0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xfffffffffffffc4e) getgroups(0x1, &(0x7f0000000280)=[0xee01]) modify_ldt$read(0x0, &(0x7f0000000500)=""/151, 0x29adfdf922b8baa7) lchown(&(0x7f00000000c0)='./file0\x00', r1, r2) 18:07:21 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) [ 1102.329650][T10979] FAT-fs (loop1): Directory bread(block 26882) failed [ 1102.356737][T10979] FAT-fs (loop1): Directory bread(block 26883) failed 18:07:21 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) gettid() getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) getgroups(0x6, &(0x7f0000000340)=[0x0, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0x0]) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x4, &(0x7f0000000600)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}], [{@euid_eq={'euid', 0x3d, r4}}, {@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x65, 0x0, 0x7f, 0x65, 0x33, 0x36, 0x61], 0x2d, [0x33, 0x64, 0x77, 0x31], 0x2d, [0x30, 0x31, 0x7d, 0x35], 0x2d, [0x37, 0x63, 0x73, 0x3d], 0x2d, [0x62, 0x35, 0x36, 0x75, 0x0, 0x73, 0x31, 0x66]}}}, {@euid_gt={'euid>', r5}}, {@euid_gt={'euid>', r6}}, {@pcr={'pcr', 0x3d, 0x5}}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 18:07:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x0) 18:07:22 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:07:22 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet(0x10, 0x3, 0xc) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x105000, 0x0) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000080)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x2f3, &(0x7f0000000200)=[{&(0x7f0000000280)="24000000020307031dfffd946ff20c0020200a0009000500021d8568021baba20400ff7e28000000110affff82a3a0aa1c0009d01cc00000000000ce2b087a519529180000000000439dd79922e85fc8009ddc4b408f54e61fcc97d4cfd56684a89ec815aa8309", 0x19}], 0x1, 0x0, 0xb3}, 0x20000) 18:07:22 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) gettid() getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0}, &(0x7f00000001c0)=0x28) r3 = getgid() fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)=0x0) getgroups(0x4, &(0x7f00000003c0)=[0x0, 0xee01, 0xee00, r5]) r8 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="020000479270ab652bcbae1b74df3aec", @ANYRES32=r2, @ANYBLOB="040007000000000008000100", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="10000400000000002000020000000000"], 0x54, 0x3) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x400) 18:07:22 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001003, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) mount$9p_virtio(&(0x7f00000000c0)='\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x200080, &(0x7f0000000180)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}, {@cachetag={'cachetag', 0x3d, 'eth0%%'}}, {@version_L='version=9p2000.L'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise='appraise'}]}}) 18:07:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) ioctl(0xffffffffffffffff, 0x120000890d, &(0x7f0000000200)="9120992eeff7211c02f0a64c83000000001693183943ad7e42de9d786cecf9519ad4ccd8485924c0a7977c4e6fa97e011db6031a12e49ca20ce26295bd094c60a7bd180cb3ea37f4e15d085bbfbbe08f0c8147afcb61215d0a287adb6ad1224481abd82b51aee04b90ffea53f63731d75a238ad4d3a9326a23e52a57") writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100080c1000000000000004fcff", 0x58}], 0x1) r1 = dup(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f00000001c0)=0x28) r3 = getgid() fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)=0x0) getgroups(0x4, &(0x7f00000003c0)=[0x0, 0xee01, 0xee00, r5]) r8 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="020000479270ab652bcbae1b74df3aec", @ANYRES32=r2, @ANYBLOB="040007000000000008000100", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="10000400000000002000020000000000"], 0x54, 0x3) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x400) 18:07:22 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'syz_tun\x00'}}, 0x1e) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_emit_ethernet(0x14, &(0x7f0000000100)={@random="f5b15d93309f", @empty=[0x4788, 0x0, 0x0, 0xd00], [], {@generic={0x8864, "42a703000000"}}}, 0x0) 18:07:22 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000000180)={&(0x7f0000000100)=""/116, 0x74}) recvmmsg(r0, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:07:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) accept4(r0, &(0x7f0000000dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000e40)=0x80, 0x80800) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000e80)={@remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="aab14278a78b13127b64d2136dc790a1", 0x74, 0xfff, 0x6, 0x500, 0x9, 0x0, r1}) r2 = dup(r0) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r3, 0x8007d) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) sendfile(r0, r3, 0x0, 0x2008000fffffffe) 18:07:23 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "5976f34adaea6bc4d06b9020b30280e8"}, 0x11, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/248, 0xf8}, {&(0x7f0000000340)=""/25, 0x19}, {&(0x7f0000000380)=""/17, 0x11}, {&(0x7f00000003c0)=""/126, 0x7e}, {&(0x7f0000000440)=""/74, 0x4a}, {&(0x7f00000004c0)=""/221, 0xdd}], 0x6) fsetxattr(r0, &(0x7f0000000000)=@known='system.advise\x00', &(0x7f0000000040)='%,_\x00', 0x4, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000001b, &(0x7f0000d06000)=0x1, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000140)) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x7f, 0xfe40) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x48000) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000001c0)=0x400, &(0x7f0000000200)=0x2) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18, 0x0, 0x4, {0xa4}}, 0x18) 18:07:23 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff, 0xffffffffffffffff}) socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x5, @remote, 0x1000}, {0xa, 0x4e24, 0xf6d6, @dev={0xfe, 0x80, [], 0x22}, 0x80000003}, 0x0, [0xc2d, 0x1fffffffc0, 0x9, 0x3, 0x2, 0xffffffff, 0x100000000, 0x6]}, 0x5c) getsockopt$inet6_int(r0, 0x28, 0x6, 0x0, &(0x7f0000000040)=0xf) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x120, 0x300) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000180)=0x5) 18:07:23 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x0) 18:07:23 executing program 2 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:23 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x4, 0x20200) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x4e24, @local}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$isdn(r0, &(0x7f00000002c0)={0x2f16, 0x0, "9433cdacb02d91f7185e8d9350188bafdaf8980562cbfc17f1747e753280378969e2b5f0b27a18ae6294400783f7ffbfba5eff70cad6138ef60f2741aaead3b817df49b852cc532a6a4c63badd5f6d174b8e7d0ea60f94bc466116b3aa11802a3cb9c4265b0219d7135fc5d9971bb057ebf250e82d18b9ebd3567637cb1a25ae78df1cc8bec9affd26325ec2198e403b77e97e5592243a318022142e32fff87ccb3eee7407a5917f"}, 0xb0, 0x8000, &(0x7f0000000180)={0x22, 0x80000000, 0x0, 0x4, 0x4}, 0x6) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x2, @in=@loopback, 0x0, 0x4}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) 18:07:23 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:23 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0}, &(0x7f0000000400)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@local, @in6=@rand_addr="dc9e9fbd6080a5b8237da1dfaa1da85f", 0x4e24, 0x8, 0x4e21, 0x1, 0x2, 0x20, 0x0, 0x0, r1, r2}, {0x8, 0xffff, 0xc1, 0x8001, 0x20, 0x9, 0x2, 0x8}, {0x4, 0x2, 0x101, 0x4}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x3}, {{@in=@broadcast, 0x4d6}, 0x2, @in=@local, 0x3500, 0x2, 0x1, 0x3ff, 0x5, 0x7fff, 0xffffffffffffffff}}, 0xe8) 18:07:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:24 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, 0x0, 0x0) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x5, 0x200}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x152ba7c2, 0xffffffffffffff09, 0x3, 0x0, 0x5b, 0x7fff, 0xe898, 0x10000, r1}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:27 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:27 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0x0, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x3, {0x2, 0x4ce, "881f2a9ba8d4c65eb1c6817a227d4727b9bf773b7271166f6dbfb9a271e414d6dae48c99e51be091f4891055e6bae7a110776cf66343881f357197c74e05668e22551703282b024d5397c6c7995a85d230dbdf79d178a4d636f8fb5bd51d055f3a9288621c3311ac2cda125c89735388d07242eb99667ddcdd39bd86e1b6d9dc72b84fd52e4409ba765f3fa08b8b1707c32db60504abbab0e1b34a8340b75ce4df63b8a81d017404cc518080ba07635dab7042e4a83ff088b652b8e1861e507e32cadda823da083c06d3cd265f04a2d7fc9e82d263c3d4f280a86fb8305193525b5ab08b3e7b58ff9c2ecd6ffe90abd7b079eaff3b6ffc49e35a31ebb644b983", 0xc0, 0x0, 0x0, 0x401, 0x800, 0x4, 0x4, 0x1}, r1}}, 0x128) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() mknod(&(0x7f0000000280)='./file0\x00', 0x40, 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) ioctl$FICLONE(r0, 0x40049409, r0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) read$rfkill(r0, &(0x7f0000000240), 0x8) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1004000000016) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/fscreate\x00', 0x2, 0x0) 18:07:28 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) gettid() r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:28 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x400, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x1) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) getpeername(r0, &(0x7f00000000c0)=@x25={0x9, @remote}, &(0x7f0000000140)=0x80) 18:07:28 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000100)='/dev/vhost-vsock\x00') timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:28 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, 0x0, 0x0) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) 18:07:28 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x0, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r4 = dup(r2) getsockopt$netlink(r4, 0x10e, 0x1, &(0x7f0000000100)=""/91, &(0x7f0000000180)=0x5b) capget(&(0x7f0000000080)={0x39980732}, &(0x7f00000000c0)={0x100, 0x7, 0x5, 0x6, 0x5, 0xffffffffffffffff}) timer_settime(r1, 0x1, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1004000000016) 18:07:30 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x2983, 0x200007fd, 0x4000, 0x3, 0x4, 0x9, 0x9, 0x4, 0x6, 0xff}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:30 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) pidfd_send_signal(r2, 0x15, &(0x7f00000000c0)={0x5, 0x1, 0x6}, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:30 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x0, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, 0xd, "782db88a2ef2646c3069518ac5"}, &(0x7f0000000180)=0x15) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r3, 0x80000001, 0xc408}, &(0x7f0000000200)=0xc) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @host}, 0x10) r5 = open(&(0x7f0000000080)='./file0\x00', 0x400, 0x0) openat$cgroup_int(r5, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) connect$vsock_dgram(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:32 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 0: r0 = syz_open_dev$loop(0x0, 0x0, 0x2000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffff9c}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000140)={0x9}, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:32 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, 0x0, 0x0) shmctl$IPC_SET(r2, 0x1, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='user.syz\x00', &(0x7f0000000140)=""/174, 0xae) 18:07:32 executing program 0: syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x28, &(0x7f0000000100)}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x3d) 18:07:32 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:32 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x4ca4, 0x101000) syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x20000) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000440)={0x10000, 0x0, [0x5, 0x1, 0x9, 0x200, 0x6, 0x4, 0xc54, 0x6]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x81}, 0x0, 0x0, &(0x7f0000000200)={0x7ff, 0xf1, 0x0, 0x4}, &(0x7f0000000240)=0x3ffc0000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x762}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r2, r0, 0x0, 0x12, &(0x7f0000000140)='md5sum)vboxnet0/\'\x00', r4}, 0x30) 18:07:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:07:33 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x208, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/215) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = getpgid(0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000340)={r4, r1, 0xffff}) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r6, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r7, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1004000000016) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x80000000, 0x8, 0x82, 0x200, 0x81, 0x0, 0x1000, {0x0, @in6={{0xa, 0x4e24, 0x2, @mcast1, 0x6}}, 0x1000000, 0x8, 0x7fff, 0xb08}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp6_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f00000002c0)={r9, 0xc000, 0x1, 0x1}, 0x10) 18:07:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:33 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x2000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:07:33 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0x0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, 0xf71}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={r3, 0x7fffffff}, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:34 executing program 1: syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x0, 0x2}) 18:07:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400}) 18:07:34 executing program 1: syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:34 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) gettid() r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:34 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9er2}) getsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) tkill(r0, 0x1004000000016) 18:07:35 executing program 0: 18:07:35 executing program 0: 18:07:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x0, 0x2}) 18:07:36 executing program 0: 18:07:36 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) getpgrp(r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) r4 = getegid() mount$fuse(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='fuse\x00', 0x80000, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, '!}keyring\'('}}, {@subj_role={'subj_role', 0x3d, '/dev/vhost-vsock\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'user$.^%&vboxnet1ppp0vmnet0wlan1vboxnet0security&keyring'}}, {@pcr={'pcr', 0x3d, 0x22}}]}}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:36 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000018c0)={0x2, 0x1}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x10000, &(0x7f0000000480)=ANY=[]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/autofs\x00', 0x200, 0x0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000001800)={0x100, "f2b41684ec3fe57407258f8dabcf6f0f294f19b360470e5b3218486b942ebfc1", 0x1}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_buf(r3, 0x0, 0x10, &(0x7f0000002640)="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", 0x1000) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x8000, 0x0) recvfrom$inet(r4, &(0x7f0000000340)=""/4096, 0x1000, 0x2020, &(0x7f00000001c0)={0x2, 0x4e22, @rand_addr=0x1}, 0x10) bind$rxrpc(r4, &(0x7f0000001500)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x1000, @local, 0x7fffffff}}, 0x24) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001440)={'broute\x00', 0x0, 0x4, 0x5e, [], 0x7, &(0x7f0000001340)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000013c0)=""/94}, &(0x7f00000014c0)=0x78) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x401, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000001740), &(0x7f0000001780)=0x4) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000000240)={{0x3f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1, 'wlc\x00', 0x1, 0x8, 0x67}, {@broadcast, 0x4e20, 0x10003, 0x8, 0xfffffffffffffffe, 0x2}}, 0x44) readlinkat(r5, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=""/126, 0x7e) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000001540)={0x0, 0x1, 0x0, 0x9, 0x2, 0x200, 0x6, 0x3, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x7, 0x2d01, 0x55e, 0x0, 0x3}}, &(0x7f0000001600)=0xb0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000001640)={r6, @in6={{0xa, 0x4e20, 0x100000000, @local, 0x24cd}}}, &(0x7f0000001700)=0x84) setsockopt$inet_udp_int(r2, 0x11, 0x66, &(0x7f0000001880)=0x2, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001840)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$KVM_DIRTY_TLB(r5, 0x4010aeaa, &(0x7f00000000c0)={0x3, 0x65}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x0, 0x2}) 18:07:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, 0x0, 0x182) r3 = dup2(r0, r1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, 0x0) 18:07:36 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(0x0, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x3, r3, 0x10, 0x0, @in={0x2, 0x4e24, @rand_addr=0x6}}}, 0xa0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TIOCGSERIAL(r5, 0x541e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/139}) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f0000000080)) prctl$PR_GET_CHILD_SUBREAPER(0x25) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$TIOCCONS(r5, 0x541d) ioctl$sock_bt_cmtp_CMTPCONNADD(r5, 0x400443c8, &(0x7f0000000240)={r5, 0x100}) tkill(r0, 0x1004000000016) 18:07:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400}) 18:07:36 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400}) 18:07:36 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = socket(0x11, 0xa, 0x10002) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(0x0, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffff9c}) bind$rose(r1, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, @null}, 0x1c) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:38 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:38 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r2 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:38 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xc8e, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x56, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) r1 = socket$tipc(0x1e, 0x2, 0x0) r2 = getpgid(0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:38 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(0x0, 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}, 0x80000) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000140)=""/12) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) close(r2) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x1d5) connect$vsock_dgram(r4, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:39 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 18:07:39 executing program 3: syz_open_dev$usbmon(0x0, 0x1, 0x48000) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f00000000c0)=0x4) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000100)=0x100000000) tkill(r0, 0x1004000000016) 18:07:39 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, @empty}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000340)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000440)={@local, 0x800069, r1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000100)=""/125) 18:07:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:40 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 18:07:40 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x208, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/215) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = getpgid(0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000340)={r4, r1, 0xffff}) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r6, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r7, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1004000000016) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x80000000, 0x8, 0x82, 0x200, 0x81, 0x0, 0x1000, {0x0, @in6={{0xa, 0x4e24, 0x2, @mcast1, 0x6}}, 0x1000000, 0x8, 0x7fff, 0xb08}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp6_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f00000002c0)={r9, 0xc000, 0x1, 0x1}, 0x10) 18:07:40 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x2000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0x9, &(0x7f0000000540)=[{&(0x7f0000000100)="f75ce4a7a65408bc36f234436b41a857ed4f3b8bd9ce587e533bfd76f1b05c4a083a92de17f3fc126e28ac1cb76f2ed023f64ed572408ad1b442d090c2327ada94a78d75d3d8436d7a0b2264b8fbed333c77d7cbbd85cffb8d1dcf5bd3c7b95c364f452be99a7a5141e611fa94a9ff395df542b8b7794e776637f599cbc3195b14d70189c86cb24db164104ea374f67c7b0192866bbb5b0848fa6e8694237954521151a9461053d1eef89fdce8b6d6d9b6358d7b9db56e9fd1f8621dc0c906cc5360b8cc87dd5746d3ea2d22794006fb", 0xd0, 0x3f}, {&(0x7f0000000200)="16659f8bb801575eb0594c1074a555d4f956f474d5aebb1c46dc3ca80e443c024cd64db466be8c89fb51358b41d31b0a5c33ffe187", 0x35, 0xba91718}, {&(0x7f0000000240)="42af824cf653a1d4ca4f01e4759d37af98cdfd3c61fbb053fbcd0f78236e476baa070869279027e8111aa48262347767947dc63f442ef04bb7420f864896f42d78fb7542f0b6b15e75d0c42946c49ed00f72b01a007ad9f7d66064f33f0153110574991f8ff0ec7979ffdd28479486afb88e3f72ed0ad2846607e0d17786c64e67dd06704305e95deefdb954a6a00f7e22e9888f6b01862621bb9b8d011cf625a0a6ceb45f6fa5190a6e0cfed0ad83b1344028da0518f4305a02232aea835f2316857ca0d80e084521d22faa35b7f61374e6018c66b6d1f2882eae9266bebf11d1f32e44c7e859e1849beeb03af80ab9df53983dca58d9421f3738", 0xfb, 