2a1acb66efbaf80c66b8acc2318566efbafc0c66ed"}], 0x0, 0xffffffffffffffff, &(0x7f0000000300), 0x1000000000000017) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:46:35 executing program 4: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) 21:46:35 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000680)="73656375726974792e6361706162696c697479ff", &(0x7f0000000240)=@v2, 0x10, 0x0) 21:46:35 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 21:46:35 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[]}}, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 21:46:35 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:35 executing program 2: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000001c0)=ANY=[]) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000240)) 21:46:35 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:35 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 234.473830] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 21:46:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1885, 0x2, 0x0, 0x0, 0x0, 0xfa5, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x26c, 0x7}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8, 0x0, 0x3f000000}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) creat(&(0x7f0000000240)='./file0\x00', 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 234.566549] overlayfs: filesystem on './file0' not supported as upperdir 21:46:35 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0x1e, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="0180c2000001aaaaaaaaaa1b0009689b2c788031ce85fda626e6bf0e434bcd75abb9f5377e183c7d177e178db77bc5fcf4c691ee6d8507166583f4c7a7c02a880e1f2e786a5363a8f1c643f4af838a182f40e591d7504a6ada1c3ccdc015a649bfc5ef00000000000000895fd491e999f130366b5b561022b30ccf8989996ac00db84d20b0f651509299085de29cb2abb5f93a9543"], &(0x7f0000000080)={0x0, 0x2, [0x461]}) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001a00)={0x0}, &(0x7f0000001a40)=0xc) fcntl$setown(r0, 0x8, r3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @loopback, @multicast1}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r7 = syz_open_procfs(0x0, &(0x7f00000000c0)="702d893304f51e322c7000") ftruncate(r7, 0x7) sendfile(0xffffffffffffffff, r6, &(0x7f0000000040), 0x0) read(r7, &(0x7f0000000100)=""/252, 0xfc) dup2(0xffffffffffffffff, r5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r8, @in={{0x2, 0x4e23, @multicast2}}, 0x7fff}, &(0x7f0000000540)=0x90) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@multicast2, @loopback, @dev}, 0xc) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x18, r9, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000700)) 21:46:35 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:36 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:46:36 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:36 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0x1e, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="0180c2000001aaaaaaaaaa1b0009689b2c788031ce85fda626e6bf0e434bcd75abb9f5377e183c7d177e178db77bc5fcf4c691ee6d8507166583f4c7a7c02a880e1f2e786a5363a8f1c643f4af838a182f40e591d7504a6ada1c3ccdc015a649bfc5ef00000000000000895fd491e999f130366b5b561022b30ccf8989996ac00db84d20b0f651509299085de29cb2abb5f93a9543"], &(0x7f0000000080)={0x0, 0x2, [0x461]}) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001a00)={0x0}, &(0x7f0000001a40)=0xc) fcntl$setown(r0, 0x8, r3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @loopback, @multicast1}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r7 = syz_open_procfs(0x0, &(0x7f00000000c0)="702d893304f51e322c7000") ftruncate(r7, 0x7) sendfile(0xffffffffffffffff, r6, &(0x7f0000000040), 0x0) read(r7, &(0x7f0000000100)=""/252, 0xfc) dup2(0xffffffffffffffff, r5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r8, @in={{0x2, 0x4e23, @multicast2}}, 0x7fff}, &(0x7f0000000540)=0x90) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@multicast2, @loopback, @dev}, 0xc) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x18, r9, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000700)) 21:46:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0x1e, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="0180c2000001aaaaaaaaaa1b0009689b2c788031ce85fda626e6bf0e434bcd75abb9f5377e183c7d177e178db77bc5fcf4c691ee6d8507166583f4c7a7c02a880e1f2e786a5363a8f1c643f4af838a182f40e591d7504a6ada1c3ccdc015a649bfc5ef00000000000000895fd491e999f130366b5b561022b30ccf8989996ac00db84d20b0f651509299085de29cb2abb5f93a9543"], &(0x7f0000000080)={0x0, 0x2, [0x461]}) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001a00)={0x0}, &(0x7f0000001a40)=0xc) fcntl$setown(r0, 0x8, r3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @loopback, @multicast1}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r7 = syz_open_procfs(0x0, &(0x7f00000000c0)="702d893304f51e322c7000") ftruncate(r7, 0x7) sendfile(0xffffffffffffffff, r6, &(0x7f0000000040), 0x0) read(r7, &(0x7f0000000100)=""/252, 0xfc) dup2(0xffffffffffffffff, r5) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r8, @in={{0x2, 0x4e23, @multicast2}}, 0x7fff}, &(0x7f0000000540)=0x90) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@multicast2, @loopback, @dev}, 0xc) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x18, r9, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000700)) 21:46:36 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 235.357910] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:46:36 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)=@known='trusted.overlay.impure\x00') 21:46:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000140)="c8a8707470", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, &(0x7f00000024c0), 0xffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) 21:46:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/tcp6\x00') dup3(r0, r1, 0x0) 21:46:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x3300000000000000, &(0x7f00000009c0), 0xa2, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 21:46:36 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000005c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x3, &(0x7f0000000080)) sync() 21:46:36 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:36 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendto(r2, &(0x7f0000000200), 0x0, 0xfffffffffffffffc, &(0x7f0000000000)=@nl=@proc, 0x80) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, &(0x7f00000000c0)=""/50, 0x32}, 0x0) sendto(r2, &(0x7f0000001640)="13", 0x1, 0x0, &(0x7f0000002a80)=@nl=@unspec, 0x80) 21:46:36 executing program 2: r0 = socket$inet6(0xa, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) flistxattr(r1, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) r2 = getpid() capset(&(0x7f00000004c0)={0x200f1526, r2}, &(0x7f0000000500)={0x0, 0x200, 0xffffffff, 0xd20, 0x1f, 0x4}) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x15555602, 0x9) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000640)=0x9013, 0x4) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f00000005c0)=0x7, 0x4) unshare(0x40000000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x800000, 0x0) setsockopt$inet6_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000300)="6ef4efb57ffb37ae0a4f117409e8783d58bdbe8a88547dfbabeca76c90054eb201f80e55bfc832f31a4fede1e68b4d8a6f4b8d67335680ec7da64c31ba194fcd8572f66c1de6a7e4a70643c5859d967a5f8316f8fdbf59760824dd98", 0x5c) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000580)={0x0, 0x8}, 0x2) r4 = openat$cgroup_ro(r1, &(0x7f0000000280)="63700000000061749b", 0x0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)='E', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x8dffffff]}, 0x9}, 0x1c) ioctl$NBD_SET_SOCK(r4, 0xab00, r1) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000600)={0xfffffffffffffef8, 0x5, 0x0, {0x0, 0x4, 0x0, 0x6}}, 0x30) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0088de50fe4b8000afa3adfba4c0299ac961eba5cb321ba636c0ff842c5000000000000000000000"], &(0x7f0000000a40)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000a80)={0x0, 0x800}, &(0x7f0000000ac0)=0x8) sendto$inet(r1, &(0x7f00000004c0), 0x0, 0x8000, &(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10) r5 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0x346) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) recvmsg(r5, &(0x7f0000000240)={&(0x7f00000000c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/200, 0xc8}], 0x1, 0x0, 0x0, 0x2}, 0x2000) 21:46:36 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000280), &(0x7f0000000340)={0x8}, &(0x7f00000003c0), &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) 21:46:36 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 235.954810] IPVS: ftp: loaded support on port[0] = 21 21:46:37 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000008080)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="100000dbec755e316b145903"], 0xc}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 21:46:37 executing program 5: rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2c) accept4$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000002c0)=0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000700)=0xa, 0x4) 21:46:37 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 236.487604] IPVS: ftp: loaded support on port[0] = 21 21:46:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x2, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x1, @ipv4=@multicast1}]}, 0x1c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 21:46:37 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:37 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:37 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 236.614615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 236.651806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 21:46:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000000), 0x123) 21:46:37 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000400)={{}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 21:46:37 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1a, 0x4) 21:46:37 executing program 2: request_key(&(0x7f0000000340)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000300)="bc", 0x0) 21:46:37 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x4) 21:46:38 executing program 5: eventfd2(0x0, 0x2) 21:46:38 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = dup(r0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5]}, 0x45c) 21:46:38 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:38 executing program 1: clone(0x802100001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @local}, {0x2, 0x4e21, @multicast2}, {}, 0x40, 0x1, 0x0, 0x95a, 0x3, &(0x7f0000000140)='bridge0\x00', 0x0, 0x0, 0x47}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000080)=0xc) 21:46:38 executing program 1: socket$inet6(0xa, 0x806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x2003}) 21:46:38 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 237.210578] input: syz1 as /devices/virtual/input/input9 21:46:38 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x1) creat(&(0x7f0000000280)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) execve(&(0x7f0000000140)='./bus\x00', &(0x7f0000000340)=[&(0x7f0000000300)='\x00'], &(0x7f0000000540)=[&(0x7f00000003c0)='/dev/input/event#\x00', &(0x7f0000000400)='eth0cpusetppp1\x00', &(0x7f0000000440)="40707070312e2165746830237b657468319c00", &(0x7f0000000480)='-[ppp1nodev$\\\x00', &(0x7f00000004c0)='syz1', &(0x7f0000000500)="0576626f786e65743000"]) 21:46:38 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 237.294969] input: syz1 as /devices/virtual/input/input10 21:46:38 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffbfffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=""/45, 0x21}) writev(r1, &(0x7f0000000080), 0x1a6) 21:46:38 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480), 0x83, &(0x7f0000000440)={&(0x7f0000000380)={0x14, 0x22, 0x1, 0x0, 0x0, {0x5801}}, 0x14}}, 0x0) [ 237.518992] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 237.819715] audit: type=1804 audit(1538603198.777:48): pid=8872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/39/file0" dev="sda1" ino=16526 res=1 [ 237.862177] audit: type=1804 audit(1538603198.777:49): pid=8873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/39/file0" dev="sda1" ino=16526 res=1 21:46:38 executing program 4: 21:46:38 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:38 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 21:46:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84000000000000b) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r2, &(0x7f00000000c0)='D', 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000900)={0x0, 0x0, 0x20}, 0xc) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="73798831"], 0x4) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0xfdd5) r3 = accept4(r1, 0x0, &(0x7f0000000080), 0x0) shutdown(r3, 0x1) 21:46:38 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 237.989906] audit: type=1804 audit(1538603198.947:50): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/39/file0" dev="sda1" ino=16526 res=1 21:46:39 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:39 executing program 2: 21:46:39 executing program 4: 21:46:40 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000140)=[@increfs], 0x0, 0x0, &(0x7f0000000040)}) 21:46:40 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 21:46:40 executing program 5: 21:46:40 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 239.539744] binder: 8965:8974 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 239.549988] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:40 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:40 executing program 4: 21:46:40 executing program 5: 21:46:40 executing program 1: 21:46:40 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 239.649836] overlayfs: './file0' not a directory [ 239.656918] ntfs: (device loop2): parse_options(): Unrecognized mount option ./file0. 