0x1}, {&(0x7f0000000680)="2c4fd1b21b519c0857f277c0525905dbadc5706a4f44d54b1f55f7832ceb3f5f47451ea73533a2dc1255eb65b0c6e30d385d96de419a6f80b51bc3ec44632f761fa6d214254d305ee8638e04cde661bb66b6eb47a4019a00a99282c417d9cd856361774a831389b57758f051707bbd212c094e5f13e2c84e711eb21848c87f485172edc79e7a11dcdab915e401d170cb95025e76426035baba3e24a22e2d4e7ebc5048c737d66c4da53607535ddc369b3b78b398cd9a5bc226854c4713baa6cd0cebf3602ccc31e4cb90dc3735c3346428f096548a0ad8a83dea063e00f082fb7b2505ba09e3433274bfe537acb8b1addce51ba09e8f6e0039a31fd9ca031cfd14614496ab39fbebbe168ecd5bff6129686d55cd916fd6b3aaf83578f668bfa56665c7c8c8009e225b93fa4c57264233d41df3d9c37b10de8421992868fc9c30c29e1c23683deca50bf7efdef7a1962f57a762b189ebe4afba71b057000f96e3085d0a8c1c6e509be41f2fba74afa7cac2c55d279d7ee1992d9bc637bd1b83c68b5399754724fd6cd1d4522a80dd46468895a0dd1356bc216223500a1279cde60e86b810d5b731f9e30102c3723d9fff98bcca21be0e36d040e5375b646251cfbaca689f12469938eb6d1ad3f7cc49e63ff9f5c6e593d311b64216a2859ca13bd56bf580b2790791fde48b16bd23d90b8ae6278ce12b9fdfbf75dbdb5d4d5e7f613b54c0b9a8fe7bff0951a28afe4445d7197a38c6063b1f15a999edf17284ddc9407c5e12b242055de0b02b8c6a4fc132cd1c98ba512e4db5c252b95e291a71779b054dbb4717fe8fbe19a3e24850356d8cf7f566877424db927f0312fd90c37f28597e0226f43ba2323103b006ea43a979c759d1f2b96ff0dca25ca5b30fee0fe16c925a405af3ee180076fda028bb242131da10b7a5b38895c0978db05366ed5aa9c62a44b5a584f1281df17335339cf9cd5c116fb8da8c65c51a9d3fc3026010064d3547c3ae283037a8d621847dd9092a7c81da950b579e86639c77159a582cc19440f66fadcbcb271774f668373d34e237e1e733c2d02186b9430ca1965bd2ad5e634d784415c7c839b893e899f715d3225a156a24004c50655d31cb5030cb7aa605f7ea06aff2e1cfb026d7adcd5f940668eb5a80f0641fb01b0e66cae63887267cfe84a20d9afafe720fd7f656933ba3dd2a4851a1ae98e4a7fe456497b222a32e6173333a6960db027326f830d4f5ebedd9d99e33d7ab276b70ac51a970418f5970151503eb29fa83e7e7e40b02ba2f0e6b1edf15884169739ad1ea5940459a17fc5cb0aa7773b73824dfab0d500c33b20ef470163548292d87573e90a786eacb610b9cfabc1f3aca440a85c7be37a4cc16e0f149ef68f4c359e80fd0727e72a17f4766dfa9c80640e2bd9d2ff90ad5ebfd18d2d11bd6399141dd76bdf644b8ef12e116c3d3e5f8f7e20b395325f46c6d991db9294d232d9b0963a36460b4e668f44e55921a1f4831a6170b4926915f39d809a049c594666c5261ad19c3df477f707d57647c7adcd3f51af0b10dc569511bde4418e976574cd08f3931ab53f54bdba5475af35023e2eb431c7d11ebe9a96a8089dcd456514d8751ef38ac33089e30de377fe3023792bb31df1ec608fce088becad855a587239d595e7f105076772669ae9e2f2c23b1c3d03e765036ac218c213743297b86b5c8e85ed467ce0f59a64a96a24838f92f18cb00b7580057dc85d1fb799c18c5edda321966335092e4270acf0a4a656595ec140c31024c8f294632d0fb9f4155b69448abf8d9c03419a0a29cc4f939c7acc7757a708b535628a7ec6d7c89ed8238bae56c49597329b3314746e960f5f94f1f873cac8edc36c0fdffa5f3197dbbbf47406f370bbbd256a986d56c70dd095dd4899fe1fcfac02eb2334d79ea35bde9748c75c35e6c28b6c95ff30be1222eeb346a864e05cead0ab600a594ab58ad54ad3b74e7f8b8f0e093712f7bbda3077824351f4fcdb39bf3f9b0cf9b9f941e46f9861717a6ec84fb642acb65d2541797fb94aff1bbb32da0bf770b5c3613d322f72767f199f3650d94bf5ca1a4057efadbc01933ca52bce832457d6d4d70a469dc697470f8e75ac8f29bd4e6a2969badd4be3e1c21635ffd03071f574bb3d80066d76e4d779c648b85f7dd486f56797a963f55fb050c72430e10b9d20c22664f03050521f6751eb83344e6299cc3b7c64240ad2a81fe403f942291355255b953372f57ae2b007db50864de4fbb1fbe9e7de5706941e0a6cf6e7c58f043a96f4b3b4b479626b4e9d310c9f7205fe32da0f4addf9bb7cbd9c1d48289402f0ebd384ed7cee603eb36a2590b92c0b3f38a546cb9859b7957f2c9ea34baf510240f5adad14fe22f14330c7051144b157c671460e93725dc0f3da0d9a843b4dc29a0e72634c65b45b1ff084507d1fead5af5be6513a579dc829dcf8e1d9c30f7f652064bcbf9c566d2f1ecc769c5617085035f9abb873a79f4c8e286bd73298b2aba3906333e4e6d97da8566b1a54e836e659cd0a54dbf8323bef0adbd3a07c3f50c4262f514bdca1465198da4b3010a05527e1a03bd5d224d52a3892fbd834262b191f95ca6e07b13e2684a632cdb9bb8eaa56843605afbba2ac3e8d85f7e9011d653e629de492976fa46720b40512a0a5636c0b5bbd2e97cdd91bf7e46800ee11ce88561f7390fe17f0b091a6cea36285dddbf8b835dc339ac34a1feffab3e6fb3d194dcf090564bae9c4fbfa12bd31982e4e37ab34bdcf043e53fbecbff81d365dba0d6ad969104c506ffcdb424d60a14d452ad83cb29f3bcb508eb9b7d575baea3fadafb9d31cc633141be9959d4ff6e773c6a1bc67902c6ea9c960464f68eccfce6b2d32e26fef02d0d5222457da3c2b6ceb625fa029a3799fc720edc6257915cc33796e7b3e83153af095edf0c42efe7037b28de1086fc975f0b120071ae6f2fe88e74b6457c16443e5d16601ade0f86503779c744da11e66f69bb788e74b8517cd691d8f65f46b0bac520ced4098b6c933c24e3569cba08572cdd4d749059593cc5d6b147073410d5a6a7e344c5a75e28338b78374f21132d9a50be3ff07c940d173aaf5e40eeb4987f4dbbcbfc0e30b705453270fc1b1c18a7b0e4d44264bd302a10d900c6c353af36df2ae3ae745989807265616bc69a89890ee333944363ac219486b7609515c09bab4f71e1af1b5c7f7574f524954d65fcb3a97ee45948498b4c4adaac0e373cb0e21ae05da32de51dd7af3d649ec9d65006fe6f1d8ae9ea94116aab01a37da0ce71bc365715f67069b1726950b8bf714b3a56d55f483ab3fc418fb00172c401246d8286740d09ea6fc9edab0e5f9d01b287a28bd51815b98e86e65f1e60789714b83fe7f41089f7ca9614fbb54ff36df5cce4c4e04cee62a7faeef7bcb548ac0a2de752c60f735dfa23f8ff99abbe40922aea45f557a1bbce13078c19b86b775a75ec762a96e4d86e7135698804d78cf8fdddcda14ff459954f6ea96a438e2859f9daee2b792472ebfdf956dd5783d1f6b7ed0bff96fabb81b98146e076d0b5f573440c907202ef307e57bf63953614c047e9bf24b344f74d10cbc0a4c0e50d072787c300c83dc2fcd7293a1d924df507b063ed4539430393b469b4036b9d968b75dd0984f2dd966e603b5e68b6ac683c4cc817e5fb10d16b07e23fcd81fa7e0aa50e5643d685a5cec2ba9177ec0e5b058963115270f3bcbe9ef0eb9b3b6cef24f804454d8be6cbdf88898197b75deaa6f01b967851d4c08db249fd2c08fffcccd5d826b3c84f698b850a74f4541553bf0b9f96c1f6f702d1b0697516deea1c56f344c9547ba7d8349657e19d0027d533d204612f7b13bb6a466795af38bf9cadc7d2e7590ee2317e78a50b64729bba05a66d6b4884b6ea499d44018bee2c2979d9fbb3b35ebe2d47f9f0d167f4a46b05b3b23488257f1929dfdd98ae182eb6617c12e6cd556a493c8080c8dbc1d98dbeebfcc928bef868d3d6d7f0fe714284d4319312619fc2c375f815d57a9df427a46fa8724ce89ffe2af4179cf37d7748148bbda9c700588f46e0fd07d51be7f632b423f3af8c2010f2199d67a0ae28bf3d206ac1b47f5611946ddc54896412bdf5236722d036767add4a338a2414582c5b622773ac6fc13e72001b99b5ec794a3623aa386fee7c4cab1a360ce7b95539c1419114a4cbe167cbbe5b77d5b3df9ca3f87e19e16935355f1af5764215973c8e72b9f972b873dd517e411ce5a3a6b569918bb33447708a2b6d7061c0ac1fa5e8edf8347abce2b00e429cdeac492ebf53641ef10a55198d404e860a89d36cfee1f22adccb6dfeee8a5f49659d85a526b43f49b436c2af0098ab29eb0c6ae9328799da27424d31e465cc2cb5478142383cc23d92a95b5a437df73ef64b4b53e99ae97b39e54fd7d07d81b47b322a91388ffd4be15d0bf7a59f12a0a1c7ba28ef1eb97824bcec4f1ce81b54bafaeea4306fa10daffaf883e9c5fe22dfbf27fa9d33d32cec15adcde4da19a89c41d17c9578247a0c6ebc402d455540e81baf6a84f04579ee0ef4944b0f65acadf8f5145bc32553e48498889f05bbaaf7b341a20494a83dcca4c73515bee89c8c2e9f003e2da909324b467900909b7c6e25e4a0728a42b73e7c84b1fc0f36e264b5d600deb18783ba2a71bfb36178b8b2bc966585b2982d726cb22e4e239830230ab0a89fd0e6535958de286834f2f4f99e5c2252ed8727a2c219f32d783eb68d5ea724efd8f50423acf8387a81aacdb7a474abbc113775f1f16788a13d6dc8a6eaefb6589d4d1e045e656901af5a1a639460e0f3b4a1e31837c855342520da7c62a048e7da1a82a0e3b55522f3bf0c522c3c72796103b36f4fbcbcf9e1dbd39d7db34e9f0cdb4679d4b5abf7d9f2b69c19b919902135ce410cc64c860d435c150403a69d381439297a2e058665accd4c5c21b5517b2de60864dba91c0de110335bc5ff9827fccb0d031a42125ff273c0a087cb5ca0541cb5a10c85eb01ab34325a9e2fd796357a262df9d05c164542c91d0b0fc120429b27860cd88b72bcf08d669c33097d31b10edca2e88d69190e7239a2ed36128adfc511cbbc7ae6750fd99c44128ce3783b5bea33a31f9be8a0773a7e4c0cdcd1297fe08ea947bd1e887a01d333fe202f2880460af5c9f0c378527957ee974bc72ae9715c53f460f8c0b7e939879533fe551adbe6c8eedf4f0ce6e64cd2cf80b542c5ed1499baee1f7553d36f74ae3b9f965ccbaa0039f020d11fe8d09de88888152bc9ac8529798e6de8c6abf1a88e6c172b4d046cec98ade423d02cf2c456b039f516ca4beda2b967c73b015125f388dde000e8c56f1a2fc1cf5a5662326b53e8e1bbd0ff1c2c088eb5921d1c43801b608b72e13acb40419450e2c5221f1c1023891ac144dfc2c3f33bbf3266d3e7742720bf0eabde461cb3a3cf08a0c8b2bafd55d611b7a67605a53d1239e01ae01bbc2b0c8acc4c1563e334be3cb79dce9bb7b8df9b2fb2557d4d564d3a5cfe94608b54f09f420abf75d145106758e6964da295327459186220e7820322f6bf7e9e2182c79ac487e655f15e140c8b751d5aa01833cf14402d96dd6b8e0b3babc484d8eebe268f1b64bcd71ac87e2b86e6b19087c4544c3ea6b9c6bc0f9f293a36a68c739032ad358393f10249a79fa64a72844ef3a238910d732a47c41813cddfd9511caa6bec3eadae0b9304ae7ab329a6f82c9dbce1a74aeecc3f83a9f56f0eb1cdbd9666c7d80fe2", 0x1000, 0xd90f}, {&(0x7f0000000340)="be68470e9c57985488625b3455399eb81f47a98c8f104f5d7484e100cd7c8bfb692bb8c057500f69cea0c7c57dc8007018241699eac646c4dd95816efdd15e379176cef84a953ed3ed134dd249c1e4b1b0f7", 0x52, 0x9}, {&(0x7f00000003c0)="fc7d402f881260c92ab4c7af0237e14471d618485c7e371b01c23271932125f05809495e63324e8315abfcf62f8ea226986fee58b68a4cd6eeaf29cd0d17e9db18177cee03b87d686d4c3aed36d9edfc7d4bb60f31d792b91e3c021f0b", 0x5d, 0x8}, {&(0x7f0000001680)="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", 0x1000, 0x336bb7d5}, {&(0x7f0000000440)="f872315864a60dea7bc090e41301131eff21f407d7a85c646e0a124c2fbeafccbfd6295d9860868217df8000afff4771234346d379907c2b59065cd153482d2b7e69440b566454c60b", 0x49, 0x7}, {&(0x7f00000004c0)="8857e048aa46ba6393f484bc70f13433e207821b154c5fa1d72f18a4088dccea3abac6336a831171a41dfcfe9c86654c62241fb4822dfd45879b0962c4c7e46f2f8f67b2d13cff3f46792fb29561632091835c68936b5a8c6844a9f232fbc43e291536bffe61dd9a09db92", 0x6b}], 0x2100000, &(0x7f0000002680)='*\x00') timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:40 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 18:07:40 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000180)={0x7, 0x4b, 0x1}, 0x7) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x10002e, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x240001, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000200)={0x0, 0x7530}, 0x4) 18:07:40 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0xfffffffffffffffd}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000280)={r5, 0x9, 0x100000001, 0x6}, &(0x7f00000002c0)=0x10) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f00000000c0)={0x1, 0x3f, 0xfffffffffffffff8, 0x0, 0x4, 0x5}) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000200)=r2) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r6, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) write$P9_ROPEN(r6, &(0x7f0000000240)={0x18, 0x71, 0x1, {{0x83, 0x4, 0x6}, 0x20abe36b}}, 0x18) ioctl$VIDIOC_S_PARM(r4, 0xc0cc5616, &(0x7f0000000680)={0xc, @capture={0x1000, 0x1, {0x0, 0x2}, 0x80, 0x400}}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8000, 0x28) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) tkill(r2, 0x1004000000016) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xaea) 18:07:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 18:07:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) 18:07:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:47 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x302, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000240)=""/252, &(0x7f00000001c0)=0xfc) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x20000) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000140)={r2, 0x0, 0xfffffffff0000000}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/current\x00', 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:47 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0xc0008, &(0x7f0000000680)=ANY=[@ANYBLOB="7472616e733d7463702c706f7201000000000000003030303030303030346532312c64666c746769643d", @ANYRESHEX=r4, @ANYBLOB="2c6163636559733d636c69656e742c6163636573733d7d7365722c616669643d3078303030303030303030303030303030362c6163636507003d757365722c6163636573733d0635328c1533b2f90fc99ad3ca2b4c3782fa162ceaa6881df1d92f789bc192223aebc06eebc5a029946e5e96214fdae3205f65a61d71d59dcf9520bc4b3c2a5f4a7b02e4d38076d093ca1c1f9429f162fae8813c6fd32d0e3831044ff46e4a4a171256f51dfbd92e1f7fc7ef3ceb23446f90bee12221c89500facd3a7daa570e0aaaecc92cf93dc0914c89c23738005048cfdb9e84b3932f93cfbf007d", @ANYRESDEC=r5, @ANYBLOB=',privport,privport,smackfstransmute=/dev/cachefiles\x00,hash,\x00']) 18:07:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) 18:07:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) 18:07:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x0, 0x2}) 18:07:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) 18:07:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) 18:07:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x0, 0x2}) 18:07:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000140)={0x6, 0x5, {0x0, 0x0, 0x4, {0x3ff, 0x8000}, {0x7, 0x2f}, @rumble={0x4, 0x3590}}, {0x56, 0x3, 0x6, {0xa460, 0x2}, {0xffff, 0x401}, @rumble={0x5, 0x9}}}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$llc(r2, &(0x7f00000001c0)={0x1a, 0x30f, 0xffff, 0x6710, 0x80000001, 0x14b9, @random="6f92578a8608"}, 0x10) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x39) 18:07:48 executing program 4: setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x100032, 0x0) 18:07:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) 18:07:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) 18:07:48 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'tunl0\x00', r2}) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r4 = msgget(0x2, 0x621) msgrcv(r4, &(0x7f0000000080)={0x0, ""/132}, 0x8c, 0x1, 0x800) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) close(r0) 18:07:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:50 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, 0x7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x6}, &(0x7f0000000200)=0x8) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000240)={0x7}, 