21:46:40 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:40 executing program 5: 21:46:40 executing program 4: 21:46:40 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:40 executing program 1: 21:46:40 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f228", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:40 executing program 5: 21:46:40 executing program 4: 21:46:40 executing program 1: 21:46:40 executing program 5: [ 239.937068] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:40 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f228", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:41 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:41 executing program 4: 21:46:41 executing program 1: 21:46:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:41 executing program 5: 21:46:41 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f228", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:41 executing program 1: 21:46:41 executing program 4: 21:46:41 executing program 5: 21:46:41 executing program 4: 21:46:41 executing program 1: 21:46:41 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:41 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:41 executing program 5: 21:46:41 executing program 4: [ 240.388041] overlayfs: failed to resolve './file1': -2 [ 240.404425] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:41 executing program 1: 21:46:41 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:41 executing program 4: 21:46:41 executing program 5: 21:46:41 executing program 4: 21:46:41 executing program 1: 21:46:41 executing program 5: [ 240.662152] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:41 executing program 5: [ 240.720197] print_req_error: 378 callbacks suppressed [ 240.720205] print_req_error: I/O error, dev loop3, sector 0 [ 240.731372] buffer_io_error: 378 callbacks suppressed [ 240.731380] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 240.744751] print_req_error: I/O error, dev loop3, sector 8 [ 240.750506] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 240.758157] print_req_error: I/O error, dev loop3, sector 16 [ 240.764118] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 240.771840] print_req_error: I/O error, dev loop3, sector 24 [ 240.777646] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 240.785418] print_req_error: I/O error, dev loop3, sector 32 [ 240.791307] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 240.800041] print_req_error: I/O error, dev loop3, sector 40 [ 240.805862] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 240.813687] print_req_error: I/O error, dev loop3, sector 48 [ 240.819554] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 240.819592] print_req_error: I/O error, dev loop3, sector 56 [ 240.833068] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 240.840788] print_req_error: I/O error, dev loop3, sector 64 [ 240.846600] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 240.854308] print_req_error: I/O error, dev loop3, sector 72 [ 240.860538] Buffer I/O error on dev loop3, logical block 9, lost async page write 21:46:41 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:41 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:41 executing program 1: 21:46:41 executing program 4: 21:46:41 executing program 5: 21:46:42 executing program 5: 21:46:42 executing program 4: 21:46:42 executing program 1: 21:46:42 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 241.021210] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:42 executing program 5: 21:46:42 executing program 4: 21:46:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:42 executing program 1: 21:46:42 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:42 executing program 5: 21:46:42 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:42 executing program 4: 21:46:42 executing program 4: 21:46:42 executing program 1: 21:46:42 executing program 5: 21:46:42 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005480), 0x492492492492615, 0x8000) r1 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 241.540097] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:42 executing program 4: 21:46:42 executing program 5: 21:46:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:42 executing program 1: 21:46:42 executing program 5: 21:46:42 executing program 1: 21:46:42 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:42 executing program 4: 21:46:42 executing program 5: 21:46:42 executing program 1: 21:46:42 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:42 executing program 4: 21:46:42 executing program 1: 21:46:42 executing program 5: [ 241.953102] overlayfs: failed to resolve './file1': -2 21:46:43 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:43 executing program 5: 21:46:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:43 executing program 1: 21:46:43 executing program 4: 21:46:43 executing program 4: 21:46:43 executing program 1: 21:46:43 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0xfdbf}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) shutdown(r1, 0x0) 21:46:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:43 executing program 5: 21:46:43 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:43 executing program 4: 21:46:43 executing program 4: 21:46:43 executing program 5: [ 242.375313] overlayfs: missing 'lowerdir' 21:46:43 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x0, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:43 executing program 5: 21:46:43 executing program 4: [ 242.579303] overlayfs: missing 'lowerdir' 21:46:43 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:43 executing program 4: 21:46:43 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x0, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:43 executing program 5: 21:46:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) [ 242.740861] overlayfs: unrecognized mount option "lowerdir" or missing value 21:46:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 21:46:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x918, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 21:46:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)}, 0x0) 21:46:44 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x0, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:44 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f00000003c0)=""/96, 0x60}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6) openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') r3 = syz_open_dev$audion(&(0x7f0000001540)='/dev/audio#\x00', 0x2, 0x10000) r4 = socket$kcm(0x29, 0x5, 0x0) sendfile(r4, r2, 0x0, 0x7ffff000) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/70, 0x46}, {&(0x7f00000000c0)}, {&(0x7f0000000340)=""/91, 0x5b}], 0x3) ioctl$sock_proto_private(0xffffffffffffffff, 0x89ee, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000001580)=0x0) r6 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xfff, 0x40, 0x6, 0x2, 0x0, 0x2, 0x800, 0xa, 0x7, 0x1, 0x6, 0x80000001, 0x3f, 0x0, 0x9, 0xffffffff, 0x9, 0x2, 0xb97, 0x7a, 0x6, 0x7, 0x6a87, 0xb4, 0x9, 0x4, 0x2, 0x7fffffff, 0x20, 0x2, 0xff, 0x0, 0x6, 0x4, 0x4, 0x5, 0x0, 0x6, 0x5, @perf_config_ext={0x5, 0xfffffffffffff506}, 0x1830, 0x836, 0xff, 0x3, 0x7, 0x2, 0x6119}, r6, 0x8, 0xffffffffffffff9c, 0x0) recvmsg$kcm(r2, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f00000015c0)=""/141, 0x8d}, 0x140) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000016c0)=r5) [ 243.184893] __ntfs_error: 5 callbacks suppressed [ 243.184902] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 243.207419] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:46:44 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 243.236546] overlayfs: unrecognized mount option "wor" or missing value 21:46:44 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:44 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:44 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f00000003c0)=""/96, 0x60}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6) openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00005aeff6)='net/kcm\x00\b\x00') r3 = syz_open_dev$audion(&(0x7f0000001540)='/dev/audio#\x00', 0x2, 0x10000) r4 = socket$kcm(0x29, 0x5, 0x0) sendfile(r4, r2, 0x0, 0x7ffff000) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/70, 0x46}, {&(0x7f00000000c0)}, {&(0x7f0000000340)=""/91, 0x5b}], 0x3) ioctl$sock_proto_private(0xffffffffffffffff, 0x89ee, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000001580)=0x0) r6 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xfff, 0x40, 0x6, 0x2, 0x0, 0x2, 0x800, 0xa, 0x7, 0x1, 0x6, 0x80000001, 0x3f, 0x0, 0x9, 0xffffffff, 0x9, 0x2, 0xb97, 0x7a, 0x6, 0x7, 0x6a87, 0xb4, 0x9, 0x4, 0x2, 0x7fffffff, 0x20, 0x2, 0xff, 0x0, 0x6, 0x4, 0x4, 0x5, 0x0, 0x6, 0x5, @perf_config_ext={0x5, 0xfffffffffffff506}, 0x1830, 0x836, 0xff, 0x3, 0x7, 0x2, 0x6119}, r6, 0x8, 0xffffffffffffff9c, 0x0) recvmsg$kcm(r2, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f00000015c0)=""/141, 0x8d}, 0x140) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000016c0)=r5) [ 243.430287] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 243.443231] overlayfs: workdir and upperdir must be separate subtrees 21:46:44 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:44 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:44 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:44 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:44 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 243.996192] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 244.042998] overlayfs: failed to resolve './fi': -2 21:46:45 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:45 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 21:46:45 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:45 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:45 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 244.334445] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:45 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 244.381959] overlayfs: failed to resolve './file': -2 21:46:45 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 21:46:45 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 21:46:45 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:45 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 21:46:45 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 244.669736] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:45 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 21:46:45 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 244.847595] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 244.883409] overlayfs: failed to resolve './file': -2 21:46:45 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:45 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 244.987060] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 21:46:46 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:46 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 245.089526] overlayfs: failed to resolve './file1': -2 21:46:46 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 21:46:46 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:46 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 21:46:46 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:46 executing program 2: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) 21:46:46 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:46 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:46 executing program 4: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) socket$inet6(0xa, 0x80003, 0x7) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x608000) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000180)={0x0, 0x6}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000380)) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1e) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)=ANY=[@ANYBLOB="4ae72320fc150fbb12dad521af6c06bc2b822f5863f996fe291333ebf20342318d6c175ae107313ec0f5d15b4febc0a1d915fe001e85511ea4d73d11122fd40a3b310729264c020ef2d715603dad354b357ae6f8623690d608572d5ff9f8e020fa7de5107cef0dc039a55360e9e25bff01a50b1804897124"], &(0x7f0000000340)=0x1) dup3(r0, r4, 0x80000) 21:46:46 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x608000) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000180)={0x0, 0x6}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000380)) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1e) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)=ANY=[@ANYBLOB="4ae72320fc150fbb12dad521af6c06bc2b822f5863f996fe291333ebf20342318d6c175ae107313ec0f5d15b4febc0a1d915fe001e85511ea4d73d11122fd40a3b310729264c020ef2d715603dad354b357ae6f8623690d608572d5ff9f8e020fa7de5107cef0dc039a55360e9e25bff01a50b1804897124"], &(0x7f0000000340)=0x1) dup3(r0, r4, 0x80000) 21:46:46 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488d") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:46 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)) socket$pptp(0x18, 0x1, 0x2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:46:46 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488d") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:47 executing program 5: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1ff, 0x800) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x2, 0x7, 0x40}, 0xa) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000001c0)=""/170, &(0x7f0000000280)=0xaa) capget(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x5, 0x101}) 21:46:47 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:47 executing program 1 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x20000, 0x21) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0xbc45, @mcast1, 0x8}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r1, 0x6}, &(0x7f0000000340)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000480)={r2, @in={{0x2, 0x4e24, @rand_addr=0x7fffffff}}, [0x7, 0x0, 0xb7, 0x9, 0xfffffffffffff000, 0x140e2b24, 0x9, 0x20, 0x8, 0x5, 0x81, 0x4a, 0x44d7, 0x6, 0x6]}, &(0x7f0000000380)=0x100) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = dup3(r5, r3, 0x80000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x4965}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r7, 0x3ff, 0x2, 0x0, 0x9, 0x1f}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="3000000010003b0e000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00eb1f589372eb00001c0000000010001200050001007689"], 0x30}}, 0x0) 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488d") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:47 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)) socket$pptp(0x18, 0x1, 0x2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 246.100720] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. [ 246.117682] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 246.131518] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. 21:46:47 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x78d, 0x80000000210000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000280)={0x0, 0xffffffff}) [ 246.147942] FAULT_INJECTION: forcing a failure. [ 246.147942] name failslab, interval 1, probability 0, space 0, times 1 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 246.201977] CPU: 1 PID: 9615 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 246.210407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.219765] Call Trace: [ 246.219871] dump_stack+0x1d3/0x2c4 [ 246.219898] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.226133] should_fail.cold.4+0xa/0x17 [ 246.226154] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.240542] ? perf_trace_lock+0x14d/0x7a0 [ 246.244835] ? rcu_read_unlock_special+0x1c0/0x1c0 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 246.249780] ? zap_class+0x640/0x640 [ 246.253549] ? __f_unlock_pos+0x19/0x20 [ 246.257533] ? lock_downgrade+0x900/0x900 [ 246.261731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.267288] ? zap_class+0x640/0x640 [ 246.271050] ? fs_reclaim_acquire+0x20/0x20 [ 246.271070] ? lock_downgrade+0x900/0x900 [ 246.279573] ? check_same_owner+0x330/0x330 [ 246.279619] ? wait_for_completion+0x8a0/0x8a0 [ 246.288513] __should_failslab+0x124/0x180 [ 246.292805] should_failslab+0x9/0x14 [ 246.296616] kmem_cache_alloc+0x2be/0x730 21:46:47 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) futex(&(0x7f00000000c0), 0x8b, 0x0, 0x0, 0x0, 0x0) 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 246.300774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.306365] ? check_preemption_disabled+0x48/0x200 [ 246.311428] getname_flags+0xd0/0x590 [ 246.315251] getname+0x19/0x20 [ 246.318491] do_sys_open+0x383/0x700 [ 246.322215] ? filp_open+0x80/0x80 [ 246.325763] ? __ia32_sys_read+0xb0/0xb0 [ 246.329892] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 246.335394] __x64_sys_openat+0x9d/0x100 [ 246.339528] do_syscall_64+0x1b9/0x820 [ 246.343462] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 21:46:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_int(r0, 0x0, 0xf, &(0x7f00000000c0), &(0x7f0000000100)=0x4) signalfd4(r0, &(0x7f0000000000)={0x62}, 0x8, 0x80000) socket$inet6(0xa, 0x7, 0x20) [ 246.343484] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.353773] ? trace_hardirqs_on_caller+0x310/0x310 [ 246.353790] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.353885] ? recalc_sigpending_tsk+0x180/0x180 [ 246.368623] ? kasan_check_write+0x14/0x20 [ 246.372892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.377761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.382959] RIP: 0033:0x457579 [ 246.386155] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.386164] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 246.386185] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 246.420050] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 246.427331] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 246.434600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 