0x4) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, &(0x7f00000000c0)={0xc27f, 0x3}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 18:07:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'tunl0\x00', r2}) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r4 = msgget(0x2, 0x621) msgrcv(r4, &(0x7f0000000080)={0x0, ""/132}, 0x8c, 0x1, 0x800) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) close(r0) 18:07:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 18:07:50 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0}, &(0x7f0000000100)=0xc) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0x0, 0x7, {}, {}, {0x4, 0x5, 0x8, 0xd}, 0x1, @canfd={{0x4, 0x53db, 0xfff, 0x800}, 0x1e, 0x3, 0x0, 0x0, "1a993b49e8d91dda3a73f9cfe15d1f510945c5dd9b288df71f71e94c03d9a2dc417e04aef776ca781e796764accb564a2c2c220b098f1da77cba9525bfdee6f1"}}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1004000000016) 18:07:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2040, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xb7c8, 0x2) connect$vsock_dgram(r2, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x6, @rand_addr="6708295a6988e63b22286bd04f806687", 0x357}, @in6={0xa, 0x4e24, 0xa7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e21, 0x4, @rand_addr="788673a5d083c5a04f81296e9f52ae71", 0x100}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x0, @mcast1, 0x4}, @in6={0xa, 0x4e20, 0x3, @mcast2, 0x1}], 0xc8) getpgrp(r0) tkill(r0, 0x80001b) 18:07:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:52 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r4 = gettid() getpgid(r4) connect$bt_l2cap(r0, 0x0, 0x0) shmctl$IPC_SET(r2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)="c99d74", 0x3}], 0x1}, 0x20000004) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) 18:07:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000100)='/dev/vhost-vsock\x00') timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:52 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1134.764560][T23143] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1134.773226][T23143] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1134.781195][T23143] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1134.789162][T23143] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1134.797138][T23143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 18:07:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) close(r0) [ 1134.805115][T23143] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:07:54 executing program 3 (fault-call:1 fault-nth:1): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:54 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$xdp(0x2c, 0x3, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x800, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0x7, {0x1, 0x2, 0x4, 0x10001}, {0x8, 0x8364, 0x7, 0x4}, {0x400, 0x5}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x55) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000040)={0x0, 0x8001, 0xff, 0x10000, 0x1, 0x9}) 18:07:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) close(r0) [ 1135.057105][T23162] FAULT_INJECTION: forcing a failure. [ 1135.057105][T23162] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.071304][T23162] CPU: 0 PID: 23162 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #87 [ 1135.079485][T23162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.089553][T23162] Call Trace: [ 1135.092871][T23162] dump_stack+0x172/0x1f0 [ 1135.097231][T23162] should_fail.cold+0xa/0x15 [ 1135.101941][T23162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1135.107771][T23162] ? ___might_sleep+0x163/0x280 [ 1135.112643][T23162] __should_failslab+0x121/0x190 [ 1135.117635][T23162] should_failslab+0x9/0x14 [ 1135.122156][T23162] kmem_cache_alloc_trace+0x2d1/0x760 [ 1135.127898][T23162] do_blk_trace_setup+0x171/0xb90 [ 1135.132943][T23162] __blk_trace_setup+0xe3/0x190 [ 1135.137819][T23162] ? do_blk_trace_setup+0xb90/0xb90 [ 1135.143041][T23162] ? disk_name+0xae/0x110 [ 1135.147396][T23162] blk_trace_ioctl+0x170/0x300 [ 1135.152193][T23162] ? blk_add_trace_rq_remap+0x4d0/0x4d0 18:07:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) close(r0) [ 1135.157750][T23162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.164002][T23162] ? tomoyo_domain+0xc5/0x160 [ 1135.168702][T23162] blkdev_ioctl+0x276/0x1d10 [ 1135.173301][T23162] ? blkpg_ioctl+0xa90/0xa90 [ 1135.177902][T23162] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1135.183739][T23162] ? ___might_sleep+0x163/0x280 [ 1135.188612][T23162] block_ioctl+0xee/0x130 [ 1135.192945][T23162] ? blkdev_fallocate+0x410/0x410 [ 1135.197985][T23162] do_vfs_ioctl+0xd6e/0x1390 [ 1135.202596][T23162] ? ioctl_preallocate+0x210/0x210 [ 1135.207825][T23162] ? selinux_file_mprotect+0x620/0x620 [ 1135.213397][T23162] ? __fget+0x381/0x550 [ 1135.217587][T23162] ? ksys_dup3+0x3e0/0x3e0 [ 1135.222044][T23162] ? tomoyo_file_ioctl+0x23/0x30 [ 1135.227088][T23162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.233343][T23162] ? security_file_ioctl+0x93/0xc0 [ 1135.238484][T23162] ksys_ioctl+0xab/0xd0 [ 1135.242669][T23162] __x64_sys_ioctl+0x73/0xb0 [ 1135.247284][T23162] do_syscall_64+0x103/0x610 [ 1135.251891][T23162] entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:07:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(0xffffffffffffffff) [ 1135.257797][T23162] RIP: 0033:0x458da9 [ 1135.261696][T23162] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1135.281840][T23162] RSP: 002b:00007ff04e240c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1135.290356][T23162] RAX: ffffffffffffffda RBX: 00007ff04e240c90 RCX: 0000000000458da9 [ 1135.298342][T23162] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1135.306594][T23162] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1135.314582][T23162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04e2416d4 [ 1135.322593][T23162] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 [ 1135.332311][T23163] FAULT_INJECTION: forcing a failure. [ 1135.332311][T23163] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.364137][T23163] CPU: 1 PID: 23163 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1135.372183][T23163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.382434][T23163] Call Trace: [ 1135.385850][T23163] dump_stack+0x172/0x1f0 [ 1135.390553][T23163] should_fail.cold+0xa/0x15 [ 1135.395140][T23163] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1135.400945][T23163] ? ___might_sleep+0x163/0x280 [ 1135.405807][T23163] __should_failslab+0x121/0x190 [ 1135.410800][T23163] should_failslab+0x9/0x14 [ 1135.415294][T23163] kmem_cache_alloc+0x2b2/0x6f0 [ 1135.420159][T23163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.427022][T23163] ? debug_smp_processor_id+0x3c/0x280 [ 1135.432501][T23163] __d_alloc+0x2e/0x8c0 [ 1135.436669][T23163] d_alloc+0x4d/0x2b0 [ 1135.441050][T23163] ? avc_has_perm_noaudit+0x38f/0x570 [ 1135.446419][T23163] d_alloc_parallel+0xf4/0x1bc0 [ 1135.451350][T23163] ? lock_downgrade+0x880/0x880 [ 1135.456216][T23163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.462482][T23163] ? __lock_acquire+0x548/0x3fb0 [ 1135.467426][T23163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.473658][T23163] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1135.478497][T23163] ? lockdep_init_map+0x1be/0x6d0 [ 1135.483506][T23163] ? lockdep_init_map+0x1be/0x6d0 [ 1135.488552][T23163] __lookup_slow+0x1ab/0x500 [ 1135.493136][T23163] ? vfs_unlink+0x560/0x560 [ 1135.497640][T23163] lookup_slow+0x58/0x80 [ 1135.501864][T23163] lookup_one_len_unlocked+0xf6/0x100 [ 1135.507216][T23163] ? lookup_slow+0x80/0x80 [ 1135.511638][T23163] debugfs_lookup+0x54/0x110 [ 1135.516221][T23163] do_blk_trace_setup+0x230/0xb90 [ 1135.521236][T23163] __blk_trace_setup+0xe3/0x190 [ 1135.526068][T23163] ? do_blk_trace_setup+0xb90/0xb90 [ 1135.531254][T23163] ? disk_name+0xae/0x110 [ 1135.535611][T23163] blk_trace_ioctl+0x170/0x300 [ 1135.540363][T23163] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1135.545891][T23163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.552119][T23163] ? tomoyo_domain+0xc5/0x160 [ 1135.556803][T23163] blkdev_ioctl+0x276/0x1d10 [ 1135.561397][T23163] ? blkpg_ioctl+0xa90/0xa90 [ 1135.565989][T23163] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1135.571788][T23163] ? ___might_sleep+0x163/0x280 [ 1135.576628][T23163] block_ioctl+0xee/0x130 [ 1135.580937][T23163] ? blkdev_fallocate+0x410/0x410 [ 1135.585973][T23163] do_vfs_ioctl+0xd6e/0x1390 [ 1135.590560][T23163] ? ioctl_preallocate+0x210/0x210 [ 1135.595654][T23163] ? selinux_file_mprotect+0x620/0x620 [ 1135.601093][T23163] ? __fget+0x381/0x550 [ 1135.605235][T23163] ? ksys_dup3+0x3e0/0x3e0 [ 1135.609657][T23163] ? tomoyo_file_ioctl+0x23/0x30 [ 1135.614589][T23163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.620838][T23163] ? security_file_ioctl+0x93/0xc0 [ 1135.625932][T23163] ksys_ioctl+0xab/0xd0 [ 1135.630432][T23163] __x64_sys_ioctl+0x73/0xb0 [ 1135.635031][T23163] do_syscall_64+0x103/0x610 [ 1135.639612][T23163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.645488][T23163] RIP: 0033:0x458da9 [ 1135.649553][T23163] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1135.669152][T23163] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1135.677552][T23163] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1135.685527][T23163] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1135.693659][T23163] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1135.701612][T23163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1135.709564][T23163] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:07:56 executing program 4 (fault-call:1 fault-nth:1): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(0xffffffffffffffff) 18:07:56 executing program 3 (fault-call:1 fault-nth:2): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:56 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f00000000c0)=""/58) ioctl(r2, 0x1, &(0x7f00000002c0)="1bdc43afe2bd1aeb7ba7986ba62ab220503b0dcf4f298a7bee23faf0d2ad98602ce0ab1673330fa60983815ba5551740ec449c85dc42a4773b71b64266b5a8f141339158b8a0ab867642c8aaeb0301c88af33879218f043f2ec0b9af2f884978896296ffef949e4335e239ad522ed0527a0b0aef66f89f9172d42952af01bab9d6c57b8195d7e17cd0087ecc1e32") connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="0a605fd5a4ef19f79dd20d4b57c49698f5a4e5f8dbb5cc51c96e548746ef069efee4cb08b4751982a45f2906a1a7960874f11cda9252fc3c472337f55a53d8bcd1b3ec3cd1b6d0bc76e8ede41e8d85738ebfd3913abebc9bd267eb3f13376a70762ff37df9aa54dc99c4cb637882526b2a46490aad013fe587b694ff14551d28224908869ef3c3bf068d7664d4598705c6186f70b3fea9b39074f0b8f462730d86d681beb7712292b2cd9295d0eb7ba54569b8dad5aad93d74d701e31469", 0xbe, 0x4}, {&(0x7f0000000240)="d253511c11c0cc39ef44695a37084dad538353494cb7b877ef044b229fd20f785972", 0x22}], 0x40, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xb0, r4, 0x710, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffff2820}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5e}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) tkill(r0, 0x1004000000016) 18:07:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) fcntl$notify(r0, 0x402, 0x30) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x42) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xef, 0x20441) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x40, 0xfffffffffffffffb, 0x8, 0x3ff, 0x1, 0x5}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x4e20, @multicast2}, {0x7, @broadcast}, 0x8, {0x2, 0x4e23, @multicast1}, 'ip6erspan0\x00'}) close(r0) [ 1137.525332][T23184] FAULT_INJECTION: forcing a failure. [ 1137.525332][T23184] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.568375][T23184] CPU: 0 PID: 23184 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1137.576419][T23184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.586494][T23184] Call Trace: [ 1137.589808][T23184] dump_stack+0x172/0x1f0 [ 1137.594162][T23184] should_fail.cold+0xa/0x15 [ 1137.598773][T23184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1137.604602][T23184] ? ___might_sleep+0x163/0x280 [ 1137.609470][T23184] __should_failslab+0x121/0x190 [ 1137.614433][T23184] should_failslab+0x9/0x14 [ 1137.618951][T23184] kmem_cache_alloc+0x2b2/0x6f0 [ 1137.623816][T23184] __d_alloc+0x2e/0x8c0 [ 1137.627984][T23184] d_alloc+0x4d/0x2b0 [ 1137.631984][T23184] d_alloc_parallel+0xf4/0x1bc0 [ 1137.636863][T23184] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1137.641721][T23184] ? __d_lookup+0x40c/0x760 [ 1137.646244][T23184] ? lockdep_init_map+0x1be/0x6d0 [ 1137.651292][T23184] ? lockdep_init_map+0x1be/0x6d0 [ 1137.656336][T23184] __lookup_slow+0x1ab/0x500 [ 1137.660937][T23184] ? vfs_unlink+0x560/0x560 18:07:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x400, 0x4) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioprio_set$uid(0x3, r4, 0xffffffffffffffc0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 18:07:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(0xffffffffffffffff) [ 1137.665467][T23184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1137.670769][T23184] ? d_lookup+0x19e/0x260 [ 1137.675143][T23184] lookup_one_len+0x16d/0x1a0 [ 1137.680183][T23184] ? lookup_one_len_unlocked+0x100/0x100 [ 1137.685853][T23184] start_creating+0xbf/0x1e0 [ 1137.690469][T23184] debugfs_create_dir+0x26/0x3d0 [ 1137.695944][T23184] do_blk_trace_setup+0x7d5/0xb90 [ 1137.701011][T23184] __blk_trace_setup+0xe3/0x190 [ 1137.705886][T23184] ? do_blk_trace_setup+0xb90/0xb90 [ 1137.711244][T23184] ? disk_name+0xae/0x110 [ 1137.715614][T23184] blk_trace_ioctl+0x170/0x300 [ 1137.720412][T23184] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1137.726932][T23184] ? lock_downgrade+0x880/0x880 [ 1137.731806][T23184] ? tomoyo_domain+0xc5/0x160 [ 1137.736530][T23184] blkdev_ioctl+0x276/0x1d10 [ 1137.741141][T23184] ? blkpg_ioctl+0xa90/0xa90 [ 1137.745873][T23184] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1137.751715][T23184] ? ___might_sleep+0x163/0x280 [ 1137.756623][T23184] block_ioctl+0xee/0x130 [ 1137.760985][T23184] ? blkdev_fallocate+0x410/0x410 18:07:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x3f) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0x800, 0x4) close(r0) [ 1137.766040][T23184] do_vfs_ioctl+0xd6e/0x1390 [ 1137.770664][T23184] ? ioctl_preallocate+0x210/0x210 [ 1137.775830][T23184] ? selinux_file_mprotect+0x620/0x620 [ 1137.781318][T23184] ? __fget+0x381/0x550 [ 1137.785507][T23184] ? ksys_dup3+0x3e0/0x3e0 [ 1137.789959][T23184] ? tomoyo_file_ioctl+0x23/0x30 [ 1137.794921][T23184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1137.801185][T23184] ? security_file_ioctl+0x93/0xc0 [ 1137.806327][T23184] ksys_ioctl+0xab/0xd0 [ 1137.810595][T23184] __x64_sys_ioctl+0x73/0xb0 [ 1137.818166][T23184] do_syscall_64+0x103/0x610 [ 1137.826284][T23184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.832225][T23184] RIP: 0033:0x458da9 [ 1137.836138][T23184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1137.857335][T23184] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:07:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8002, 0x0) getsockname$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000016) 18:07:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2002, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000040)={0x8, 0x3f, 0xffffffffffffff7f, 0x200}) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) [ 1137.865773][T23184] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1137.873758][T23184] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1137.881761][T23184] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1137.889753][T23184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1137.897743][T23184] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 [ 1137.935089][T23186] FAULT_INJECTION: forcing a failure. [ 1137.935089][T23186] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.978259][T23186] CPU: 1 PID: 23186 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #87 [ 1137.986303][T23186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.996375][T23186] Call Trace: [ 1137.999689][T23186] dump_stack+0x172/0x1f0 [ 1138.004093][T23186] should_fail.cold+0xa/0x15 [ 1138.008716][T23186] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1138.015518][T23186] ? ___might_sleep+0x163/0x280 [ 1138.020753][T23186] __should_failslab+0x121/0x190 18:07:57 executing program 3 (fault-call:1 fault-nth:3): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1138.026068][T23186] should_failslab+0x9/0x14 [ 1138.030608][T23186] kmem_cache_alloc+0x2b2/0x6f0 [ 1138.035500][T23186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.041859][T23186] ? debug_smp_processor_id+0x3c/0x280 [ 1138.047366][T23186] __d_alloc+0x2e/0x8c0 [ 1138.051553][T23186] d_alloc+0x4d/0x2b0 [ 1138.055744][T23186] ? avc_has_perm_noaudit+0x38f/0x570 [ 1138.061328][T23186] d_alloc_parallel+0xf4/0x1bc0 [ 1138.066282][T23186] ? lock_downgrade+0x880/0x880 [ 1138.071406][T23186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.077646][T23186] ? __lock_acquire+0x548/0x3fb0 [ 1138.082596][T23186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.088851][T23186] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1138.093715][T23186] ? lockdep_init_map+0x1be/0x6d0 [ 1138.098743][T23186] ? lockdep_init_map+0x1be/0x6d0 [ 1138.103783][T23186] __lookup_slow+0x1ab/0x500 [ 1138.108389][T23186] ? vfs_unlink+0x560/0x560 [ 1138.112937][T23186] lookup_slow+0x58/0x80 [ 1138.117203][T23186] lookup_one_len_unlocked+0xf6/0x100 [ 1138.122580][T23186] ? lookup_slow+0x80/0x80 [ 1138.127002][T23186] debugfs_lookup+0x54/0x110 [ 1138.131600][T23186] do_blk_trace_setup+0x230/0xb90 [ 1138.136623][T23186] __blk_trace_setup+0xe3/0x190 [ 1138.141477][T23186] ? do_blk_trace_setup+0xb90/0xb90 [ 1138.146681][T23186] ? disk_name+0xae/0x110 [ 1138.151007][T23186] blk_trace_ioctl+0x170/0x300 [ 1138.155853][T23186] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1138.161403][T23186] ? lock_downgrade+0x880/0x880 [ 1138.166269][T23186] ? tomoyo_domain+0xc5/0x160 [ 1138.170960][T23186] blkdev_ioctl+0x276/0x1d10 [ 1138.175539][T23186] ? blkpg_ioctl+0xa90/0xa90 [ 1138.180131][T23186] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1138.185946][T23186] ? ___might_sleep+0x163/0x280 [ 1138.190790][T23186] block_ioctl+0xee/0x130 [ 1138.195107][T23186] ? blkdev_fallocate+0x410/0x410 [ 1138.200140][T23186] do_vfs_ioctl+0xd6e/0x1390 [ 1138.204740][T23186] ? ioctl_preallocate+0x210/0x210 [ 1138.209873][T23186] ? selinux_file_mprotect+0x620/0x620 [ 1138.215325][T23186] ? __fget+0x381/0x550 [ 1138.219512][T23186] ? ksys_dup3+0x3e0/0x3e0 [ 1138.223946][T23186] ? tomoyo_file_ioctl+0x23/0x30 [ 1138.228890][T23186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.235248][T23186] ? security_file_ioctl+0x93/0xc0 [ 1138.240369][T23186] ksys_ioctl+0xab/0xd0 [ 1138.244527][T23186] __x64_sys_ioctl+0x73/0xb0 [ 1138.249120][T23186] do_syscall_64+0x103/0x610 [ 1138.253710][T23186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.259605][T23186] RIP: 0033:0x458da9 [ 1138.263594][T23186] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1138.283191][T23186] RSP: 002b:00007ff04e240c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1138.291609][T23186] RAX: ffffffffffffffda RBX: 00007ff04e240c90 RCX: 0000000000458da9 [ 1138.299652][T23186] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1138.307624][T23186] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1138.315594][T23186] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04e2416d4 [ 1138.323912][T23186] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:07:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) fcntl$notify(r0, 0x402, 0x30) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x42) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xef, 0x20441) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x40, 0xfffffffffffffffb, 0x8, 0x3ff, 0x1, 0x5}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x4e20, @multicast2}, {0x7, @broadcast}, 0x8, {0x2, 0x4e23, @multicast1}, 'ip6erspan0\x00'}) close(r0) 18:07:57 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1138.740556][T23262] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:07:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfff, 0x600000) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000000c0)=0x4) timer_create(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x200000012}, &(0x7f0000044000)) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={r4, 0x80, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x6, @mcast1, 0x4}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e20, 0x800, @mcast1, 0x80000001}, @in6={0xa, 0x4e22, 0x7fff, @mcast2, 0x101}, @in6={0xa, 0x4e21, 0x9, @mcast2}]}, &(0x7f0000000280)=0x10) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0xa, 0x3, 0xa, 0x2}) tkill(r1, 0x1004000000016) [ 1138.748977][T23262] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1138.756965][T23262] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1138.764960][T23262] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1138.772938][T23262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1138.780899][T23262] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:07:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:58 executing program 3 (fault-call:1 fault-nth:4): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x800, 0x48081) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}}) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f00000001c0)={0x4, 0x20}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x3ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x6}, 0x8) close(r1) r4 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r4, &(0x7f0000000200)) [ 1139.037664][T23334] FAULT_INJECTION: forcing a failure. [ 1139.037664][T23334] name failslab, interval 1, probability 0, space 0, times 0 18:07:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x301, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1139.134630][T23334] CPU: 0 PID: 23334 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1139.142658][T23334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.152746][T23334] Call Trace: [ 1139.156075][T23334] dump_stack+0x172/0x1f0 [ 1139.160436][T23334] should_fail.cold+0xa/0x15 [ 1139.165061][T23334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1139.170903][T23334] ? ___might_sleep+0x163/0x280 [ 1139.175786][T23334] __should_failslab+0x121/0x190 [ 1139.180768][T23334] should_failslab+0x9/0x14 [ 1139.185304][T23334] kmem_cache_alloc+0x2b2/0x6f0 [ 1139.190250][T23334] ? __put_user_ns+0x70/0x70 [ 1139.195059][T23334] ? alloc_inode+0xb8/0x190 [ 1139.199610][T23334] security_inode_alloc+0x39/0x160 [ 1139.205614][T23334] inode_init_always+0x56e/0xb50 [ 1139.210576][T23334] alloc_inode+0x83/0x190 [ 1139.215042][T23334] new_inode_pseudo+0x19/0xf0 [ 1139.219922][T23334] new_inode+0x1f/0x40 [ 1139.224293][T23334] debugfs_get_inode+0x1a/0x130 [ 1139.229263][T23334] debugfs_create_dir+0x7a/0x3d0 18:07:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000080)={0x0, 0x7, 0x8, 0xfff, 'syz1\x00', 0x100000001}) 18:07:58 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1dc00000000, 0xb2, 0x538f, 0x80000000, 0x0, 0x9, 0x1, 0x1, 0x7, 0x5, 0x10001, 0x40, 0x4, 0x0, 0xfff, 0x9, 0x2, 0x4, 0x0, 0x81, 0xff, 0x5, 0x8001, 0x200, 0xba64, 0x37f, 0xb5, 0x1, 0x100000001, 0x3ff, 0x3, 0x6, 0x2, 0xd517, 0x82f, 0x1c42000000, 0x0, 0x100000000, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8010, 0x5d1f, 0x7ee8, 0x6, 0x7ff, 