246.441870] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f76fa8)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f75fdf)="3e244e7e87adeb0717edd8b867042a0dedf14029e85b62f01a0ca46272e04b65", 0x20) dup2(r0, r0) 21:46:47 executing program 1 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0xfffffd20) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d3, 0x2b}, 0x0, @in=@rand_addr=0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:46:47 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200, 0x0) ioctl$RTC_SET_TIME(r0, 0x7001, &(0x7f00000000c0)={0x0, 0x0, 0xb, 0x5}) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0x100000001) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0xff, 0x1, 0x0, 0x0, 0x2, 0x7, 0x200, 0x373, 0x40, 0x2a4, 0x7, 0x3, 0x38, 0x1, 0x7, 0x1, 0x9}, [{0x6474e557, 0x3, 0x6, 0x9, 0xfff, 0x8001, 0x9, 0x2}], "6d4b22387d0e52019020c0c8f21dbb5db2e3045ee54cd589eb6698d596918cde7796966060321988a402bf9c2f87914ff2e2d58d3298017e4740e8a670c0a8cda371215c10a907154c653fd65c5509fffa0287a2eb78dbd002b2e5beb0ee195118d06dc7c25dabafd471f8d887520a364748586d8f37d175eccaae60256b97cc9b0b50384b6fee7f323e26c8d2cc6171598a210f57ec5faaa28116d0b2eb8d1cebbf42461df3e028f48f73850099797f"}, 0x128) [ 246.668833] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 246.700421] FAULT_INJECTION: forcing a failure. [ 246.700421] name fail_page_alloc, interval 1, probability 0, space 0, times 1 21:46:47 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{&(0x7f0000001800)=@l2, 0x80, &(0x7f0000002f00)=[{&(0x7f0000001880)=""/139, 0x8b}], 0x1, &(0x7f0000002fc0)=""/59, 0x3b}}], 0x1, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8b00, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='maps\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) setsockopt$inet6_buf(r2, 0x29, 0xd3, &(0x7f0000000040)="e9777015958c356e6652d65f1a4ecdcaac0cc1b3a8a7553506e6325e236ca42cabfa3c77793967040551f99b04f6dc8809692dab94030c9e3a8864", 0x3b) [ 246.712269] CPU: 1 PID: 9665 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 246.720685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.730057] Call Trace: [ 246.732657] dump_stack+0x1d3/0x2c4 [ 246.736305] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.741519] should_fail.cold.4+0xa/0x17 [ 246.745600] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.750743] ? lock_acquire+0x1ed/0x520 [ 246.754748] ? mark_held_locks+0x130/0x130 [ 246.759066] ? _parse_integer+0x134/0x180 [ 246.763242] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.768811] ? _kstrtoull+0x188/0x250 [ 246.772653] ? _parse_integer+0x180/0x180 [ 246.776813] ? lock_release+0x970/0x970 [ 246.780797] ? check_same_owner+0x330/0x330 [ 246.785133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.790678] ? should_fail+0x22d/0xd01 [ 246.794590] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.799725] ? lock_downgrade+0x900/0x900 [ 246.803949] __alloc_pages_nodemask+0x34b/0xdd0 [ 246.808631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.814213] ? pid_task+0x115/0x200 21:46:47 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 246.817858] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 246.822887] ? __f_unlock_pos+0x19/0x20 [ 246.826872] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.832421] ? fs_reclaim_acquire+0x20/0x20 [ 246.836753] ? lock_downgrade+0x900/0x900 [ 246.840929] ? trace_hardirqs_off+0xb8/0x310 [ 246.845356] cache_grow_begin+0x91/0x8c0 [ 246.849434] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.854981] ? check_preemption_disabled+0x48/0x200 [ 246.860009] kmem_cache_alloc+0x665/0x730 [ 246.864171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:46:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000007140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000580)={0x2, 0x4e23}, 0x10) sendfile(r2, r1, 0x0, 0xb) 21:46:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000007140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000580)={0x2, 0x4e23}, 0x10) sendfile(r2, r1, 0x0, 0xb) [ 246.869737] getname_flags+0xd0/0x590 [ 246.873585] getname+0x19/0x20 [ 246.876790] do_sys_open+0x383/0x700 [ 246.880514] ? filp_open+0x80/0x80 [ 246.884061] ? __ia32_sys_read+0xb0/0xb0 [ 246.888136] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 246.893603] __x64_sys_openat+0x9d/0x100 [ 246.897677] do_syscall_64+0x1b9/0x820 [ 246.901587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 246.906979] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.911917] ? trace_hardirqs_on_caller+0x310/0x310 21:46:47 executing program 0 (fault-call:8 fault-nth:0): getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 246.916938] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.921962] ? recalc_sigpending_tsk+0x180/0x180 [ 246.926735] ? kasan_check_write+0x14/0x20 [ 246.930988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.935846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.941043] RIP: 0033:0x457579 [ 246.944249] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.963157] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 246.970871] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 246.972901] FAULT_INJECTION: forcing a failure. [ 246.972901] name failslab, interval 1, probability 0, space 0, times 0 [ 246.978145] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 246.978153] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 246.978163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 246.978171] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 [ 247.009421] CPU: 0 PID: 9685 Comm: syz-executor0 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 247.018533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.036267] Call Trace: [ 247.036289] dump_stack+0x1d3/0x2c4 [ 247.036308] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.036331] should_fail.cold.4+0xa/0x17 [ 247.036349] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.036366] ? mark_held_locks+0x130/0x130 [ 247.036380] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 247.036403] ? mark_held_locks+0x130/0x130 [ 247.036417] ? mark_held_locks+0x130/0x130 [ 247.036439] ? fs_reclaim_acquire+0x20/0x20 [ 247.036455] ? lock_downgrade+0x900/0x900 [ 247.036474] ? check_same_owner+0x330/0x330 [ 247.036494] ? lock_release+0x970/0x970 [ 247.091794] ? check_same_owner+0x330/0x330 [ 247.096121] __should_failslab+0x124/0x180 [ 247.100360] should_failslab+0x9/0x14 [ 247.104157] __kmalloc+0x2d4/0x760 [ 247.107699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.113276] ? do_sys_poll+0x276/0x1180 [ 247.117248] ? _copy_from_user+0xdf/0x150 [ 247.121395] do_sys_poll+0x276/0x1180 [ 247.125198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.130749] ? _parse_integer+0x134/0x180 [ 247.134906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 247.140443] ? _kstrtoull+0x188/0x250 [ 247.144244] ? compat_core_sys_select+0xb10/0xb10 [ 247.149088] ? lock_release+0x970/0x970 [ 247.153063] ? check_same_owner+0x330/0x330 [ 247.157485] ? usercopy_warn+0x110/0x110 [ 247.161578] ? lock_downgrade+0x900/0x900 [ 247.165742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 247.171314] ? proc_fail_nth_write+0x9e/0x210 [ 247.175813] ? proc_cwd_link+0x1d0/0x1d0 [ 247.179874] ? kasan_check_read+0x11/0x20 [ 247.184019] ? do_raw_spin_unlock+0xa7/0x2f0 [ 247.188431] ? kasan_check_write+0x14/0x20 [ 247.192664] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 247.197595] ? wait_for_completion+0x8a0/0x8a0 [ 247.202177] ? lock_release+0x970/0x970 [ 247.206148] ? check_preemption_disabled+0x48/0x200 [ 247.211198] ? fsnotify_first_mark+0x350/0x350 [ 247.215829] ? __fsnotify_parent+0xcc/0x420 [ 247.220152] ? fsnotify+0xf10/0xf10 [ 247.223779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.229322] ? check_preemption_disabled+0x48/0x200 [ 247.234340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.239875] ? poll_select_set_timeout+0x156/0x240 [ 247.244803] ? do_restart_poll+0x2e0/0x2e0 [ 247.249037] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 247.254621] __x64_sys_poll+0x197/0x530 [ 247.258596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.263956] ? __ia32_sys_pselect6+0x270/0x270 [ 247.268546] do_syscall_64+0x1b9/0x820 [ 247.272431] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.277798] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.282759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.287601] ? trace_hardirqs_on_caller+0x310/0x310 [ 247.292617] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 247.297631] ? prepare_exit_to_usermode+0x291/0x3b0 [ 247.302651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.307499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.312682] RIP: 0033:0x457579 [ 247.315883] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.334783] RSP: 002b:00007f4dae6ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 247.342488] RAX: ffffffffffffffda RBX: 00007f4dae6ccc90 RCX: 0000000000457579 [ 247.349773] RDX: 0000000000000000 RSI: 20000000000000e7 RDI: 0000000020000040 [ 247.357040] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 247.364305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4dae6cd6d4 21:46:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000080)=0x80400) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x650, 0x2000) fstat(r0, &(0x7f0000000000)) [ 247.371569] R13: 00000000004c3001 R14: 00000000004d4908 R15: 0000000000000006 21:46:48 executing program 1 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r1) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x2, &(0x7f0000501000)=""/95, &(0x7f00000000c0)=0x5f) 21:46:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0xfffffd20) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d3, 0x2b}, 0x0, @in=@rand_addr=0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:46:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x801) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x28, 0x4, 0x1}, 0x5}}, 0x18) pkey_alloc(0x0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) getresgid(&(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000080)) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x13, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1c, 0x90000) ioctl$RTC_UIE_ON(r4, 0x7003) [ 247.520455] print_req_error: 817 callbacks suppressed [ 247.520466] print_req_error: I/O error, dev loop3, sector 0 [ 247.531599] buffer_io_error: 817 callbacks suppressed [ 247.531611] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 247.544518] print_req_error: I/O error, dev loop3, sector 8 [ 247.550365] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 247.558030] print_req_error: I/O error, dev loop3, sector 16 [ 247.563872] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 247.571557] print_req_error: I/O error, dev loop3, sector 24 [ 247.577372] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 247.585067] print_req_error: I/O error, dev loop3, sector 32 [ 247.590921] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 247.598580] print_req_error: I/O error, dev loop3, sector 40 [ 247.604441] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 247.612626] print_req_error: I/O error, dev loop3, sector 48 [ 247.618637] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 247.626416] print_req_error: I/O error, dev loop3, sector 56 [ 247.632314] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 247.640057] print_req_error: I/O error, dev loop3, sector 64 [ 247.645874] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 247.653612] print_req_error: I/O error, dev loop3, sector 72 [ 247.659452] Buffer I/O error on dev loop3, logical block 9, lost async page write 21:46:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x1}, 0x14) close(0xffffffffffffffff) close(r1) 21:46:48 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:48 executing program 0 (fault-call:8 fault-nth:1): getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x29ab, 0x10000) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000100)=0x1000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f000054a000/0x2000)=nil, 0x2000, 0x3) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x120ffc, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000240)) getdents64(r2, &(0x7f00000000c0)=""/11, 0xeb) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x2, 0x1, 0x2}) 21:46:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000000)={0x80000000000000, 0x6, 0x3, 0x5, 0xc}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1bab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x2, 0x0) [ 247.768508] overlayfs: failed to resolve './file1': -2 [ 247.781371] FAULT_INJECTION: forcing a failure. [ 247.781371] name failslab, interval 1, probability 0, space 0, times 0 [ 247.796063] CPU: 0 PID: 9727 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 247.804483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.813840] Call Trace: [ 247.816463] dump_stack+0x1d3/0x2c4 [ 247.820110] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.825317] ? mark_held_locks+0x130/0x130 [ 247.829566] ? mark_held_locks+0x130/0x130 [ 247.833835] should_fail.cold.4+0xa/0x17 [ 247.837919] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.843091] ? ima_get_action+0x7e/0xa0 [ 247.847087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.852632] ? process_measurement+0x280/0x1bf0 [ 247.857316] ? mark_held_locks+0x130/0x130 [ 247.861560] ? mark_held_locks+0x130/0x130 [ 247.865813] ? fs_reclaim_acquire+0x20/0x20 [ 247.870146] ? lock_downgrade+0x900/0x900 [ 247.874308] ? check_same_owner+0x330/0x330 [ 247.878646] __should_failslab+0x124/0x180 [ 247.882894] should_failslab+0x9/0x14 [ 247.886704] kmem_cache_alloc+0x2be/0x730 [ 247.890882] ? mark_held_locks+0x130/0x130 [ 247.895166] __alloc_file+0xa8/0x470 [ 247.898890] ? file_free_rcu+0xd0/0xd0 [ 247.902800] ? mark_held_locks+0x130/0x130 [ 247.907048] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 247.912154] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 247.916979] ? modules_open+0xa0/0xa0 [ 247.920793] ? is_bpf_text_address+0xac/0x170 [ 247.925316] ? lock_downgrade+0x900/0x900 [ 247.929491] alloc_empty_file+0x72/0x170 [ 247.933562] path_openat+0x170/0x5160 [ 247.937384] ? rcu_softirq_qs+0x20/0x20 [ 247.941410] ? unwind_dump+0x190/0x190 [ 247.945322] ? is_bpf_text_address+0xd3/0x170 [ 247.949833] ? kernel_text_address+0x79/0xf0 [ 247.954256] ? path_lookupat.isra.43+0xc00/0xc00 [ 247.959017] ? unwind_get_return_address+0x61/0xa0 [ 247.963960] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 247.968991] ? expand_files.part.8+0x571/0x9a0 [ 247.973586] ? iterate_fd+0x4b0/0x4b0 [ 247.977408] ? __alloc_fd+0x347/0x6e0 [ 247.981220] ? lock_downgrade+0x900/0x900 [ 247.985376] ? getname+0x19/0x20 [ 247.988766] ? kasan_check_read+0x11/0x20 [ 247.992923] ? do_raw_spin_unlock+0xa7/0x2f0 [ 247.997339] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 248.001930] ? kasan_check_write+0x14/0x20 [ 248.006174] ? do_raw_spin_lock+0xc1/0x200 [ 248.010431] ? _raw_spin_unlock+0x2c/0x50 [ 248.014588] ? __alloc_fd+0x347/0x6e0 [ 248.018407] do_filp_open+0x255/0x380 [ 248.022220] ? may_open_dev+0x100/0x100 [ 248.026250] ? strncpy_from_user+0x3be/0x510 [ 248.030681] ? digsig_verify+0x1530/0x1530 [ 248.034937] ? get_unused_fd_flags+0x122/0x1a0 [ 248.039531] ? getname_flags+0x26e/0x590 [ 248.043601] do_sys_open+0x568/0x700 [ 248.047326] ? filp_open+0x80/0x80 [ 248.050875] ? __ia32_sys_read+0xb0/0xb0 [ 248.054947] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 248.060408] __x64_sys_openat+0x9d/0x100 [ 248.064483] do_syscall_64+0x1b9/0x820 [ 248.068391] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 248.073868] ? syscall_return_slowpath+0x5e0/0x5e0 [ 248.078811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.083666] ? trace_hardirqs_on_caller+0x310/0x310 [ 248.088690] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 248.093756] ? prepare_exit_to_usermode+0x291/0x3b0 [ 248.098789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.103647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.108841] RIP: 0033:0x457579 [ 248.112043] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.130956] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 248.138678] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 248.145961] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 248.153233] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 248.160596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 21:46:49 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) writev(r0, &(0x7f0000000a40)=[{&(0x7f00000004c0)="df015be2a1043cce", 0x8}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="0eff4a45de15627c", 0x8}], 0x1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x8a000, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000140)={0x18, 0x0, 0x2, {0x8620000000000000}}, 0x18) tkill(r1, 0x34) readv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/212, 0xd4}], 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x20000, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7a, 0x0, [0x40000081]}) 21:46:49 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 248.167867] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000005 [ 248.282027] ntfs: (device loop1): parse_options(): Unrecognized mount option ./file0. 