0x194000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(0x0, r1, 0xe, r0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) accept4$llc(r2, 0x0, &(0x7f0000000040), 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r3) 18:07:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x125d, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1139.234271][T23334] do_blk_trace_setup+0x7d5/0xb90 [ 1139.239507][T23334] __blk_trace_setup+0xe3/0x190 [ 1139.244381][T23334] ? do_blk_trace_setup+0xb90/0xb90 [ 1139.249608][T23334] ? disk_name+0xae/0x110 [ 1139.254095][T23334] blk_trace_ioctl+0x170/0x300 [ 1139.258909][T23334] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1139.264738][T23334] ? lock_downgrade+0x880/0x880 [ 1139.269615][T23334] ? tomoyo_domain+0xc5/0x160 [ 1139.274337][T23334] blkdev_ioctl+0x276/0x1d10 [ 1139.279084][T23334] ? blkpg_ioctl+0xa90/0xa90 [ 1139.283684][T23334] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1139.289544][T23334] ? ___might_sleep+0x163/0x280 [ 1139.294505][T23334] block_ioctl+0xee/0x130 [ 1139.298845][T23334] ? blkdev_fallocate+0x410/0x410 [ 1139.298867][T23334] do_vfs_ioctl+0xd6e/0x1390 [ 1139.298886][T23334] ? ioctl_preallocate+0x210/0x210 [ 1139.298900][T23334] ? selinux_file_mprotect+0x620/0x620 [ 1139.298912][T23334] ? __fget+0x381/0x550 [ 1139.298930][T23334] ? ksys_dup3+0x3e0/0x3e0 [ 1139.298951][T23334] ? tomoyo_file_ioctl+0x23/0x30 [ 1139.332713][T23334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1139.338973][T23334] ? security_file_ioctl+0x93/0xc0 [ 1139.344093][T23334] ksys_ioctl+0xab/0xd0 [ 1139.348260][T23334] __x64_sys_ioctl+0x73/0xb0 [ 1139.352965][T23334] do_syscall_64+0x103/0x610 [ 1139.357602][T23334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.363603][T23334] RIP: 0033:0x458da9 [ 1139.367524][T23334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1139.387226][T23334] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1139.395669][T23334] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1139.403691][T23334] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1139.411679][T23334] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1139.419671][T23334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 18:07:58 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7fff, 0x90000) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000100)='syz0\x00') r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) timer_gettime(r1, &(0x7f0000000080)) 18:07:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) 18:07:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x125e, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1139.427836][T23334] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:07:58 executing program 3 (fault-call:1 fault-nth:5): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) mq_unlink(&(0x7f0000000800)='\x00') bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x255) r2 = openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x200, 0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000640)={0x1000, 0x201, 0x6, 0x81, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000006c0)={r3, 0x8}, 0x8) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000400)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)='tu', 0x2, 0x3}, {&(0x7f0000000140)="5dd7c4bc9b103dbab5bd040e3a989fe30a6c800b2b5a2adc1d1e832e962f617749a8d5d26cd06b0d64877a2c4136d0a49fefb35d5e6cb1cb1e61c93abfd218edb3de73", 0x43, 0x8}, {&(0x7f00000001c0)="59e3a4682c07b9fe16cd87565da9abc5d3912efb207cbc16b674afe9046a40e37d364dacb7e9d243384f02b609f393da11e1884cecde392dcf3d7c20e967695c0b2d0a6d32b836139c3e1510f61efbf1e440a7789b48c68cbccc396316ca59023cf1e694fcdb5327c68424667e783ff5f0af21e78e2ca0d252417faac6150a4ef56a25f4dd10d4a416926411025469742a32830d6aed9bc5ee5daac630274f6d2c7231f98390419795b0", 0xaa, 0x5}], 0x4000, &(0x7f0000000440)=ANY=[@ANYBLOB="726573697a652c736d61636b6673726f6f743d647262675f6e6f70725f736861353132002c6f626a5f747970653d726e67002c61756469742c6673757569643d39003f383362637f2d313e34642d777761bc2d7b7700662d39373266373162302c6f626a5f747970653d726e67002c646f6e745f61707072616973652c646566636f6e746578743d756e636f6e66696e65645f752c7569643c", @ANYRESDEC=r4, @ANYBLOB="2cc6782169e024485e67002c617070727740db0000000070653d"]) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000700)=0x40, 0x4) r6 = getegid() setregid(r5, r6) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000740)={{0x2, 0x401}, 'port1\x00', 0x4, 0x80000, 0x200, 0x9, 0x14e6, 0xffffffffffffffff, 0x39, 0x0, 0x7, 0x3}) 18:07:58 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r1) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video0\x00', 0x2, 0x0) close(r0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000300)={0x0, @initdev, @initdev}, &(0x7f00000002c0)=0xffffffffffffff58) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@gettfilter={0x34, 0x2e, 0xf02, 0x70bd2d, 0x25dfdbff, {0x0, r3, {0x9, 0xfff3}, {0xd}, {0xffe8}}, [{0x8, 0xb, 0x94}, {0x8, 0xb, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x10000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={r4, 0x4}, &(0x7f0000000280)=0x8) 18:07:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x125f, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)={0x35c, r3, 0x900, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xec, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xf57b}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x80000001, @loopback, 0x26e29c33}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x4a761553}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x6, @remote, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9b8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe0}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x100, @local, 0xd541}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1b3b, @mcast2, 0x101}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7f, @loopback}}}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffcf7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf1d}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x35c}, 0x1, 0x0, 0x0, 0x844}, 0x4) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) [ 1139.763969][T23469] FAULT_INJECTION: forcing a failure. [ 1139.763969][T23469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1139.821859][T23469] CPU: 1 PID: 23469 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1139.829883][T23469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.840067][T23469] Call Trace: [ 1139.843388][T23469] dump_stack+0x172/0x1f0 [ 1139.847719][T23469] should_fail.cold+0xa/0x15 [ 1139.852310][T23469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1139.858205][T23469] ? ___might_sleep+0x163/0x280 [ 1139.863061][T23469] should_fail_alloc_page+0x50/0x60 [ 1139.868274][T23469] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1139.873646][T23469] ? find_held_lock+0x35/0x130 [ 1139.878420][T23469] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1139.884144][T23469] ? lock_downgrade+0x880/0x880 [ 1139.889015][T23469] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1139.895249][T23469] alloc_pages_current+0x107/0x210 [ 1139.900357][T23469] __get_free_pages+0xc/0x40 [ 1139.905960][T23469] inode_doinit_with_dentry+0x990/0x1190 [ 1139.911606][T23469] ? selinux_add_opt+0x2f0/0x2f0 [ 1139.916537][T23469] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1139.922429][T23469] selinux_d_instantiate+0x28/0x40 [ 1139.927533][T23469] security_d_instantiate+0x5d/0x100 [ 1139.932824][T23469] d_instantiate+0x60/0xa0 [ 1139.937247][T23469] debugfs_create_dir+0x122/0x3d0 [ 1139.942352][T23469] do_blk_trace_setup+0x7d5/0xb90 [ 1139.947375][T23469] __blk_trace_setup+0xe3/0x190 [ 1139.952306][T23469] ? do_blk_trace_setup+0xb90/0xb90 [ 1139.957509][T23469] ? disk_name+0xae/0x110 [ 1139.961839][T23469] blk_trace_ioctl+0x170/0x300 [ 1139.966595][T23469] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1139.972135][T23469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1139.978373][T23469] ? tomoyo_domain+0xc5/0x160 [ 1139.983143][T23469] blkdev_ioctl+0x276/0x1d10 [ 1139.987725][T23469] ? blkpg_ioctl+0xa90/0xa90 [ 1139.992307][T23469] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1139.998121][T23469] ? ___might_sleep+0x163/0x280 [ 1140.002986][T23469] block_ioctl+0xee/0x130 [ 1140.007317][T23469] ? blkdev_fallocate+0x410/0x410 [ 1140.013817][T23469] do_vfs_ioctl+0xd6e/0x1390 [ 1140.018431][T23469] ? ioctl_preallocate+0x210/0x210 [ 1140.023534][T23469] ? selinux_file_mprotect+0x620/0x620 [ 1140.029010][T23469] ? __fget+0x381/0x550 [ 1140.033163][T23469] ? ksys_dup3+0x3e0/0x3e0 [ 1140.037575][T23469] ? tomoyo_file_ioctl+0x23/0x30 [ 1140.042516][T23469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1140.048750][T23469] ? security_file_ioctl+0x93/0xc0 [ 1140.053863][T23469] ksys_ioctl+0xab/0xd0 [ 1140.058028][T23469] __x64_sys_ioctl+0x73/0xb0 [ 1140.062624][T23469] do_syscall_64+0x103/0x610 [ 1140.067220][T23469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1140.073118][T23469] RIP: 0033:0x458da9 [ 1140.077006][T23469] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1140.096685][T23469] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1140.105085][T23469] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1140.113070][T23469] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1140.121043][T23469] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1140.129014][T23469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1140.136987][T23469] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:07:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) 18:07:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1260, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0x9e0000, 0x9, 0x7, [], &(0x7f0000000100)={0x990b72, 0x7, [], @p_u16=&(0x7f0000000040)=0x5}}) 18:07:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x346d0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e20, @multicast2}], 0x10) close(r1) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x5, 0x4962, 0x40}}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) mount$9p_virtio(&(0x7f00000001c0)='drbg_nopr_sha512\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=virtio,posixacl,access=', @ANYRESDEC=r2, @ANYBLOB=',dont_appratio,\x00'/32]) 18:07:59 executing program 3 (fault-call:1 fault-nth:6): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:59 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r1, &(0x7f00000001c0)={r5, r0}) close(r2) 18:07:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x100, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000000c0)="31af35d5151b2940aa5724bb946f4164", 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000100)={0x0, 0x7, 0x5, 0x253d, 0x6, 0xef6, 0x88, 0x7, 0x98c5, 0x8, 0x3}, 0xb) tkill(r0, 0x1004000000016) 18:07:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1261, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:07:59 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1140.971902][T23598] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:08:00 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400002, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0500000000000000fffeffff00000000", @ANYRES64=r1, @ANYRES64=r2/1000+10000, @ANYRES64=r3, @ANYRES64=r4/1000+10000, @ANYBLOB="00000040010000000100006025030000f8cc2661e3e9df8b45e3fff7860876e77e96fe7d44bc14baabe83d3e663501e161005e7ca3048c703656c65177f04050da7f26acd09938c74140c30be948fe810842a3bd17cf46fa24caf7141ddf1c83c9d87b3d5790a330cdb658b9d02bf5bdd538265b4daa4dca23fb5b7a95bdbfce369744ab18fb6e3d69f20bf612b61713bed77fea7c0052d35376b7fbbf22bec6e4dde3c209b9e5f19b1c05a9572921cfb45f4bf44a422682957a0e8c02201ff8248eab3e44e8f99bbfd18aa3b7939080cea321def1994ebcac227bb9b788b6cbf4daa4968e1c1b95d6ec8a"], 0x6}, 0x1, 0x0, 0x0, 0x10}, 0x24040044) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r5) 18:08:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0xb5) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) 18:08:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1262, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1140.981019][T23598] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1140.989783][T23598] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1140.997760][T23598] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1141.005739][T23598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1141.013960][T23598] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:08:00 executing program 3 (fault-call:1 fault-nth:7): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:00 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, @in6={{0xa, 0x4e22, 0xffffffffffff4668, @mcast1, 0x7}}, 0x5, 0xffffffffffffffff, 0x7, 0x8, 0x9}, &(0x7f0000000640)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000680)={r2, 0x0, 0xb800000000, 0x6, 0x2, 0x4}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) close(r0) open$dir(&(0x7f0000000540)='./file0\x00', 0x880, 0x1) r4 = geteuid() fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) r8 = geteuid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010005000000000002000400", @ANYRES32=r4, @ANYBLOB="edff0000", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="02000300", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="040007000000000008000600", @ANYRES32=r9, @ANYBLOB="10000600000000002000010000000000"], 0x54, 0x0) [ 1141.302181][T23669] should_failslab+0x9/0x14 [ 1141.306705][T23669] kmem_cache_alloc+0x2b2/0x6f0 [ 1141.311573][T23669] ? lookup_one_len+0x10e/0x1a0 [ 1141.316446][T23669] alloc_inode+0xb8/0x190 [ 1141.320798][T23669] new_inode_pseudo+0x19/0xf0 [ 1141.325492][T23669] new_inode+0x1f/0x40 [ 1141.329574][T23669] debugfs_get_inode+0x1a/0x130 [ 1141.334438][T23669] __debugfs_create_file+0xb9/0x400 [ 1141.339665][T23669] debugfs_create_file+0x5a/0x70 [ 1141.344620][T23669] do_blk_trace_setup+0x325/0xb90 [ 1141.349669][T23669] __blk_trace_setup+0xe3/0x190 18:08:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0x80000001, 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x5) [ 1141.354534][T23669] ? do_blk_trace_setup+0xb90/0xb90 [ 1141.359750][T23669] ? disk_name+0xae/0x110 [ 1141.364093][T23669] blk_trace_ioctl+0x170/0x300 [ 1141.368866][T23669] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1141.374695][T23669] ? lock_downgrade+0x880/0x880 [ 1141.379560][T23669] ? tomoyo_domain+0xc5/0x160 [ 1141.384253][T23669] blkdev_ioctl+0x276/0x1d10 [ 1141.388855][T23669] ? blkpg_ioctl+0xa90/0xa90 [ 1141.393456][T23669] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1141.399298][T23669] ? ___might_sleep+0x163/0x280 [ 1141.404191][T23669] block_ioctl+0xee/0x130 [ 1141.408597][T23669] ? blkdev_fallocate+0x410/0x410 [ 1141.413614][T23669] do_vfs_ioctl+0xd6e/0x1390 [ 1141.418374][T23669] ? ioctl_preallocate+0x210/0x210 [ 1141.423489][T23669] ? selinux_file_mprotect+0x620/0x620 [ 1141.428930][T23669] ? __fget+0x381/0x550 [ 1141.433462][T23669] ? ksys_dup3+0x3e0/0x3e0 [ 1141.438049][T23669] ? tomoyo_file_ioctl+0x23/0x30 [ 1141.442992][T23669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1141.449408][T23669] ? security_file_ioctl+0x93/0xc0 [ 1141.454507][T23669] ksys_ioctl+0xab/0xd0 [ 1141.458673][T23669] __x64_sys_ioctl+0x73/0xb0 [ 1141.463248][T23669] do_syscall_64+0x103/0x610 [ 1141.467910][T23669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1141.473789][T23669] RIP: 0033:0x458da9 [ 1141.477735][T23669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1141.497328][T23669] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1141.505832][T23669] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1141.513859][T23669] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1141.522015][T23669] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1141.530238][T23669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1141.538213][T23669] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:08:00 executing program 3 (fault-call:1 fault-nth:8): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1264, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:00 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000001, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='eth1:\x00') r3 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x0) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000200)={0xfffffffffffffffb, 0x1, @name="97abcb29797d4d236dd96079c2b4da25057c07b38e505b2e82191239fe352e7b"}) close(r2) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000140)=0x1ff, 0x4) dup2(r1, r1) 18:08:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200000, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000016) 18:08:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x20000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) close(r0) [ 1141.864877][T23740] FAULT_INJECTION: forcing a failure. [ 1141.864877][T23740] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.888001][T23740] CPU: 1 PID: 23740 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1141.896905][T23740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1141.907157][T23740] Call Trace: [ 1141.910479][T23740] dump_stack+0x172/0x1f0 [ 1141.914825][T23740] should_fail.cold+0xa/0x15 [ 1141.919452][T23740] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1141.925280][T23740] ? ___might_sleep+0x163/0x280 [ 1141.930267][T23740] __should_failslab+0x121/0x190 [ 1141.935281][T23740] should_failslab+0x9/0x14 [ 1141.939785][T23740] kmem_cache_alloc+0x2b2/0x6f0 [ 1141.944833][T23740] ? __put_user_ns+0x70/0x70 [ 1141.950734][T23740] ? alloc_inode+0xb8/0x190 [ 1141.955230][T23740] security_inode_alloc+0x39/0x160 [ 1141.960328][T23740] inode_init_always+0x56e/0xb50 [ 1141.965274][T23740] alloc_inode+0x83/0x190 [ 1141.970086][T23740] new_inode_pseudo+0x19/0xf0 [ 1141.974758][T23740] new_inode+0x1f/0x40 [ 1141.978933][T23740] debugfs_get_inode+0x1a/0x130 [ 1141.985908][T23740] __debugfs_create_file+0xb9/0x400 [ 1141.991540][T23740] debugfs_create_file+0x5a/0x70 [ 1141.996472][T23740] do_blk_trace_setup+0x325/0xb90 [ 1142.001572][T23740] __blk_trace_setup+0xe3/0x190 [ 1142.006497][T23740] ? do_blk_trace_setup+0xb90/0xb90 [ 1142.011691][T23740] ? disk_name+0xae/0x110 [ 1142.016035][T23740] blk_trace_ioctl+0x170/0x300 [ 1142.020799][T23740] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1142.026330][T23740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.032577][T23740] ? tomoyo_domain+0xc5/0x160 [ 1142.037252][T23740] blkdev_ioctl+0x276/0x1d10 [ 1142.041830][T23740] ? blkpg_ioctl+0xa90/0xa90 [ 1142.046490][T23740] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1142.052288][T23740] ? ___might_sleep+0x163/0x280 [ 1142.057140][T23740] block_ioctl+0xee/0x130 [ 1142.061462][T23740] ? blkdev_fallocate+0x410/0x410 [ 1142.066481][T23740] do_vfs_ioctl+0xd6e/0x1390 [ 1142.071061][T23740] ? ioctl_preallocate+0x210/0x210 [ 1142.076157][T23740] ? selinux_file_mprotect+0x620/0x620 [ 1142.081606][T23740] ? __fget+0x381/0x550 [ 1142.085747][T23740] ? ksys_dup3+0x3e0/0x3e0 [ 1142.090173][T23740] ? tomoyo_file_ioctl+0x23/0x30 [ 1142.095105][T23740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.101451][T23740] ? security_file_ioctl+0x93/0xc0 [ 1142.106663][T23740] ksys_ioctl+0xab/0xd0 [ 1142.110814][T23740] __x64_sys_ioctl+0x73/0xb0 [ 1142.115391][T23740] do_syscall_64+0x103/0x610 [ 1142.119977][T23740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.126710][T23740] RIP: 0033:0x458da9 [ 1142.130590][T23740] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1142.150188][T23740] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:08:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1265, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1142.159553][T23740] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1142.168145][T23740] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1142.176913][T23740] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1142.185255][T23740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1142.193557][T23740] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:08:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) close(r0) socket$alg(0x26, 0x5, 0x0) 18:08:01 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x5, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) close(r2) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000100)) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 1142.667434][T23865] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1142.673792][T23865] alloc_pages_current+0x107/0x210 [ 1142.678930][T23865] __get_free_pages+0xc/0x40 [ 1142.683583][T23865] inode_doinit_with_dentry+0x990/0x1190 [ 1142.689552][T23865] ? selinux_add_opt+0x2f0/0x2f0 [ 1142.695444][T23865] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1142.701528][T23865] selinux_d_instantiate+0x28/0x40 [ 1142.708943][T23865] security_d_instantiate+0x5d/0x100 [ 1142.714230][T23865] d_instantiate+0x60/0xa0 [ 1142.719534][T23865] __debugfs_create_file+0x188/0x400 [ 1142.725092][T23865] debugfs_create_file+0x5a/0x70 [ 1142.730036][T23865] do_blk_trace_setup+0x325/0xb90 [ 1142.735328][T23865] __blk_trace_setup+0xe3/0x190 [ 1142.740262][T23865] ? do_blk_trace_setup+0xb90/0xb90 [ 1142.745658][T23865] ? disk_name+0xae/0x110 [ 1142.750018][T23865] blk_trace_ioctl+0x170/0x300 [ 1142.754798][T23865] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1142.760445][T23865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.767009][T23865] ? tomoyo_domain+0xc5/0x160 [ 1142.771728][T23865] blkdev_ioctl+0x276/0x1d10 [ 1142.776335][T23865] ? blkpg_ioctl+0xa90/0xa90 [ 1142.780942][T23865] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1142.787345][T23865] ? ___might_sleep+0x163/0x280 [ 1142.792214][T23865] block_ioctl+0xee/0x130 [ 1142.796545][T23865] ? blkdev_fallocate+0x410/0x410 [ 1142.801923][T23865] do_vfs_ioctl+0xd6e/0x1390 [ 1142.806509][T23865] ? ioctl_preallocate+0x210/0x210 [ 1142.811610][T23865] ? selinux_file_mprotect+0x620/0x620 [ 1142.817723][T23865] ? __fget+0x381/0x550 [ 1142.822457][T23865] ? ksys_dup3+0x3e0/0x3e0 [ 1142.826886][T23865] ? tomoyo_file_ioctl+0x23/0x30 [ 1142.832292][T23865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.838570][T23865] ? security_file_ioctl+0x93/0xc0 [ 1142.843698][T23865] ksys_ioctl+0xab/0xd0 [ 1142.847849][T23865] __x64_sys_ioctl+0x73/0xb0 [ 1142.852513][T23865] do_syscall_64+0x103/0x610 [ 1142.857096][T23865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.863077][T23865] RIP: 0033:0x458da9 [ 1142.867023][T23865] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1142.886854][T23865] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1142.895259][T23865] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1142.903807][T23865] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 18:08:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)=0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0)=0x6, 0x4) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f00000000c0)=""/1) timer_settime(r2, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000016) io_setup(0xff, &(0x7f0000000100)=0x0) io_cancel(r5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x1000, r4, &(0x7f0000000140)="023676214b915113e52c79615f01f9822ec6657ae40935f405624670999cf7ba4ddfbf3a3f2123d76cc4c1dbbafd3d34b62a541e6a79b144f28c977b719c40c4c86f11adf33af7044138940f621f505b422b4a6cf7f989cd4f93db6787b509f3f4d1978aa4ba83dd4adf3248c898e070591e37e94b797c5e3e168838e3c0a35cff032a9b96155306fdafaca09ae51a4ee7c474884e5ee587909edec17abf8264c8c7b49fb6c81cd3e952c903a485f0cfe8db09b735a84f5016e7e85b3d5e1c83e03f920dad0f9383bf83dcc7ad346f7a12e78a471117531d9cd2786177a3922de5e009", 