21:46:49 executing program 1 (fault-call:5 fault-nth:3): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:49 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x68900, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x44000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xfffffffffffffff9) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000140)=0xfffffffffffeffff) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x10000, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x8000, 0x200, 0x1ff, 0x400, 0x20, 0x0, 0x0, 0x5, 0x0, 0x4000000, 0x5, 0x2, 0xffffffffffff6d26, 0x1ff, 0x1ff, 0xc6c, 0x49, 0x0, 0xff, 0x0, 0x1000, 0x5, 0x1, 0x8, 0x6, 0x0, 0x0, 0x7e, 0x1, @perf_bp={&(0x7f0000000280), 0x8}, 0x10, 0x6, 0x8, 0x6, 0x0, 0x5, 0x711645cd}, r2, 0xf, 0xffffffffffffff9c, 0x2) r4 = dup(0xffffffffffffffff) ioctl$KVM_GET_REG_LIST(r4, 0x400452c9, &(0x7f0000000040)=ANY=[]) 21:46:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x301002) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x1}) r3 = accept4(r1, 0x0, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="e7002d77609023bf04b69c2315ba33340849dd1b05ff4dda9227e943aa8c8a", 0x1f) sendfile(r3, r4, &(0x7f00000002c0)=0xd, 0x10000000000447) 21:46:49 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x2000000) [ 248.608800] FAULT_INJECTION: forcing a failure. [ 248.608800] name failslab, interval 1, probability 0, space 0, times 0 [ 248.658995] CPU: 1 PID: 9764 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 248.667421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.676778] Call Trace: [ 248.679387] dump_stack+0x1d3/0x2c4 [ 248.683029] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.688235] ? lock_downgrade+0x900/0x900 [ 248.692414] should_fail.cold.4+0xa/0x17 [ 248.696483] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 248.701772] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.706887] ? is_bpf_text_address+0xd3/0x170 [ 248.711393] ? kernel_text_address+0x79/0xf0 [ 248.715810] ? __kernel_text_address+0xd/0x40 [ 248.720314] ? unwind_get_return_address+0x61/0xa0 [ 248.725315] ? __save_stack_trace+0x8d/0xf0 [ 248.729663] ? fs_reclaim_acquire+0x20/0x20 [ 248.733998] ? lock_downgrade+0x900/0x900 [ 248.738158] ? kasan_slab_alloc+0x12/0x20 [ 248.742325] ? do_syscall_64+0x1b9/0x820 [ 248.746390] ? check_same_owner+0x330/0x330 [ 248.750747] __should_failslab+0x124/0x180 [ 248.754999] should_failslab+0x9/0x14 [ 248.758815] kmem_cache_alloc_trace+0x2d7/0x750 [ 248.763491] ? __might_sleep+0x95/0x190 [ 248.767531] apparmor_file_alloc_security+0x17b/0xac0 [ 248.772743] ? percpu_ref_put_many+0x13e/0x260 [ 248.777339] ? trace_hardirqs_on+0xbd/0x310 [ 248.781675] ? apparmor_socket_getpeersec_stream+0xae0/0xae0 [ 248.787495] ? kasan_kmalloc+0xc7/0xe0 [ 248.791400] ? kasan_slab_alloc+0x12/0x20 [ 248.795555] ? kmem_cache_alloc+0x306/0x730 [ 248.799925] security_file_alloc+0x4c/0xa0 [ 248.804175] __alloc_file+0x12a/0x470 [ 248.807993] ? file_free_rcu+0xd0/0xd0 [ 248.811890] ? mark_held_locks+0x130/0x130 [ 248.816134] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 248.821156] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 248.825922] ? modules_open+0xa0/0xa0 [ 248.829745] ? is_bpf_text_address+0xac/0x170 [ 248.834284] ? lock_downgrade+0x900/0x900 [ 248.838452] alloc_empty_file+0x72/0x170 [ 248.842528] path_openat+0x170/0x5160 [ 248.846335] ? rcu_softirq_qs+0x20/0x20 [ 248.850320] ? unwind_dump+0x190/0x190 [ 248.854217] ? is_bpf_text_address+0xd3/0x170 [ 248.858741] ? kernel_text_address+0x79/0xf0 [ 248.863163] ? path_lookupat.isra.43+0xc00/0xc00 [ 248.867928] ? unwind_get_return_address+0x61/0xa0 [ 248.872872] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 248.877898] ? expand_files.part.8+0x571/0x9a0 [ 248.882494] ? iterate_fd+0x4b0/0x4b0 [ 248.886303] ? __alloc_fd+0x347/0x6e0 [ 248.890111] ? lock_downgrade+0x900/0x900 [ 248.894290] ? getname+0x19/0x20 [ 248.897677] ? kasan_check_read+0x11/0x20 [ 248.901852] ? do_raw_spin_unlock+0xa7/0x2f0 [ 248.906279] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 248.910868] ? kasan_check_write+0x14/0x20 [ 248.915111] ? do_raw_spin_lock+0xc1/0x200 [ 248.919360] ? _raw_spin_unlock+0x2c/0x50 [ 248.923514] ? __alloc_fd+0x347/0x6e0 [ 248.927346] do_filp_open+0x255/0x380 [ 248.931159] ? may_open_dev+0x100/0x100 [ 248.935142] ? strncpy_from_user+0x3be/0x510 [ 248.939568] ? digsig_verify+0x1530/0x1530 [ 248.943820] ? get_unused_fd_flags+0x122/0x1a0 [ 248.948426] ? getname_flags+0x26e/0x590 [ 248.952526] do_sys_open+0x568/0x700 [ 248.956258] ? filp_open+0x80/0x80 [ 248.959803] ? __ia32_sys_read+0xb0/0xb0 [ 248.963876] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 248.969343] __x64_sys_openat+0x9d/0x100 [ 248.973425] do_syscall_64+0x1b9/0x820 [ 248.977321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 248.982694] ? syscall_return_slowpath+0x5e0/0x5e0 [ 248.987646] ? trace_hardirqs_on_caller+0x310/0x310 [ 248.992672] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 248.997719] ? recalc_sigpending_tsk+0x180/0x180 [ 249.002491] ? kasan_check_write+0x14/0x20 [ 249.006755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.011633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.016827] RIP: 0033:0x457579 [ 249.020032] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.038942] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 249.046675] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 21:46:49 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffefffefffffff84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x0, 0x0, 0x8000, 0x0, 0x11}, 0x98) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) waitid(0x0, r2, &(0x7f0000000080), 0x1000000, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7, 0x5, 0x8008, 0x88, 0x20, 0x6, 0x1, 0x1ff, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r3}, 0x8) 21:46:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000001480)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv6={0x86dd, {0x0, 0x6, "474df1", 0x30, 0x0, 0x0, @mcast1, @loopback, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "dd4c4f", 0x0, 0x0, 0x0, @mcast1, @loopback}}}}}}}, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0xa2080, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f00000000c0)={0x10000, 0x100000000, 0x7, {0x77359400}, 0x3, 0x7}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x6fa5face, 0x18, 0x1, r1}) 21:46:49 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x10) [ 249.053961] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 249.061234] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 249.068521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 249.075806] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 [ 249.132430] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 21:46:50 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x84005, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f00000004c0)=0x6e) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="c8eb59c944b91624d760b78ba95d96f188755a162700b4c991383d1d94d154989b95fd2cb7e7671eaa53f34fb5aa9e234a73b5e48ab8bd511a4a5913c29d028c38844b68c36b798f7ed40fecaa"], 0x1) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r4 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0xfb, 0x80002000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r4, 0x40045730, &(0x7f0000000080)=0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r1, 0x0, 0x12, &(0x7f0000000140)='/dev/input/mouse#\x00'}, 0x30) ptrace$cont(0x1f, r5, 0x8, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r0) getsockname$llc(r4, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x10) 21:46:50 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000300)=0xe8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) nanosleep(&(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240)) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000020000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0x1, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @ib={0x1b, 0xda0, 0x4, {"afa61180ab423bd57282d4bc16626e45"}, 0x2, 0x66, 0x6}}}, 0x90) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 21:46:50 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x1000000000000000) 21:46:50 executing program 1 (fault-call:5 fault-nth:4): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3c, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0063404000000000000000000000d20000000000245c1d2845534f3122520a8024d366b900000900000100000200000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a627300000000", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 21:46:50 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x1000000000000) 21:46:50 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x0, 0x100000000}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000fd7ff0), &(0x7f0000000000), 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000003e000080"]) inotify_init1(0x0) [ 249.418460] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 249.478497] FAULT_INJECTION: forcing a failure. [ 249.478497] name failslab, interval 1, probability 0, space 0, times 0 [ 249.496760] CPU: 1 PID: 9819 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 249.505408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.505414] Call Trace: [ 249.505451] dump_stack+0x1d3/0x2c4 [ 249.505477] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.526214] ? kasan_check_read+0x11/0x20 [ 249.530378] ? __zone_watermark_ok+0x330/0x7b0 [ 249.534973] should_fail.cold.4+0xa/0x17 [ 249.539044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.544167] ? mark_held_locks+0x130/0x130 [ 249.548421] ? lock_release+0x970/0x970 [ 249.552415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.557962] ? trace_hardirqs_on+0x310/0x310 [ 249.562382] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 249.567929] ? get_page_from_freelist+0x488b/0x5340 [ 249.572955] ? mark_held_locks+0x130/0x130 [ 249.577213] ? fs_reclaim_acquire+0x20/0x20 [ 249.581550] ? lock_downgrade+0x900/0x900 [ 249.585705] ? check_same_owner+0x330/0x330 [ 249.590047] __should_failslab+0x124/0x180 [ 249.594288] should_failslab+0x9/0x14 [ 249.598092] kmem_cache_alloc+0x2be/0x730 [ 249.602250] ? is_bpf_text_address+0xac/0x170 [ 249.607263] __d_alloc+0xc8/0xb90 [ 249.610738] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 249.615681] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 249.620703] ? kasan_check_read+0x11/0x20 [ 249.624864] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 249.630139] ? rcu_softirq_qs+0x20/0x20 [ 249.634109] ? unwind_dump+0x190/0x190 [ 249.638005] ? is_bpf_text_address+0xd3/0x170 [ 249.642509] ? mark_held_locks+0x130/0x130 [ 249.646747] ? mark_held_locks+0x130/0x130 [ 249.650980] ? unwind_get_return_address+0x61/0xa0 [ 249.655910] ? __save_stack_trace+0x8d/0xf0 [ 249.660250] d_alloc+0x96/0x380 [ 249.663536] ? __d_alloc+0xb90/0xb90 [ 249.667267] ? save_stack+0xa9/0xd0 [ 249.670909] d_alloc_parallel+0x15a/0x1f40 [ 249.675143] ? __d_lookup+0x591/0x9e0 [ 249.678949] ? lock_downgrade+0x900/0x900 [ 249.683099] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 249.688028] ? __bfs+0x2d0/0x7a0 [ 249.691405] ? __d_lookup_rcu+0xaa0/0xaa0 [ 249.695643] ? make_kprojid+0x30/0x30 [ 249.699456] ? apparmor_capable+0x355/0x6c0 [ 249.703779] ? __d_lookup+0x5b8/0x9e0 [ 249.707584] ? d_alloc_parallel+0x1f40/0x1f40 [ 249.712086] ? lookup_open+0x302/0x1b90 [ 249.716101] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 249.721640] ? __lockdep_init_map+0x105/0x590 [ 249.726143] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 249.731425] ? d_lookup+0x20d/0x300 [ 249.735053] ? __d_lookup+0x9e0/0x9e0 [ 249.738852] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 249.743446] lookup_open+0x560/0x1b90 [ 249.747259] ? vfs_link+0xb70/0xb70 [ 249.750890] ? lock_release+0x970/0x970 [ 249.754883] path_openat+0x252a/0x5160 [ 249.758774] ? rcu_softirq_qs+0x20/0x20 [ 249.762750] ? unwind_dump+0x190/0x190 [ 249.766647] ? path_lookupat.isra.43+0xc00/0xc00 [ 249.771400] ? unwind_get_return_address+0x61/0xa0 [ 249.776332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 249.781345] ? expand_files.part.8+0x571/0x9a0 [ 249.785925] ? iterate_fd+0x4b0/0x4b0 [ 249.789737] ? __alloc_fd+0x347/0x6e0 [ 249.793545] ? lock_downgrade+0x900/0x900 [ 249.797725] ? getname+0x19/0x20 [ 249.801100] ? kasan_check_read+0x11/0x20 [ 249.805251] ? do_raw_spin_unlock+0xa7/0x2f0 [ 249.809660] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 249.814249] ? kasan_check_write+0x14/0x20 [ 249.818480] ? do_raw_spin_lock+0xc1/0x200 [ 249.822726] ? _raw_spin_unlock+0x2c/0x50 [ 249.826875] ? __alloc_fd+0x347/0x6e0 [ 249.830686] do_filp_open+0x255/0x380 [ 249.834498] ? may_open_dev+0x100/0x100 [ 249.838484] ? strncpy_from_user+0x3be/0x510 [ 249.842894] ? digsig_verify+0x1530/0x1530 [ 249.847131] ? get_unused_fd_flags+0x122/0x1a0 [ 249.851723] ? getname_flags+0x26e/0x590 [ 249.855791] do_sys_open+0x568/0x700 [ 249.859510] ? filp_open+0x80/0x80 [ 249.863052] ? __ia32_sys_read+0xb0/0xb0 [ 249.867122] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 249.872574] __x64_sys_openat+0x9d/0x100 [ 249.876639] do_syscall_64+0x1b9/0x820 [ 249.880525] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.885889] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.890824] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.895854] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.900871] ? recalc_sigpending_tsk+0x180/0x180 [ 249.905641] ? kasan_check_write+0x14/0x20 [ 249.910060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.914914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.920102] RIP: 0033:0x457579 [ 249.923297] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.942205] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 249.949943] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 249.957231] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 249.964507] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 249.971776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 21:46:50 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x10000000) 21:46:50 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) socket$pptp(0x18, 0x1, 0x2) io_destroy(0x0) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:46:50 executing program 1 (fault-call:5 fault-nth:5): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) [ 249.979040] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:51 executing program 2: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:51 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0xffc99a3b00000000) 21:46:51 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x10000, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in6=@local, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w=', @ANYRESHEX=r0, @ANYBLOB=',access=user,cache=fscache,access=any,version=9p2000.L,version=9p2000,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@xdp, 0x80, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/217, 0xd9}, {&(0x7f0000000080)}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, &(0x7f00000014c0)=""/177, 0xb1, 0xfffffffffffffff8}, 0x10000) [ 250.127957] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 250.182602] FAULT_INJECTION: forcing a failure. [ 250.182602] name failslab, interval 1, probability 0, space 0, times 0 [ 250.202830] CPU: 1 PID: 9852 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 250.211262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.220622] Call Trace: [ 250.223232] dump_stack+0x1d3/0x2c4 [ 250.226886] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.232105] should_fail.cold.4+0xa/0x17 [ 250.236184] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.241297] ? lock_downgrade+0x900/0x900 [ 250.245458] ? kasan_check_read+0x11/0x20 [ 250.249614] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 250.254897] ? rcu_softirq_qs+0x20/0x20 [ 250.258886] ? unwind_dump+0x190/0x190 [ 250.262788] ? mark_held_locks+0x130/0x130 [ 250.267033] ? mark_held_locks+0x130/0x130 [ 250.271292] ? fs_reclaim_acquire+0x20/0x20 [ 250.275632] ? lock_downgrade+0x900/0x900 [ 250.279802] ? check_same_owner+0x330/0x330 [ 250.284131] ? mark_held_locks+0x130/0x130 [ 250.288379] __should_failslab+0x124/0x180 [ 250.292621] should_failslab+0x9/0x14 [ 250.296443] kmem_cache_alloc+0x2be/0x730 [ 250.300611] ? mark_held_locks+0x130/0x130 [ 250.304847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.310215] ? percpu_ref_put_many+0x11c/0x260 [ 250.310245] ? lock_downgrade+0x900/0x900 [ 250.318956] __d_alloc+0xc8/0xb90 [ 250.318975] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 250.318996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 21:46:51 executing program 2: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 250.332445] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 250.337216] ? modules_open+0xa0/0xa0 [ 250.341037] ? is_bpf_text_address+0xac/0x170 [ 250.345549] ? mark_held_locks+0x130/0x130 [ 250.349798] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 250.354748] ? kasan_check_read+0x11/0x20 [ 250.358911] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 250.360463] 9pnet: Insufficient options for proto=fd [ 250.364195] ? rcu_softirq_qs+0x20/0x20 [ 250.364212] d_alloc+0x96/0x380 [ 250.364232] ? __d_alloc+0xb90/0xb90 [ 250.380315] ? kernel_text_address+0x79/0xf0 [ 250.384759] ? __kernel_text_address+0xd/0x40 [ 250.389282] d_alloc_parallel+0x15a/0x1f40 [ 250.393534] ? mark_held_locks+0x130/0x130 [ 250.397783] ? save_stack+0xa9/0xd0 [ 250.401427] ? __d_lookup_rcu+0xaa0/0xaa0 [ 250.405586] ? kmem_cache_alloc+0x12e/0x730 [ 250.409920] ? __d_alloc+0xc8/0xb90 [ 250.413554] ? d_alloc+0x96/0x380 [ 250.417012] ? d_alloc_parallel+0x15a/0x1f40 [ 250.421423] ? lookup_open+0x560/0x1b90 [ 250.425424] ? path_openat+0x252a/0x5160 [ 250.425438] ? do_sys_open+0x568/0x700 21:46:51 executing program 2: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 250.425467] ? mark_held_locks+0x130/0x130 [ 250.437618] ? __d_lookup+0x591/0x9e0 [ 250.441420] ? lock_downgrade+0x900/0x900 [ 250.441438] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 250.441455] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 250.441475] ? __lockdep_init_map+0x105/0x590 [ 250.460457] ? __lockdep_init_map+0x105/0x590 [ 250.464963] ? lockdep_init_map+0x9/0x10 [ 250.464978] ? __init_waitqueue_head+0x9e/0x150 [ 250.464992] ? init_wait_entry+0x1c0/0x1c0 [ 250.465009] ? lock_acquire+0x1ed/0x520 21:46:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x400, 0x10000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x3, 0x1, 0x4, &(0x7f0000000100)=[0x0], 0x1}, 0x20) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x1fc, 0x1fc) sendto$inet(r0, &(0x7f00005c8000)="c3", 0x1, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast1}, 0x10) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) [ 250.465028] __lookup_slow+0x1e6/0x540 [ 250.465046] ? vfs_unlink+0x510/0x510 [ 250.489653] ? inode_permission+0xb2/0x560 [ 250.493901] lookup_slow+0x57/0x80 [ 250.497456] lookup_one_len_unlocked+0xf1/0x100 [ 250.502136] ? lookup_slow+0x80/0x80 [ 250.505856] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 250.510803] ? seq_print_sym_offset.constprop.6+0x210/0x230 [ 250.516611] ovl_lookup_single+0x63/0x870 [ 250.520774] ovl_lookup_layer+0x3cf/0x4a0 [ 250.524929] ? kasan_check_write+0x14/0x20 [ 250.529175] ? override_creds+0x195/0x1f0 21:46:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x40, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_matches\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000140)) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x280240) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x80, 0x1, 0x6}, 0xfffffffffffffffb}}, 0x18) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) dup2(r0, r3) [ 250.533334] ? ovl_dentry_upper+0x65/0x120 [ 250.537577] ? ovl_lookup_single+0x870/0x870 [ 250.541999] ? ovl_path_real+0x400/0x400 [ 250.546080] ovl_lookup+0x5cf/0x29c0 [ 250.549805] ? make_kprojid+0x30/0x30 [ 250.553610] ? apparmor_capable+0x355/0x6c0 [ 250.557945] ? __d_lookup+0x5b8/0x9e0 [ 250.561761] ? ovl_path_next+0x2e0/0x2e0 [ 250.565839] ? d_alloc_parallel+0x1f40/0x1f40 [ 250.570348] ? lookup_open+0x302/0x1b90 [ 250.574335] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 250.579797] ? __lockdep_init_map+0x105/0x590 21:46:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0xfffffffffffffe6e, 0xfa00, {r2}}, 0x3d3) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000140)={0x1, 0x0, 0x102, 0x0, [0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 250.584303] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 250.589330] ? d_lookup+0x20d/0x300 [ 250.592968] ? __d_lookup+0x9e0/0x9e0 [ 250.596786] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 250.601408] ? ovl_path_next+0x2e0/0x2e0 [ 250.605493] lookup_open+0x72e/0x1b90 [ 250.609803] ? vfs_link+0xb70/0xb70 [ 250.613445] ? lock_release+0x970/0x970 [ 250.617446] path_openat+0x252a/0x5160 [ 250.621351] ? rcu_softirq_qs+0x20/0x20 [ 250.625339] ? unwind_dump+0x190/0x190 [ 250.629230] ? path_lookupat.isra.43+0xc00/0xc00 [ 250.633973] ? unwind_get_return_address+0x61/0xa0 [ 250.638895] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 250.643895] ? expand_files.part.8+0x571/0x9a0 [ 250.648461] ? iterate_fd+0x4b0/0x4b0 [ 250.652252] ? __alloc_fd+0x347/0x6e0 [ 250.656040] ? lock_downgrade+0x900/0x900 [ 250.660169] ? getname+0x19/0x20 [ 250.663524] ? kasan_check_read+0x11/0x20 [ 250.667653] ? do_raw_spin_unlock+0xa7/0x2f0 [ 250.672048] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 250.676615] ? kasan_check_write+0x14/0x20 [ 250.680846] ? do_raw_spin_lock+0xc1/0x200 [ 250.685082] ? _raw_spin_unlock+0x2c/0x50 [ 250.689212] ? __alloc_fd+0x347/0x6e0 [ 250.693018] do_filp_open+0x255/0x380 [ 250.696833] ? may_open_dev+0x100/0x100 [ 250.700806] ? strncpy_from_user+0x3be/0x510 [ 250.705229] ? digsig_verify+0x1530/0x1530 [ 250.709471] ? get_unused_fd_flags+0x122/0x1a0 [ 250.714048] ? getname_flags+0x26e/0x590 [ 250.718134] do_sys_open+0x568/0x700 [ 250.721849] ? filp_open+0x80/0x80 [ 250.725375] ? __ia32_sys_read+0xb0/0xb0 [ 250.729444] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 250.734893] __x64_sys_openat+0x9d/0x100 [ 250.738952] do_syscall_64+0x1b9/0x820 [ 250.742842] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 250.748199] ? syscall_return_slowpath+0x5e0/0x5e0 [ 250.753122] ? trace_hardirqs_on_caller+0x310/0x310 [ 250.758129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 250.763148] ? recalc_sigpending_tsk+0x180/0x180 [ 250.767896] ? kasan_check_write+0x14/0x20 [ 250.772130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.776957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.782128] RIP: 0033:0x457579 [ 250.785325] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.804236] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 250.811936] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 250.819188] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 250.826460] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 21:46:51 executing program 5: capset(&(0x7f0000000000)={0x4000019980330}, &(0x7f0000001fe8)={0x0, 0x0, 0x0, 0x0, 0x7fff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) 21:46:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000000), &(0x7f0000000140)=0x30) [ 250.833721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 250.840989] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:51 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) socket$pptp(0x18, 0x1, 0x2) io_destroy(0x0) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:46:51 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x1000000) 21:46:51 executing program 1 (fault-call:5 fault-nth:6): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x400000, 0x0) ioctl(r0, 0x92, &(0x7f0000000100)="4e55492d1596d8c8a2b873023cf71e143d0385c2bb439358a3a3b6183f54ec8f741002b3b4e854f847bc50a12fd2dd7572d935b62a5da5ebc263e21f29c640eb483b67335c10e5bd39d1a5a84888e0c18dbaee3c65702785a851ba9aab51df0100a0d5941b6e15e96027712e63272c8a33829b6ffdd2e730d3a165de3a10d68025f8022542e4830758130e59401f9677") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', 'vmnet0nodev\x00'}, &(0x7f00000000c0)='cpuset\x00', 0x7, 0x1) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 21:46:51 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x80000001}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f00000000c0), 0xc, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="a301e8143bb930b3310010000053"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={r2}, &(0x7f0000000100)=0x8) 21:46:52 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x400200, 0x0) faccessat(r0, &(0x7f0000000280)='./file1\x00', 0x101, 0x900) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vhci\x00', 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) write$evdev(0xffffffffffffffff, &(0x7f0000000400)=[{{0x77359400}, 0x1}], 0x18) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f00000000c0)='bpf\x00', 0x5890, &(0x7f0000000540)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) sendto$unix(r1, &(0x7f0000000580)="2d83d2ef26782f23375d5b106348592f4cad52e01d298384b0bea0a0b0ddef285db7d5ae247317f3add71c791ca7cb7efae011d9616082388463b0da5026371a5a66ee3c67934c4ed74771e506ddc16eca7b5ffc26039c77cd16050e08db36a0fa1be6", 0x63, 0x4040, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e20}, 0x6e) getresuid(&(0x7f0000000440), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) mount$bpf(0x0, &(0x7f0000000340)='./file0/file0\x00', &(0x7f00000003c0)='bpf\x00', 0x800000, &(0x7f0000000740)={[{@mode={'mode', 0x3d, 0x7}}], [{@uid_gt={'uid>', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'em1wppp0'}}]}) 21:46:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200001, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x40, 0x0, 0x1}, 0x395}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f00000001c0)="13ab0f0d3558790891378fb74e0912be4dd3f65d740c0c9dd1f54bcc256aa46d0f37e20e4e41da63b309d11a2dce54cefe4167bbe47fddec989548ef01580ac61608c46af12dd6334c99756e0ecd5116dfafeac6cee2d1bf2f77e767e4a7e339a40db17b801c950b1c460796e492ce33be97a47a74c1db86c10b23f3db3c6cefb4341ca32604b2e783ee1ace7148932dac34ed4eb818d21f81ffc7fa6e3ac078ba4c252129889b04823e514ee71875bea3c5094fdd444cb2457affe66d07298f9d100f4d13f54722f4e09fa57796f11b7a90f524c8554c40d0c8ddeb86b03719e7e64a4d1ef05be1a47548aff7d36d3b", 0xf0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xe13) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000465f8e)=""/114, 0x24f) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) [ 251.024157] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 251.082427] FAULT_INJECTION: forcing a failure. [ 251.082427] name failslab, interval 1, probability 0, space 0, times 0 [ 251.094539] CPU: 1 PID: 9915 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 251.102956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.112317] Call Trace: [ 251.114922] dump_stack+0x1d3/0x2c4 [ 251.118567] ? dump_stack_print_info.cold.2+0x52/0x52 [ 251.123768] ? _raw_spin_unlock+0x2c/0x50 [ 251.127931] should_fail.cold.4+0xa/0x17 21:46:52 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40940, 0x0) preadv(r1, &(0x7f0000001e80)=[{&(0x7f00000018c0)=""/117, 0xfffffffffffffc2e}, {&(0x7f0000001940)=""/45, 0xfd84}], 0x100000000000016a, 0x0) write$P9_RREAD(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="a2000000750100970000007d65607a8e6fef2acf396453362c7a9cdfe98fc6b9468464818c83673e613f92bbe785d4bed61c578931ef8c2d4f806898de5ec0755100c163874015ff13058c01e7b0151da0dbec40678e737d8bfc4da6f201a8780310273c8585f681abf66dca274605dbd2228232d58b3631ffee8e44fa34ac468dcf476fc92974696f1b7bbc3ee49b4b64a54c7126cb9d3a"], 0x98) [ 251.132008] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.137119] ? dput.part.25+0x4dd/0x790 [ 251.141100] ? lock_downgrade+0x900/0x900 [ 251.141120] ? do_raw_spin_unlock+0xa7/0x2f0 [ 251.141138] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 251.154262] ? _raw_spin_unlock+0x2c/0x50 [ 251.158421] ? fs_reclaim_acquire+0x20/0x20 [ 251.162760] ? lock_downgrade+0x900/0x900 [ 251.166921] ? check_same_owner+0x330/0x330 [ 251.166938] ? ovl_lookup_single+0xd0/0x870 [ 251.166959] __should_failslab+0x124/0x180 21:46:52 executing program 2: r0 = fanotify_init(0x24, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x80000002}) r1 = socket(0xa, 0x2, 0x0) fsetxattr(r0, &(0x7f0000000240)=@random={'btrfs.', '/dev/amidi#\x00'}, &(0x7f0000000280)='vboxnet1$\\{!#\x00', 0xe, 0x2) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000003c0)) poll(&(0x7f0000000140)=[{r1}], 0x1, 0x7) r4 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x90000) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000640)={0x0, 0x70, "e6b4d34579896ef1f86541835884fd01d1f132d32b3d44cb453089eff2c3710930605ab95296f6cd1d154ae966e18562607bf996d17cfbc019d28724d73c9a95d2d6f3c4c7ea234635dfc1e177e3bf3104a93cd40d813fc1afbb4c98eac5933b3069ac551ebf3f9bc5610c4d79a47b30"}, &(0x7f0000000180)=0x78) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f00000006c0)="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", 0xa720, 0x8051, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={[], [], @rand_addr=0xef}}, 0x1c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000000000000000000000000cd51870477aaebe705ac11ec97cb2f0a9ed2dfa0f48bb43640180ffb618c8b23947321823df689f65d79480eb1f6b173c58d3806a22bb2bb03a8b60121545ce66e5ae8fe114f5b11491fe8a09b5dc79a42ef0eb4"]) [ 251.175588] should_failslab+0x9/0x14 [ 251.175602] __kmalloc+0x2d4/0x760 [ 251.175616] ? ovl_lookup_single+0x870/0x870 [ 251.175631] ? ovl_path_real+0x400/0x400 [ 251.175655] ? ovl_lookup+0x1178/0x29c0 [ 251.187201] ovl_lookup+0x1178/0x29c0 [ 251.187219] ? apparmor_capable+0x355/0x6c0 [ 251.187255] ? ovl_path_next+0x2e0/0x2e0 [ 251.199678] ? d_alloc_parallel+0x1f40/0x1f40 [ 251.199701] ? lookup_open+0x302/0x1b90 [ 251.199733] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 251.199753] ? __lockdep_init_map+0x105/0x590 [ 251.199773] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 251.199796] ? d_lookup+0x20d/0x300 [ 251.235347] ? __d_lookup+0x9e0/0x9e0 [ 251.242754] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 251.242773] ? ovl_path_next+0x2e0/0x2e0 [ 251.242792] lookup_open+0x72e/0x1b90 [ 251.255215] ? vfs_link+0xb70/0xb70 [ 251.258859] ? lock_release+0x970/0x970 [ 251.262865] path_openat+0x252a/0x5160 [ 251.266765] ? rcu_softirq_qs+0x20/0x20 [ 251.270761] ? unwind_dump+0x190/0x190 [ 251.274671] ? path_lookupat.isra.43+0xc00/0xc00 [ 251.279439] ? unwind_get_return_address+0x61/0xa0 [ 251.284466] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 251.289588] ? expand_files.part.8+0x571/0x9a0 [ 251.294180] ? iterate_fd+0x4b0/0x4b0 [ 251.297994] ? __alloc_fd+0x347/0x6e0 [ 251.301809] ? lock_downgrade+0x900/0x900 [ 251.305963] ? getname+0x19/0x20 [ 251.309350] ? kasan_check_read+0x11/0x20 [ 251.313538] ? do_raw_spin_unlock+0xa7/0x2f0 [ 251.317964] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 251.322553] ? kasan_check_write+0x14/0x20 [ 251.326791] ? do_raw_spin_lock+0xc1/0x200 [ 251.331040] ? _raw_spin_unlock+0x2c/0x50 [ 251.335237] ? __alloc_fd+0x347/0x6e0 [ 251.339055] do_filp_open+0x255/0x380 [ 251.342865] ? may_open_dev+0x100/0x100 [ 251.346842] ? strncpy_from_user+0x3be/0x510 [ 251.351267] ? digsig_verify+0x1530/0x1530 [ 251.355506] ? get_unused_fd_flags+0x122/0x1a0 [ 251.360098] ? getname_flags+0x26e/0x590 [ 251.364193] do_sys_open+0x568/0x700 [ 251.367915] ? filp_open+0x80/0x80 [ 251.371460] ? __ia32_sys_read+0xb0/0xb0 [ 251.375537] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 251.380992] __x64_sys_openat+0x9d/0x100 [ 251.385064] do_syscall_64+0x1b9/0x820 [ 251.388959] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 251.394328] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.399275] ? trace_hardirqs_on_caller+0x310/0x310 [ 251.404301] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 251.409355] ? recalc_sigpending_tsk+0x180/0x180 [ 251.414114] ? kasan_check_write+0x14/0x20 [ 251.418358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.423210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.428408] RIP: 0033:0x457579 [ 251.431601] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.450501] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 251.458217] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 251.465498] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 251.472776] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 21:46:52 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0xffc99a3b) [ 251.480049] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 251.487327] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:52 executing program 1 (fault-call:5 fault-nth:7): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x3a0) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$packet_int(r0, 0x107, 0x2040000000f, &(0x7f0000000000)=0x100, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x401, 0xd1ac52d7) prctl$setmm(0x23, 0x3, &(0x7f0000ff7000/0x9000)=nil) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) sendto$inet6(r0, &(0x7f00000000c0)="04040000070000000000", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000003, @remote}, 0x1c) 21:46:52 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) socket$pptp(0x18, 0x1, 0x2) io_destroy(0x0) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:46:52 executing program 2: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) socket$pptp(0x18, 0x1, 0x2) io_destroy(0x0) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:46:52 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x2) 21:46:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002500)={0xffffffffffffff9c, 0x50, &(0x7f0000002480)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002580)={0xffffffffffffffff, r0, 0x0, 0x25, &(0x7f0000002540)='self(posix_acl_accessGPL}eth0selinux\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x14a) r2 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) stat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x7d, 0x5, &(0x7f0000002280)=[{&(0x7f0000000140)="15c6413e9d2f80f5a335fbaccece3077043043a48009107118b659505aa33a898706bfbf1fc1651f8be1784f7eb100c01d0c2e92d4ff05033596df7617b6bdd40be36761ad4eb2d70788142b6903db44b8bfafa261038a5a906cda38b16aaf9b87980c929f950c5f458819a8061b33fb8d2be3065a4ade8a443e8081c65fc06ceaf53c616b1567a604175bfcbb4cacce35fac644dbe29213dc20f4", 0x9b, 0x5}, {&(0x7f0000000200)="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", 0x1000, 0x9}, {&(0x7f0000001200)="1b862e85b3b76de28c31077619ba7e61d1766d8e1326403b9e19f73eeee450eeb226aeae5134380e718599", 0x2b, 0x89f8}, {&(0x7f0000001240)="9c56c2de60ef96751b4f35dc156f04692774f4fc083bb4db9270", 0x1a, 0x3ff}, {&(0x7f0000001280)="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", 0x1000, 0x2}], 0x20000, &(0x7f00000023c0)={[{@gid={'gid', 0x3d, r3}}, {@barrier='barrier'}, {@type={'type', 0x3d, "a461601e"}}, {@type={'type', 0x3d, "d27f37cc"}}, {@uid={'uid', 0x3d, r4}}], [{@subj_role={'subj_role', 0x3d, '\\-eth0!keyring'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffeffffffff}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x700000000000000}}]}) [ 251.815379] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 251.852570] FAULT_INJECTION: forcing a failure. [ 251.852570] name failslab, interval 1, probability 0, space 0, times 0 [ 251.894061] CPU: 1 PID: 9970 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 251.902484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.902491] Call Trace: [ 251.902516] dump_stack+0x1d3/0x2c4 [ 251.902540] ? dump_stack_print_info.cold.2+0x52/0x52 [ 251.914473] ? lock_downgrade+0x900/0x900 [ 251.923276] should_fail.cold.4+0xa/0x17 [ 251.923296] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.923316] ? kasan_check_write+0x14/0x20 [ 251.940833] ? up_read+0x225/0x2c0 21:46:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x40000, 0x120) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x4e22, 0x81, @local, 0x2}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x2, 0x0) renameat(r3, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000003c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r1, 0x4de8a597}}, 0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000007c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000400)=0xd) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000440)={r5, 0x5, 0x81, 0x100000000, 0x2, 0x2000000000000000}, 0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000940)={@dev, @multicast1, 0x0}, &(0x7f0000000980)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000009c0)={@loopback, 0xa, r6}) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) [ 251.944388] ? down_read+0x8d/0x120 [ 251.948028] ? up_read_non_owner+0x100/0x100 [ 251.952447] ? __d_lookup+0x5b8/0x9e0 [ 251.952528] ? ext4_xattr_get+0x1ad/0xb30 [ 251.952551] ? fs_reclaim_acquire+0x20/0x20 [ 251.964795] ? lock_downgrade+0x900/0x900 [ 251.968957] ? check_same_owner+0x330/0x330 [ 251.973296] ? ext4_xattr_trusted_set+0x40/0x40 [ 251.977975] ? __vfs_getxattr+0xf6/0x150 [ 251.982050] __should_failslab+0x124/0x180 [ 251.986296] should_failslab+0x9/0x14 [ 251.990102] kmem_cache_alloc_trace+0x2d7/0x750 [ 251.994781] ? vfs_getxattr+0xc4/0x390 [ 251.998685] ? xattr_permission+0x310/0x310 [ 252.003100] ovl_encode_real_fh+0xca/0x500 [ 252.007355] ? ovl_set_attr+0x550/0x550 [ 252.011344] ? ovl_check_metacopy_xattr+0x79/0x140 [ 252.016289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.021839] ? ovl_lookup_single+0xd0/0x870 [ 252.026178] ovl_get_index_name+0x1c/0x80 [ 252.030336] ovl_lookup_index+0xe4/0x700 [ 252.034413] ? ovl_get_index_fh+0x2d0/0x2d0 [ 252.038753] ? ovl_path_real+0x400/0x400 [ 252.042832] ? ovl_lookup+0x1178/0x29c0 [ 252.046815] ovl_lookup+0x9f2/0x29c0 [ 252.050547] ? ovl_path_next+0x2e0/0x2e0 [ 252.054619] ? d_alloc_parallel+0x1f40/0x1f40 [ 252.059130] ? lookup_open+0x302/0x1b90 [ 252.063114] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 252.068574] ? __lockdep_init_map+0x105/0x590 [ 252.073080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 252.073871] audit: type=1804 audit(1538603212.847:51): pid=9977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/84/file1" dev="sda1" ino=16547 res=1 [ 252.078098] ? d_lookup+0x20d/0x300 [ 252.078116] ? __d_lookup+0x9e0/0x9e0 [ 252.078131] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 252.078151] ? ovl_path_next+0x2e0/0x2e0 [ 252.117812] lookup_open+0x72e/0x1b90 [ 252.121623] ? vfs_link+0xb70/0xb70 [ 252.121639] ? lock_release+0x970/0x970 [ 252.121671] path_openat+0x252a/0x5160 [ 252.133163] ? rcu_softirq_qs+0x20/0x20 [ 252.137142] ? unwind_dump+0x190/0x190 21:46:53 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400040, 0x0) setns(r0, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062100, &(0x7f00000000c0)="df66a6cafc8d5858475df1d18364e18e21140fe6b0fc7a680a0fb2597d85280a648f8c9c40437aefb5db6b540bfc2016246aebb18fc245fb0e1113c8", &(0x7f00000002c0), &(0x7f0000000000), &(0x7f0000000040)="dc015135aaa02690bb42672d1b2c0bf8bdb01f16f89a680cbd73d6249e30a4e2909a6131a4f9b1dffb5af7112656fa699482066fa95c749f6a0cc08dffd5a7d198198bf3b141efa6ed0eee5ac8fdee04b3bb") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000080)={0xfffffe6f, 0x0, &(0x7f00000000c0)=[@request_death], 0x0, 0x0, &(0x7f0000000040)}) timerfd_gettime(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 252.141050] ? path_lookupat.isra.43+0xc00/0xc00 [ 252.145825] ? unwind_get_return_address+0x61/0xa0 [ 252.148148] audit: type=1804 audit(1538603212.847:52): pid=9977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir854924068/syzkaller.4qwt3X/84/file1" dev="sda1" ino=16547 res=1 [ 252.150763] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 252.150778] ? expand_files.part.8+0x571/0x9a0 [ 252.150795] ? iterate_fd+0x4b0/0x4b0 [ 252.150819] ? __alloc_fd+0x347/0x6e0 [ 252.191084] ? lock_downgrade+0x900/0x900 21:46:53 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x3b9ac9ff) [ 252.195238] ? getname+0x19/0x20 [ 252.198627] ? kasan_check_read+0x11/0x20 [ 252.202789] ? do_raw_spin_unlock+0xa7/0x2f0 [ 252.206889] binder: 9981:9982 unknown command -435219423 [ 252.207202] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 252.207223] ? kasan_check_write+0x14/0x20 [ 252.213146] binder: 9981:9982 ioctl c0306201 20000080 returned -22 [ 252.217269] ? do_raw_spin_lock+0xc1/0x200 [ 252.217288] ? _raw_spin_unlock+0x2c/0x50 [ 252.217302] ? __alloc_fd+0x347/0x6e0 [ 252.217330] do_filp_open+0x255/0x380 [ 252.236228] ? may_open_dev+0x100/0x100 [ 252.236251] ? strncpy_from_user+0x3be/0x510 [ 252.236270] ? digsig_verify+0x1530/0x1530 [ 252.236288] ? get_unused_fd_flags+0x122/0x1a0 [ 252.261049] ? getname_flags+0x26e/0x590 [ 252.265123] do_sys_open+0x568/0x700 [ 252.268845] ? filp_open+0x80/0x80 [ 252.272391] ? __ia32_sys_read+0xb0/0xb0 [ 252.276479] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 252.281942] __x64_sys_openat+0x9d/0x100 [ 252.286014] do_syscall_64+0x1b9/0x820 [ 252.289937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.295314] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.300270] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.305293] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.310321] ? recalc_sigpending_tsk+0x180/0x180 [ 252.315088] ? kasan_check_write+0x14/0x20 [ 252.319340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.324200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.329413] RIP: 0033:0x457579 21:46:53 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x100000000000000) [ 252.332614] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.351524] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 252.359250] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 252.366525] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 252.373795] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 252.381068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 252.388340] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:53 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400040, 0x0) setns(r0, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062100, &(0x7f00000000c0)="df66a6cafc8d5858475df1d18364e18e21140fe6b0fc7a680a0fb2597d85280a648f8c9c40437aefb5db6b540bfc2016246aebb18fc245fb0e1113c8", &(0x7f00000002c0), &(0x7f0000000000), &(0x7f0000000040)="dc015135aaa02690bb42672d1b2c0bf8bdb01f16f89a680cbd73d6249e30a4e2909a6131a4f9b1dffb5af7112656fa699482066fa95c749f6a0cc08dffd5a7d198198bf3b141efa6ed0eee5ac8fdee04b3bb") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000080)={0xfffffe6f, 0x0, &(0x7f00000000c0)=[@request_death], 0x0, 0x0, &(0x7f0000000040)}) timerfd_gettime(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 21:46:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000300)={0x9, 0x2, 0x2, 0x63, 0x0, 0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x40) ioctl$UI_DEV_CREATE(r5, 0x5501) ioctl$BLKDISCARD(r5, 0x1277, &(0x7f0000000140)=0x40) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r2, 0x4, 0x42c00) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x105800) getpeername$unix(r3, &(0x7f0000000200), &(0x7f0000000280)=0x6e) connect$bt_rfcomm(r5, &(0x7f00000001c0)={0x1f, {0x80000000, 0xe012, 0x0, 0x6, 0x9, 0x7ff}, 0x4716}, 0xa) setsockopt$bt_BT_VOICE(r6, 0x112, 0xb, &(0x7f00000000c0)=0x3f, 0x2) accept4(r2, 0x0, &(0x7f0000000000), 0x0) flistxattr(r3, &(0x7f0000000180)=""/58, 0x3a) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) 21:46:53 executing program 1 (fault-call:5 fault-nth:8): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) syz_open_dev$evdev(&(0x7f0000000480)='/dev/input/event#\x00', 0x1, 0x200001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x200) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000200)=""/194) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000300)=[{&(0x7f0000000100)="e855da9170771d96354f2529", 0xc, 0xfbd}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="696f636861727365743d63703836352c67727071756f74612c6572726f72733d636f6e74696e75652c6e6f71756f74612c696f636861727365743d6d6163637972696c6c69632c696e746567726974792c6e6f696e746567726974792c6572726f72733d636f6e74696e75652c66736e616d653dafa42c2c7375626a5f726f6c653d6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e2c636f6e746578743d73797374656d5f752c7065726d69745f646972656374696f2c6f626a5f726f6c653d7d5d6b657972696e672d6367726f7570776c616e302f2c666f776e65723e", @ANYRESDEC=r5, @ANYBLOB="2c689600020000"]) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x7, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 21:46:53 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 21:46:53 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x200000000000000) 21:46:53 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400040, 0x0) setns(r0, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062100, &(0x7f00000000c0)="df66a6cafc8d5858475df1d18364e18e21140fe6b0fc7a680a0fb2597d85280a648f8c9c40437aefb5db6b540bfc2016246aebb18fc245fb0e1113c8", &(0x7f00000002c0), &(0x7f0000000000), &(0x7f0000000040)="dc015135aaa02690bb42672d1b2c0bf8bdb01f16f89a680cbd73d6249e30a4e2909a6131a4f9b1dffb5af7112656fa699482066fa95c749f6a0cc08dffd5a7d198198bf3b141efa6ed0eee5ac8fdee04b3bb") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000080)={0xfffffe6f, 0x0, &(0x7f00000000c0)=[@request_death], 0x0, 0x0, &(0x7f0000000040)}) timerfd_gettime(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 252.756401] jfs: Unrecognized mount option "fsname=¯¤" or missing value [ 252.768045] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 252.777104] binder: 10019:10020 unknown command -435219423 [ 252.799354] binder: 10019:10020 ioctl c0306201 20000080 returned -22 [ 252.829120] FAULT_INJECTION: forcing a failure. [ 252.829120] name failslab, interval 1, probability 0, space 0, times 0 [ 252.831468] device nr0 entered promiscuous mode [ 252.840540] CPU: 0 PID: 10036 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 252.840551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.840556] Call Trace: [ 252.840580] dump_stack+0x1d3/0x2c4 [ 252.840601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.840623] ? __kernel_text_address+0xd/0x40 [ 252.840646] should_fail.cold.4+0xa/0x17 [ 252.840667] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 252.840686] ? save_stack+0xa9/0xd0 [ 252.840701] ? save_stack+0x43/0xd0 [ 252.840728] ? kasan_kmalloc+0xc7/0xe0 [ 252.840753] ? kmem_cache_alloc_trace+0x152/0x750 [ 252.840771] ? ovl_encode_real_fh+0xca/0x500 [ 252.840790] ? ovl_get_index_name+0x1c/0x80 [ 252.840806] ? ovl_lookup+0x9f2/0x29c0 [ 252.840823] ? lookup_open+0x72e/0x1b90 [ 252.840839] ? path_openat+0x252a/0x5160 [ 252.840855] ? do_filp_open+0x255/0x380 [ 252.840868] ? do_sys_open+0x568/0x700 [ 252.840881] ? __x64_sys_openat+0x9d/0x100 [ 252.840898] ? do_syscall_64+0x1b9/0x820 [ 252.840915] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.840937] ? ext4_xattr_get+0x1ad/0xb30 [ 252.840961] ? fs_reclaim_acquire+0x20/0x20 [ 252.840981] ? lock_downgrade+0x900/0x900 [ 252.840998] ? lock_downgrade+0x900/0x900 [ 252.841019] ? check_same_owner+0x330/0x330 [ 252.841037] ? trace_hardirqs_on+0xbd/0x310 [ 252.841060] __should_failslab+0x124/0x180 [ 252.841079] should_failslab+0x9/0x14 [ 252.841092] __kmalloc+0x2d4/0x760 [ 252.841110] ? dput+0x15/0x20 [ 252.841125] ? ovl_encode_real_fh+0x1bb/0x500 [ 252.841145] ovl_encode_real_fh+0x1bb/0x500 [ 252.841160] ? ovl_set_attr+0x550/0x550 [ 252.841180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.841195] ? ovl_lookup_single+0xd0/0x870 [ 252.841223] ovl_get_index_name+0x1c/0x80 [ 252.854494] ovl_lookup_index+0xe4/0x700 [ 252.854513] ? ovl_get_index_fh+0x2d0/0x2d0 [ 252.854527] ? ovl_path_real+0x400/0x400 [ 252.854546] ? ovl_lookup+0x1178/0x29c0 [ 252.875283] ovl_lookup+0x9f2/0x29c0 [ 252.875311] ? ovl_path_next+0x2e0/0x2e0 [ 252.900139] ? d_alloc_parallel+0x1f40/0x1f40 [ 252.909372] ? lookup_open+0x302/0x1b90 [ 252.909391] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 252.909410] ? __lockdep_init_map+0x105/0x590 [ 252.909431] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 253.061259] ? d_lookup+0x20d/0x300 [ 253.064914] ? __d_lookup+0x9e0/0x9e0 [ 253.068751] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 253.073353] ? ovl_path_next+0x2e0/0x2e0 [ 253.077423] lookup_open+0x72e/0x1b90 [ 253.081238] ? vfs_link+0xb70/0xb70 [ 253.084872] ? lock_release+0x970/0x970 [ 253.088869] path_openat+0x252a/0x5160 [ 253.092767] ? rcu_softirq_qs+0x20/0x20 [ 253.096771] ? unwind_dump+0x190/0x190 [ 253.100672] ? path_lookupat.isra.43+0xc00/0xc00 [ 253.105429] ? unwind_get_return_address+0x61/0xa0 [ 253.110363] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 253.115409] ? expand_files.part.8+0x571/0x9a0 [ 253.120001] ? iterate_fd+0x4b0/0x4b0 [ 253.123807] ? __alloc_fd+0x347/0x6e0 [ 253.127614] ? lock_downgrade+0x900/0x900 [ 253.131768] ? getname+0x19/0x20 [ 253.135145] ? kasan_check_read+0x11/0x20 [ 253.139299] ? do_raw_spin_unlock+0xa7/0x2f0 [ 253.143749] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 253.148338] ? kasan_check_write+0x14/0x20 [ 253.152579] ? do_raw_spin_lock+0xc1/0x200 [ 253.156825] ? _raw_spin_unlock+0x2c/0x50 [ 253.160975] ? __alloc_fd+0x347/0x6e0 [ 253.164796] do_filp_open+0x255/0x380 [ 253.168603] ? may_open_dev+0x100/0x100 [ 253.172580] ? strncpy_from_user+0x3be/0x510 21:46:54 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) socket$pptp(0x18, 0x1, 0x2) io_destroy(0x0) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 21:46:54 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4200, 0x0) sendmsg$rds(r3, &(0x7f0000001e00)={&(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001d00)=[@rdma_args={0x48, 0x114, 0x1, {{0x6, 0x9}, {&(0x7f0000000180)=""/195, 0xc3}, &(0x7f0000001b40)=[{&(0x7f00000013c0)=""/146, 0x92}, {&(0x7f0000001480)=""/244, 0xf4}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000001580)=""/189, 0xbd}, {&(0x7f0000001640)=""/237, 0xed}, {&(0x7f0000001740)=""/250, 0xfa}, {&(0x7f0000001840)=""/74, 0x4a}, {&(0x7f00000018c0)=""/195, 0xc3}, {&(0x7f00000019c0)=""/157, 0x9d}, {&(0x7f0000001a80)=""/132, 0x84}], 0xa, 0x40}}, @fadd={0x58, 0x114, 0x6, {{0x1, 0x5}, &(0x7f0000001c00)=0xfffffffffffff801, &(0x7f0000001c40)=0x5, 0xfff, 0x100000001, 0x1, 0xffffffff, 0x4, 0xfffffffffffffff8}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001c80)=""/62, 0x3e}, &(0x7f0000001cc0)}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x1000}], 0xe8, 0x14}, 0x4000000) poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 21:46:54 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:54 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r1) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) [ 253.177000] ? digsig_verify+0x1530/0x1530 [ 253.181239] ? get_unused_fd_flags+0x122/0x1a0 [ 253.185836] ? getname_flags+0x26e/0x590 [ 253.189914] do_sys_open+0x568/0x700 [ 253.193632] ? filp_open+0x80/0x80 [ 253.197176] ? __ia32_sys_read+0xb0/0xb0 [ 253.201251] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 253.206706] __x64_sys_openat+0x9d/0x100 [ 253.210790] do_syscall_64+0x1b9/0x820 [ 253.214694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 253.220072] ? syscall_return_slowpath+0x5e0/0x5e0 [ 253.225010] ? trace_hardirqs_on_caller+0x310/0x310 [ 253.230031] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 253.235056] ? recalc_sigpending_tsk+0x180/0x180 [ 253.239821] ? kasan_check_write+0x14/0x20 [ 253.244074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.248933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.254123] RIP: 0033:0x457579 [ 253.257327] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.276228] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 253.283942] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 253.291217] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 253.298486] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 253.305762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 253.313036] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:54 executing program 1 (fault-call:5 fault-nth:9): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) [ 253.544420] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 21:46:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) ioctl$KDGKBLED(r1, 0xc0045401, &(0x7f00006d2fff)) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000000c0)=ANY=[@ANYBLOB="0600000000000000ffffb26a8ca5c87c571f75a28affff000000000200000000000000400000000000000002000000000000000200000000000000f7ffffffffffffff0400000000000000000200000000000054b0000000000000f7f00000000000000000000000000000c50c000000"]) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000002c0)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) 21:46:54 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 253.601586] FAULT_INJECTION: forcing a failure. [ 253.601586] name failslab, interval 1, probability 0, space 0, times 0 [ 253.637921] print_req_error: 332 callbacks suppressed [ 253.637930] print_req_error: I/O error, dev loop3, sector 0 [ 253.649004] buffer_io_error: 330 callbacks suppressed [ 253.649016] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 253.661905] print_req_error: I/O error, dev loop3, sector 8 [ 253.667631] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 253.675339] print_req_error: I/O error, dev loop3, sector 16 [ 253.681172] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 253.681222] print_req_error: I/O error, dev loop3, sector 24 [ 253.694672] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 253.702355] print_req_error: I/O error, dev loop3, sector 32 [ 253.708161] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 253.715836] print_req_error: I/O error, dev loop3, sector 40 [ 253.721683] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 253.729428] print_req_error: I/O error, dev loop3, sector 48 [ 253.735096] CPU: 1 PID: 10066 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 253.735285] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 253.743767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.743773] Call Trace: [ 253.743801] dump_stack+0x1d3/0x2c4 [ 253.743823] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.743847] ? __kernel_text_address+0xd/0x40 [ 253.751507] print_req_error: I/O error, dev loop3, sector 56 [ 253.760811] ? unwind_get_return_address+0x61/0xa0 [ 253.760839] should_fail.cold.4+0xa/0x17 [ 253.763408] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 253.767033] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.772257] print_req_error: I/O error, dev loop3, sector 64 [ 253.776694] ? save_stack+0xa9/0xd0 [ 253.782494] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 253.787396] ? __kasan_slab_free+0x102/0x150 [ 253.791491] print_req_error: I/O error, dev loop3, sector 72 [ 253.799054] ? kasan_slab_free+0xe/0x10 [ 253.799066] ? kfree+0xcf/0x230 [ 253.799086] ? ovl_encode_real_fh+0x3ba/0x500 [ 253.804261] Buffer I/O error on dev loop3, logical block 9, lost async page write [ 253.810044] ? ovl_get_index_name+0x1c/0x80 [ 253.810059] ? ovl_lookup_index+0xe4/0x700 [ 253.810077] ? ovl_lookup+0x9f2/0x29c0 [ 253.863258] ? path_openat+0x252a/0x5160 [ 253.867315] ? do_filp_open+0x255/0x380 [ 253.871282] ? do_sys_open+0x568/0x700 [ 253.875166] ? __x64_sys_openat+0x9d/0x100 [ 253.879398] ? do_syscall_64+0x1b9/0x820 [ 253.883456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.888819] ? trace_hardirqs_off+0xb8/0x310 [ 253.893227] ? kasan_check_read+0x11/0x20 [ 253.897384] ? do_raw_spin_unlock+0xa7/0x2f0 [ 253.901797] ? trace_hardirqs_on+0x310/0x310 [ 253.906215] ? fs_reclaim_acquire+0x20/0x20 [ 253.910548] ? lock_downgrade+0x900/0x900 [ 253.914695] ? debug_check_no_obj_freed+0x305/0x58d [ 253.919731] ? check_same_owner+0x330/0x330 [ 253.924139] ? ovl_encode_real_fh+0x3ba/0x500 [ 253.928641] __should_failslab+0x124/0x180 [ 253.932883] should_failslab+0x9/0x14 [ 253.936683] __kmalloc+0x2d4/0x760 [ 253.940247] ? ovl_encode_real_fh+0x3bf/0x500 [ 253.944752] ? ovl_get_index_name_fh+0x57/0x180 [ 253.949423] ovl_get_index_name_fh+0x57/0x180 [ 253.953940] ovl_get_index_name+0x5c/0x80 [ 253.958090] ovl_lookup_index+0xe4/0x700 [ 253.962158] ? ovl_get_index_fh+0x2d0/0x2d0 [ 253.966476] ? ovl_path_real+0x400/0x400 [ 253.970537] ? ovl_lookup+0x1178/0x29c0 [ 253.974511] ovl_lookup+0x9f2/0x29c0 [ 253.978239] ? ovl_path_next+0x2e0/0x2e0 [ 253.982304] ? d_alloc_parallel+0x1f40/0x1f40 [ 253.986813] ? lookup_open+0x302/0x1b90 [ 253.990792] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 253.996249] ? __lockdep_init_map+0x105/0x590 [ 254.000754] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 254.005774] ? d_lookup+0x20d/0x300 [ 254.009402] ? __d_lookup+0x9e0/0x9e0 [ 254.013198] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 254.017783] ? ovl_path_next+0x2e0/0x2e0 [ 254.021845] lookup_open+0x72e/0x1b90 [ 254.025652] ? vfs_link+0xb70/0xb70 [ 254.029281] ? lock_release+0x970/0x970 [ 254.033278] path_openat+0x252a/0x5160 [ 254.037163] ? rcu_softirq_qs+0x20/0x20 [ 254.041135] ? unwind_dump+0x190/0x190 [ 254.045029] ? path_lookupat.isra.43+0xc00/0xc00 [ 254.049782] ? unwind_get_return_address+0x61/0xa0 [ 254.054709] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 254.059743] ? expand_files.part.8+0x571/0x9a0 [ 254.064333] ? iterate_fd+0x4b0/0x4b0 [ 254.068133] ? __alloc_fd+0x347/0x6e0 [ 254.071936] ? lock_downgrade+0x900/0x900 [ 254.076083] ? getname+0x19/0x20 [ 254.079452] ? kasan_check_read+0x11/0x20 [ 254.083597] ? do_raw_spin_unlock+0xa7/0x2f0 [ 254.088004] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 254.092587] ? kasan_check_write+0x14/0x20 [ 254.096818] ? do_raw_spin_lock+0xc1/0x200 [ 254.101052] ? _raw_spin_unlock+0x2c/0x50 [ 254.105193] ? __alloc_fd+0x347/0x6e0 [ 254.108999] do_filp_open+0x255/0x380 [ 254.112809] ? may_open_dev+0x100/0x100 [ 254.116782] ? strncpy_from_user+0x3be/0x510 [ 254.121193] ? digsig_verify+0x1530/0x1530 [ 254.125425] ? get_unused_fd_flags+0x122/0x1a0 [ 254.130007] ? getname_flags+0x26e/0x590 [ 254.134069] do_sys_open+0x568/0x700 [ 254.137785] ? filp_open+0x80/0x80 [ 254.141322] ? __ia32_sys_read+0xb0/0xb0 [ 254.145388] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 254.150926] __x64_sys_openat+0x9d/0x100 [ 254.154990] do_syscall_64+0x1b9/0x820 [ 254.158880] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 254.164251] ? syscall_return_slowpath+0x5e0/0x5e0 [ 254.169180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.174024] ? trace_hardirqs_on_caller+0x310/0x310 [ 254.179043] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 254.184057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 254.189076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.193921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.199105] RIP: 0033:0x457579 [ 254.202300] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.221195] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 254.228905] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 254.236171] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 254.243439] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 254.250706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 254.257981] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 21:46:55 executing program 4: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000000009) r1 = accept(r0, &(0x7f0000000040)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000a68000)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}}}, &(0x7f000044fffc)=0xa0) 21:46:55 executing program 1 (fault-call:5 fault-nth:10): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x3326, 0x0) 21:46:55 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x2002) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = socket$alg(0x26, 0x5, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "4cfc48a63c06b91ee7db604aaad0f0b4"}, 0x11, 0x2) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0xffffffffffffffe0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005480), 0x492492492492615, 0x8000) r3 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000200), 0x0, 0x0) 21:46:55 executing program 3: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)=0x0) socket$pptp(0x18, 0x1, 0x2) io_destroy(r2) futex(&(0x7f0000000300)=0x1, 0x7, 0x1, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x7, 0x0, 0x3894}, 0xc) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61e0d7", 0xd, 0xfffffffffffffffb) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 21:46:55 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x1) connect$netlink(r1, &(0x7f0000000100)=@unspec, 0xc) [ 254.551584] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 21:46:55 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffffe, 0x40) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x100, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005480), 0x492492492492615, 0x8000) r3 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 254.608536] FAULT_INJECTION: forcing a failure. [ 254.608536] name failslab, interval 1, probability 0, space 0, times 0 21:46:55 executing program 5: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e004000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x8000e, 0xffd) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt(r1, 0x0, 0x1, &(0x7f00000002c0)=""/206, &(0x7f0000000000)=0xce) [ 254.654843] CPU: 1 PID: 10108 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 254.663397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.672750] Call Trace: [ 254.672785] dump_stack+0x1d3/0x2c4 [ 254.672808] ? dump_stack_print_info.cold.2+0x52/0x52 [ 254.672836] should_fail.cold.4+0xa/0x17 [ 254.679034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 254.679051] ? check_same_owner+0x330/0x330 [ 254.679066] ? lock_release+0x970/0x970 [ 254.679095] ? lookup_one_len_unlocked+0xf1/0x100 [ 254.706551] ? mark_held_locks+0x130/0x130 [ 254.710806] ? __might_sleep+0x95/0x190 [ 254.710885] ? __getblk_gfp+0x129/0x1030 [ 254.710912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 254.718968] ? ext4_es_lookup_extent+0x48f/0xdd0 [ 254.718998] ? fs_reclaim_acquire+0x20/0x20 [ 254.733594] ? lock_downgrade+0x900/0x900 [ 254.733970] Unable to read inode block [ 254.737757] ? check_same_owner+0x330/0x330 [ 254.737777] ? mark_held_locks+0x130/0x130 [ 254.737797] __should_failslab+0x124/0x180 21:46:55 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f00000003c0)=0x400) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x90, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5e69a96c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r4 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005480), 0x492492492492615, 0x8000) r5 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r5, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 254.737817] should_failslab+0x9/0x14 [ 254.747797] MINIX-fs: get root inode failed [ 254.750235] kmem_cache_alloc+0x2be/0x730 [ 254.750274] ? trace_hardirqs_on+0xbd/0x310 [ 254.750301] ? kasan_check_read+0x11/0x20 [ 254.750325] ? __wake_up_common_lock+0x1d0/0x330 [ 254.750356] __d_alloc+0xc8/0xb90 [ 254.771127] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 254.771154] ? mark_held_locks+0x130/0x130 [ 254.771174] ? mark_held_locks+0x130/0x130 [ 254.780058] ? mark_held_locks+0x130/0x130 [ 254.780072] ? __wake_up_common+0x7d0/0x7d0 21:46:55 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 254.780096] ? mark_held_locks+0x130/0x130 [ 254.809786] d_alloc+0x96/0x380 [ 254.813080] ? __d_alloc+0xb90/0xb90 [ 254.816806] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 254.821830] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 254.826686] ? modules_open+0xa0/0xa0 [ 254.830507] d_alloc_parallel+0x15a/0x1f40 [ 254.834786] ? mark_held_locks+0x130/0x130 [ 254.839033] ? __d_lookup_rcu+0xaa0/0xaa0 [ 254.843185] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 254.843203] ? kasan_check_read+0x11/0x20 [ 254.843218] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 254.843236] ? __d_lookup+0x591/0x9e0 [ 254.852305] ? lock_downgrade+0x900/0x900 [ 254.852321] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 254.852338] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 254.852357] ? unwind_get_return_address+0x61/0xa0 [ 254.880823] ? __lockdep_init_map+0x105/0x590 [ 254.885328] ? __lockdep_init_map+0x105/0x590 [ 254.889840] ? lockdep_init_map+0x9/0x10 [ 254.893915] ? __init_waitqueue_head+0x9e/0x150 [ 254.898599] ? init_wait_entry+0x1c0/0x1c0 21:46:55 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) dup3(r0, r0, 0x80000) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 254.902845] ? lock_acquire+0x1ed/0x520 [ 254.906827] __lookup_slow+0x1e6/0x540 [ 254.910730] ? vfs_unlink+0x510/0x510 [ 254.914548] ? inode_permission+0xb2/0x560 [ 254.918808] lookup_slow+0x57/0x80 [ 254.918826] lookup_one_len_unlocked+0xf1/0x100 [ 254.918850] ? lookup_slow+0x80/0x80 [ 254.927052] ovl_lookup_index+0x1c9/0x700 [ 254.927072] ? ovl_get_index_fh+0x2d0/0x2d0 [ 254.927091] ? ovl_path_real+0x400/0x400 [ 254.943301] ? ovl_lookup+0x1178/0x29c0 [ 254.947292] ovl_lookup+0x9f2/0x29c0 [ 254.951032] ? ovl_path_next+0x2e0/0x2e0 21:46:55 executing program 0: getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005480), 0x492492492492615, 0x8000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x14200, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x20d7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x8}, &(0x7f00000001c0)=0x8) r4 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) [ 254.955108] ? d_alloc_parallel+0x1f40/0x1f40 [ 254.959620] ? lookup_open+0x302/0x1b90 [ 254.963607] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 254.970198] ? __lockdep_init_map+0x105/0x590 [ 254.975727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 254.981421] ? d_lookup+0x20d/0x300 [ 254.985787] ? __d_lookup+0x9e0/0x9e0 [ 254.989692] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 254.989712] ? ovl_path_next+0x2e0/0x2e0 [ 254.989739] lookup_open+0x72e/0x1b90 [ 254.989758] ? vfs_link+0xb70/0xb70 [ 254.989778] ? lock_release+0x970/0x970 [ 254.998835] path_openat+0x252a/0x5160 [ 254.998852] ? rcu_softirq_qs+0x20/0x20 [ 254.998865] ? unwind_dump+0x190/0x190 [ 254.998889] ? path_lookupat.isra.43+0xc00/0xc00 [ 255.026749] ? unwind_get_return_address+0x61/0xa0 [ 255.031697] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 255.036743] ? expand_files.part.8+0x571/0x9a0 [ 255.041337] ? iterate_fd+0x4b0/0x4b0 [ 255.045151] ? __alloc_fd+0x347/0x6e0 [ 255.048965] ? lock_downgrade+0x900/0x900 [ 255.053114] ? getname+0x19/0x20 [ 255.056488] ? kasan_check_read+0x11/0x20 [ 255.060642] ? do_raw_spin_unlock+0xa7/0x2f0 [ 255.065058] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 255.065076] ? kasan_check_write+0x14/0x20 [ 255.065090] ? do_raw_spin_lock+0xc1/0x200 [ 255.065108] ? _raw_spin_unlock+0x2c/0x50 [ 255.073908] ? __alloc_fd+0x347/0x6e0 [ 255.073933] do_filp_open+0x255/0x380 [ 255.073949] ? may_open_dev+0x100/0x100 [ 255.073968] ? strncpy_from_user+0x3be/0x510 [ 255.098287] ? digsig_verify+0x1530/0x1530 [ 255.102529] ? get_unused_fd_flags+0x122/0x1a0 [ 255.107120] ? getname_flags+0x26e/0x590 [ 255.111187] do_sys_open+0x568/0x700 [ 255.114900] ? filp_open+0x80/0x80 [ 255.118436] ? __ia32_sys_read+0xb0/0xb0 [ 255.122501] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.127953] __x64_sys_openat+0x9d/0x100 [ 255.132023] do_syscall_64+0x1b9/0x820 [ 255.135909] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.141278] ? syscall_return_slowpath+0x5e0/0x5e0 [ 255.146212] ? trace_hardirqs_on_caller+0x310/0x310 [ 255.151237] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 255.156265] ? recalc_sigpending_tsk+0x180/0x180 [ 255.161022] ? kasan_check_write+0x14/0x20 [ 255.165279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.170137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.175326] RIP: 0033:0x457579 [ 255.178518] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.197427] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 255.205133] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 255.212414] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 255.219681] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 255.226945] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 255.234211] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 [ 255.265977] ================================================================== [ 255.265981] BUG: KASAN: slab-out-of-bounds in string+0x298/0x2d0 [ 255.265985] Read of size 1 at addr ffff8801b96e653a by task syz-executor1/10108 [ 255.265986] [ 255.265990] CPU: 1 PID: 10108 Comm: syz-executor1 Not tainted 4.19.0-rc6-next-20181003+ #86 [ 255.265995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.265997] Call Trace: [ 255.265999] dump_stack+0x1d3/0x2c4 [ 255.266002] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.266004] ? printk+0xa7/0xcf [ 255.266007] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 255.266010] print_address_description.cold.8+0x9/0x1ff [ 255.266012] kasan_report.cold.9+0x242/0x309 [ 255.266014] ? string+0x298/0x2d0 [ 255.266017] __asan_report_load1_noabort+0x14/0x20 [ 255.266019] string+0x298/0x2d0 [ 255.266021] ? widen_string+0x2e0/0x2e0 [ 255.266024] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 255.266026] vsnprintf+0x48e/0x1b60 [ 255.266028] ? pointer+0x990/0x990 [ 255.266031] ? lock_release+0x970/0x970 [ 255.266033] vscnprintf+0x2d/0x80 [ 255.266035] vprintk_store+0x43/0x510 [ 255.266038] ? do_raw_spin_lock+0xc1/0x200 [ 255.266040] vprintk_emit+0x1c1/0x930 [ 255.266042] ? wake_up_klogd+0x180/0x180 [ 255.266044] ? __lookup_slow+0x312/0x540 [ 255.266047] ? ___ratelimit+0x36f/0x655 [ 255.266049] ? lock_downgrade+0x900/0x900 [ 255.266052] ? trace_hardirqs_on+0xbd/0x310 [ 255.266054] ? kasan_check_read+0x11/0x20 [ 255.266056] ? ___ratelimit+0x36f/0x655 [ 255.266059] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.266061] vprintk_default+0x28/0x30 [ 255.266063] vprintk_func+0x7e/0x181 [ 255.266065] printk+0xa7/0xcf [ 255.266075] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 255.266077] ovl_lookup_index.cold.14+0xe8/0x1f8 [ 255.266080] ? ovl_get_index_fh+0x2d0/0x2d0 [ 255.266082] ? ovl_path_real+0x400/0x400 [ 255.266085] ? ovl_lookup+0x1178/0x29c0 [ 255.266087] ovl_lookup+0x9f2/0x29c0 [ 255.266089] ? ovl_path_next+0x2e0/0x2e0 [ 255.266092] ? d_alloc_parallel+0x1f40/0x1f40 [ 255.266094] ? lookup_open+0x302/0x1b90 [ 255.266097] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.266100] ? __lockdep_init_map+0x105/0x590 [ 255.266102] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 255.266105] ? d_lookup+0x20d/0x300 [ 255.266107] ? __d_lookup+0x9e0/0x9e0 [ 255.266109] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 255.266112] ? ovl_path_next+0x2e0/0x2e0 [ 255.266114] lookup_open+0x72e/0x1b90 [ 255.266116] ? vfs_link+0xb70/0xb70 [ 255.266119] ? lock_release+0x970/0x970 [ 255.266121] path_openat+0x252a/0x5160 [ 255.266123] ? rcu_softirq_qs+0x20/0x20 [ 255.266126] ? unwind_dump+0x190/0x190 [ 255.266128] ? path_lookupat.isra.43+0xc00/0xc00 [ 255.266131] ? unwind_get_return_address+0x61/0xa0 [ 255.266134] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 255.266136] ? expand_files.part.8+0x571/0x9a0 [ 255.266138] ? iterate_fd+0x4b0/0x4b0 [ 255.266141] ? __alloc_fd+0x347/0x6e0 [ 255.266143] ? lock_downgrade+0x900/0x900 [ 255.266145] ? getname+0x19/0x20 [ 255.266148] ? kasan_check_read+0x11/0x20 [ 255.266151] ? do_raw_spin_unlock+0xa7/0x2f0 [ 255.266153] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 255.266156] ? kasan_check_write+0x14/0x20 [ 255.266158] ? do_raw_spin_lock+0xc1/0x200 [ 255.266161] ? _raw_spin_unlock+0x2c/0x50 [ 255.266163] ? __alloc_fd+0x347/0x6e0 [ 255.266165] do_filp_open+0x255/0x380 [ 255.266168] ? may_open_dev+0x100/0x100 [ 255.266170] ? strncpy_from_user+0x3be/0x510 [ 255.266173] ? digsig_verify+0x1530/0x1530 [ 255.266175] ? get_unused_fd_flags+0x122/0x1a0 [ 255.266178] ? getname_flags+0x26e/0x590 [ 255.266180] do_sys_open+0x568/0x700 [ 255.266182] ? filp_open+0x80/0x80 [ 255.266184] ? __ia32_sys_read+0xb0/0xb0 [ 255.266187] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.266190] __x64_sys_openat+0x9d/0x100 [ 255.266192] do_syscall_64+0x1b9/0x820 [ 255.266195] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.266198] ? syscall_return_slowpath+0x5e0/0x5e0 [ 255.266200] ? trace_hardirqs_on_caller+0x310/0x310 [ 255.266203] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 255.266206] ? recalc_sigpending_tsk+0x180/0x180 [ 255.266208] ? kasan_check_write+0x14/0x20 [ 255.266211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.266214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.266216] RIP: 0033:0x457579 [ 255.266224] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.266227] RSP: 002b:00007fad3a5f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 255.266234] RAX: ffffffffffffffda RBX: 00007fad3a5f9c90 RCX: 0000000000457579 [ 255.266237] RDX: 0000000000003326 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 255.266241] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 255.266260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad3a5fa6d4 [ 255.266264] R13: 00000000004c2b7f R14: 00000000004d41b8 R15: 0000000000000006 [ 255.266265] [ 255.266267] Allocated by task 10108: [ 255.266269] save_stack+0x43/0xd0 [ 255.266272] kasan_kmalloc+0xc7/0xe0 [ 255.266274] __kmalloc+0x14e/0x760 [ 255.266276] ovl_get_index_name_fh+0x57/0x180 [ 255.266278] ovl_get_index_name+0x5c/0x80 [ 255.266281] ovl_lookup_index+0xe4/0x700 [ 255.266283] ovl_lookup+0x9f2/0x29c0 [ 255.266285] lookup_open+0x72e/0x1b90 [ 255.266287] path_openat+0x252a/0x5160 [ 255.266289] do_filp_open+0x255/0x380 [ 255.266291] do_sys_open+0x568/0x700 [ 255.266293] __x64_sys_openat+0x9d/0x100 [ 255.266296] do_syscall_64+0x1b9/0x820 [ 255.266298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.266300] [ 255.266302] Freed by task 8980: [ 255.266304] save_stack+0x43/0xd0 [ 255.266306] __kasan_slab_free+0x102/0x150 [ 255.266308] kasan_slab_free+0xe/0x10 [ 255.266310] kfree+0xcf/0x230 [ 255.266312] put_mountpoint+0x2c2/0x3d0 [ 255.266315] attach_recursive_mnt+0x489/0xb60 [ 255.266317] graft_tree+0x1aa/0x240 [ 255.266319] do_add_mount+0x1fe/0x370 [ 255.266321] do_mount+0x888/0x1d90 [ 255.266323] ksys_mount+0x12d/0x140 [ 255.266325] __x64_sys_mount+0xbe/0x150 [ 255.266328] do_syscall_64+0x1b9/0x820 [ 255.266330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.266332] [ 255.266335] The buggy address belongs to the object at ffff8801b96e6500 [ 255.266338] which belongs to the cache kmalloc-64 of size 64 [ 255.266341] The buggy address is located 58 bytes inside of [ 255.266344] 64-byte region [ffff8801b96e6500, ffff8801b96e6540) [ 255.266347] The buggy address belongs to the page: [ 255.266351] page:ffffea0006e5b980 count:1 mapcount:0 mapping:ffff8801da800340 index:0x0 [ 255.266355] flags: 0x2fffc0000000200(slab) [ 255.266359] raw: 02fffc0000000200 ffffea00071a6dc8 ffffea00071cd808 ffff8801da800340 [ 255.266363] raw: 0000000000000000 ffff8801b96e6000 0000000100000020 0000000000000000 [ 255.266366] page dumped because: kasan: bad access detected [ 255.266367] [ 255.266370] Memory state around the buggy address: [ 255.266374] ffff8801b96e6400: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 255.266377] ffff8801b96e6480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 255.266381] >ffff8801b96e6500: 00 00 00 00 00 00 00 02 fc fc fc fc fc fc fc fc [ 255.266384] ^ [ 255.266388] ffff8801b96e6580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 255.266391] ffff8801b96e6600: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 255.266395] ================================================================== [ 255.266398] Kernel panic - not syncing: panic_on_warn set ... [ 255.266400] [ 255.266404] CPU: 1 PID: 10108 Comm: syz-executor1 Tainted: G B 4.19.0-rc6-next-20181003+ #86 [ 255.266409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.266411] Call Trace: [ 255.266413] dump_stack+0x1d3/0x2c4 [ 255.266416] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.266418] ? lock_downgrade+0x900/0x900 [ 255.266420] panic+0x238/0x4e7 [ 255.266423] ? add_taint.cold.5+0x16/0x16 [ 255.266425] ? print_shadow_for_address+0xb6/0x116 [ 255.266428] ? trace_hardirqs_off+0xaf/0x310 [ 255.266430] kasan_end_report+0x47/0x4f [ 255.266433] kasan_report.cold.9+0x76/0x309 [ 255.266435] ? string+0x298/0x2d0 [ 255.266438] __asan_report_load1_noabort+0x14/0x20 [ 255.266440] string+0x298/0x2d0 [ 255.266442] ? widen_string+0x2e0/0x2e0 [ 255.266445] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 255.266447] vsnprintf+0x48e/0x1b60 [ 255.266449] ? pointer+0x990/0x990 [ 255.266451] ? lock_release+0x970/0x970 [ 255.266454] vscnprintf+0x2d/0x80 [ 255.266456] vprintk_store+0x43/0x510 [ 255.266458] ? do_raw_spin_lock+0xc1/0x200 [ 255.266461] vprintk_emit+0x1c1/0x930 [ 255.266463] ? wake_up_klogd+0x180/0x180 [ 255.266465] ? __lookup_slow+0x312/0x540 [ 255.266468] ? ___ratelimit+0x36f/0x655 [ 255.266470] ? lock_downgrade+0x900/0x900 [ 255.266473] ? trace_hardirqs_on+0xbd/0x310 [ 255.266475] ? kasan_check_read+0x11/0x20 [ 255.266477] ? ___ratelimit+0x36f/0x655 [ 255.266480] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.266483] vprintk_default+0x28/0x30 [ 255.266485] vprintk_func+0x7e/0x181 [ 255.266487] printk+0xa7/0xcf [ 255.266490] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 255.266492] ovl_lookup_index.cold.14+0xe8/0x1f8 [ 255.266495] ? ovl_get_index_fh+0x2d0/0x2d0 [ 255.266497] ? ovl_path_real+0x400/0x400 [ 255.266500] ? ovl_lookup+0x1178/0x29c0 [ 255.266502] ovl_lookup+0x9f2/0x29c0 [ 255.266504] ? ovl_path_next+0x2e0/0x2e0 [ 255.266507] ? d_alloc_parallel+0x1f40/0x1f40 [ 255.266509] ? lookup_open+0x302/0x1b90 [ 255.266512] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.266514] ? __lockdep_init_map+0x105/0x590 [ 255.266517] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 255.266519] ? d_lookup+0x20d/0x300 [ 255.266522] ? __d_lookup+0x9e0/0x9e0 [ 255.266524] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 255.266527] ? ovl_path_next+0x2e0/0x2e0 [ 255.266529] lookup_open+0x72e/0x1b90 [ 255.266531] ? vfs_link+0xb70/0xb70 [ 255.266533] ? lock_release+0x970/0x970 [ 255.266536] path_openat+0x252a/0x5160 [ 255.266538] ? rcu_softirq_qs+0x20/0x20 [ 255.266540] ? unwind_dump+0x190/0x190 [ 255.266543] ? path_lookupat.isra.43+0xc00/0xc00 [ 255.266546] ? unwind_get_return_address+0x61/0xa0 [ 255.266548] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 255.266551] ? expand_files.part.8+0x571/0x9a0 [ 255.266553] ? iterate_fd+0x4b0/0x4b0 [ 255.266556] ? __alloc_fd+0x347/0x6e0 [ 255.266558] ? lock_downgrade+0x900/0x900 [ 255.266560] ? getname+0x19/0x20 [ 255.266563] ? kasan_check_read+0x11/0x20 [ 255.266565] ? do_raw_spin_unlock+0xa7/0x2f0 [ 255.266568] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 255.266570] ? kasan_check_write+0x14/0x20 [ 255.266573] ? do_raw_spin_lock+0xc1/0x200 [ 255.266574] ? _raw_spin_unlo [ 255.266579] Lost 31 message(s)!