0xe3, 0x20, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000280)) [ 1142.912389][T23865] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1142.920357][T23865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1142.928765][T23865] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:08:02 executing program 3 (fault-call:1 fault-nth:10): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:02 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f00000001c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, 0xf, 0x6, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @null]}) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000180)=0x3, 0x4) 18:08:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1269, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1143.156338][T23884] FAULT_INJECTION: forcing a failure. [ 1143.156338][T23884] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.240803][T23884] CPU: 1 PID: 23884 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1143.248867][T23884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1143.259205][T23884] Call Trace: [ 1143.262554][T23884] dump_stack+0x172/0x1f0 [ 1143.266940][T23884] should_fail.cold+0xa/0x15 [ 1143.271560][T23884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1143.277420][T23884] ? ___might_sleep+0x163/0x280 [ 1143.282475][T23884] __should_failslab+0x121/0x190 18:08:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r2 = dup3(r1, r0, 0x80000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f0000001300)='security.evm\x00', &(0x7f0000001340)=@v1={0x2, '%'}, 0x2, 0x2) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/225, 0xe1}], 0x4, 0x0) close(r1) getsockname$inet6(r2, &(0x7f0000001380), &(0x7f00000013c0)=0x1c) [ 1143.287433][T23884] should_failslab+0x9/0x14 [ 1143.291983][T23884] kmem_cache_alloc+0x2b2/0x6f0 [ 1143.296852][T23884] __d_alloc+0x2e/0x8c0 [ 1143.301038][T23884] d_alloc+0x4d/0x2b0 [ 1143.305034][T23884] d_alloc_parallel+0xf4/0x1bc0 [ 1143.310267][T23884] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1143.315676][T23884] ? __d_lookup+0x40c/0x760 [ 1143.320303][T23884] ? lockdep_init_map+0x1be/0x6d0 [ 1143.326738][T23884] ? lockdep_init_map+0x1be/0x6d0 [ 1143.332483][T23884] __lookup_slow+0x1ab/0x500 [ 1143.337437][T23884] ? vfs_unlink+0x560/0x560 [ 1143.342045][T23884] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1143.347342][T23884] ? d_lookup+0x19e/0x260 [ 1143.351701][T23884] lookup_one_len+0x16d/0x1a0 [ 1143.356383][T23884] ? lookup_one_len_unlocked+0x100/0x100 [ 1143.362044][T23884] start_creating+0xbf/0x1e0 [ 1143.366645][T23884] __debugfs_create_file+0x65/0x400 [ 1143.371852][T23884] debugfs_create_file+0x5a/0x70 [ 1143.376912][T23884] do_blk_trace_setup+0x376/0xb90 [ 1143.381943][T23884] __blk_trace_setup+0xe3/0x190 [ 1143.386795][T23884] ? do_blk_trace_setup+0xb90/0xb90 [ 1143.392267][T23884] ? disk_name+0xae/0x110 [ 1143.396611][T23884] blk_trace_ioctl+0x170/0x300 [ 1143.401385][T23884] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1143.406946][T23884] ? lock_downgrade+0x880/0x880 [ 1143.411808][T23884] ? tomoyo_domain+0xc5/0x160 [ 1143.416763][T23884] blkdev_ioctl+0x276/0x1d10 [ 1143.421361][T23884] ? blkpg_ioctl+0xa90/0xa90 [ 1143.426045][T23884] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1143.431890][T23884] ? ___might_sleep+0x163/0x280 [ 1143.436838][T23884] block_ioctl+0xee/0x130 [ 1143.441296][T23884] ? blkdev_fallocate+0x410/0x410 [ 1143.447286][T23884] do_vfs_ioctl+0xd6e/0x1390 [ 1143.452060][T23884] ? ioctl_preallocate+0x210/0x210 [ 1143.457222][T23884] ? selinux_file_mprotect+0x620/0x620 [ 1143.462677][T23884] ? __fget+0x381/0x550 [ 1143.467550][T23884] ? ksys_dup3+0x3e0/0x3e0 [ 1143.471981][T23884] ? tomoyo_file_ioctl+0x23/0x30 [ 1143.477095][T23884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1143.483336][T23884] ? security_file_ioctl+0x93/0xc0 [ 1143.488540][T23884] ksys_ioctl+0xab/0xd0 [ 1143.492698][T23884] __x64_sys_ioctl+0x73/0xb0 [ 1143.497308][T23884] do_syscall_64+0x103/0x610 [ 1143.502252][T23884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.508139][T23884] RIP: 0033:0x458da9 [ 1143.512048][T23884] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1143.532434][T23884] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:08:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000340)={0x4c, 0x0, &(0x7f0000000240)=[@transaction_sg={0x40486311, {{0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x18, 0x40, &(0x7f00000001c0)=[@fd={0x66642a85, 0x0, r1, 0x0, 0x1}], &(0x7f0000000200)=[0x0, 0x68, 0x78, 0x38, 0x40, 0x20, 0x28, 0x0]}, 0x8}}], 0x5b, 0x0, &(0x7f00000002c0)="ef8aaef3bdd907b7f1b8e134154b3b17c4e4230a534da5fb058b4090546c400d75eadb065ed1d536ea76432171f8f89ef7637fb1afd5d50cb69709f482f3b284b7f7cba675c64b2070e2188dbadcfa6d7638bd0030194200983f5e"}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000000c0)=0x9, 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) bind$alg(r4, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000100)={0x18, 0x0, 0x5, {0x3}}, 0x18) tkill(r0, 0x1004000000016) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x24a240, 0x0) [ 1143.540840][T23884] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1143.549078][T23884] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1143.557049][T23884] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1143.565020][T23884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 [ 1143.573170][T23884] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:08:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:02 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x600900) ioctl$RTC_PIE_ON(r0, 0x7005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) close(r1) 18:08:03 executing program 3 (fault-call:1 fault-nth:11): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)={0x80000000}) close(r1) 18:08:03 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000440)) r3 = socket(0x11, 0xa, 0x10002) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)) r5 = gettid() getpgid(r5) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f0000000700)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000680)}], 0x1}, 0x20000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xaf}, &(0x7f0000000580)=0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='lp@', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x2, 0x5c97, 0x0, 0x0, 0x8, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r7 = request_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f00000009c0)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0x0, @in6={{0xa, 0x4e22, 0x440, @local, 0x8c}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000040)={r1, 0x4, 0x8}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r3 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x80, 0xc0880) accept4$inet(r3, 0x0, &(0x7f0000000280), 0x800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f0000000200)=0x80000000) close(r2) [ 1143.944367][T23909] FAULT_INJECTION: forcing a failure. [ 1143.944367][T23909] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.987068][T23909] CPU: 0 PID: 23909 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #87 [ 1143.996138][T23909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.006225][T23909] Call Trace: [ 1144.006254][T23909] dump_stack+0x172/0x1f0 [ 1144.006276][T23909] should_fail.cold+0xa/0x15 [ 1144.006293][T23909] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1144.006313][T23909] ? ___might_sleep+0x163/0x280 [ 1144.006329][T23909] __should_failslab+0x121/0x190 [ 1144.006347][T23909] should_failslab+0x9/0x14 [ 1144.006364][T23909] kmem_cache_alloc+0x2b2/0x6f0 [ 1144.006379][T23909] ? lookup_one_len+0x10e/0x1a0 [ 1144.006397][T23909] alloc_inode+0xb8/0x190 [ 1144.014511][T23909] new_inode_pseudo+0x19/0xf0 [ 1144.014530][T23909] new_inode+0x1f/0x40 [ 1144.014549][T23909] debugfs_get_inode+0x1a/0x130 [ 1144.014568][T23909] __debugfs_create_file+0xb9/0x400 [ 1144.014590][T23909] debugfs_create_file+0x5a/0x70 [ 1144.014609][T23909] do_blk_trace_setup+0x376/0xb90 [ 1144.014632][T23909] __blk_trace_setup+0xe3/0x190 [ 1144.014651][T23909] ? do_blk_trace_setup+0xb90/0xb90 [ 1144.014681][T23909] ? disk_name+0xae/0x110 [ 1144.040229][T23909] blk_trace_ioctl+0x170/0x300 [ 1144.040249][T23909] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1144.040264][T23909] ? lock_downgrade+0x880/0x880 [ 1144.040281][T23909] ? tomoyo_domain+0xc5/0x160 [ 1144.040301][T23909] blkdev_ioctl+0x276/0x1d10 [ 1144.050514][T23909] ? blkpg_ioctl+0xa90/0xa90 [ 1144.050533][T23909] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1144.050560][T23909] ? ___might_sleep+0x163/0x280 [ 1144.140125][T23909] block_ioctl+0xee/0x130 [ 1144.144478][T23909] ? blkdev_fallocate+0x410/0x410 [ 1144.149618][T23909] do_vfs_ioctl+0xd6e/0x1390 [ 1144.154233][T23909] ? ioctl_preallocate+0x210/0x210 [ 1144.159345][T23909] ? selinux_file_mprotect+0x620/0x620 [ 1144.165359][T23909] ? __fget+0x381/0x550 [ 1144.169597][T23909] ? ksys_dup3+0x3e0/0x3e0 [ 1144.174069][T23909] ? tomoyo_file_ioctl+0x23/0x30 [ 1144.179115][T23909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.185875][T23909] ? security_file_ioctl+0x93/0xc0 [ 1144.192051][T23909] ksys_ioctl+0xab/0xd0 [ 1144.198412][T23909] __x64_sys_ioctl+0x73/0xb0 [ 1144.204937][T23909] do_syscall_64+0x103/0x610 [ 1144.209997][T23909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.216027][T23909] RIP: 0033:0x458da9 [ 1144.219961][T23909] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1144.241570][T23909] RSP: 002b:00007fdbbaaf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1144.251815][T23909] RAX: ffffffffffffffda RBX: 00007fdbbaaf4c90 RCX: 0000000000458da9 [ 1144.260152][T23909] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 1144.268302][T23909] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1144.276896][T23909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbbaaf56d4 18:08:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x6, &(0x7f0000000080)={0x0, 0x3a, 0x3}, &(0x7f00000000c0)=0x0) timer_gettime(r0, &(0x7f0000000100)) r1 = gettid() r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x2, 0x80000) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000001c0)={0x81, 0x0, [0x75d, 0x3, 0x70, 0xfffffffffffffffc]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)=0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)={@my=0x0}) timer_getoverrun(r3) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000016) sched_setscheduler(r1, 0x2, &(0x7f0000000240)=0x2) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x40000, 0x0) write$UHID_INPUT(r6, &(0x7f0000000680)={0x8, "73d98635e2212660950d500f584a51235e4b741af128ecfc376482ee22381202e8ff3d53f7852e2bd393e3bd7fb1393d6bfbf7202b94d7463fb02d0af2c103a34e070ce832c4f8dbb2a9fe72f118c12e496370c721f34a0287356d3fcf268574edb393160ac4c1fc427c534e998bde8d425ee75a0a69dc0ec216134e87b45859ce7f769b4d3db8c21baaa8381217a48a12b0927b26cfdd343c62e70ac4258c3f8abb7c94c96e8e3c97ff214a21ca8c28a94e8e344559a9e9c81cc075b67d7d1f9212a8d5a04bdf7377283b1bda6d9660a2474752f70bde82ac22ebcaadc97672405cd354ea2b2c85c0d630a65bab831d8f3673fcf3cf9689c744bf140d7121853e3d77caf6a250156a01fc722c4f3aaecef3feca6a6c10600f38aeb8faf4433483f7f215448ab334180ebe8e2e61ef669c24c2b8fd72244490a1829570407066801d25bfc33b1e7fb829350e46f542a2327fa8f57a83f7e6db66be1d79a97e1219970605d8b7a2f97b8363d4ba4869cb2e64603912eecebdff8fa2e651edab6008034a65a918c5cb987009d1278e6c4a12afb48be788557da63eb5fc85b713a9165241e7e766dd531f176945db995c77b6cedcee8cc20c859f16b0d01ff7d642c0b3431128f7de61e093c2353b029eed02aa9f63b29bb955ac34286b351d6e2f9f01d145b7cacf9ed68901304d36e289b69f1490dcc46678e09d737d664523629e44d882379c6783233a2dbe8466c2ab50bd98739b62f1ffe01cebb76920716fa23d87093b18575e9bb75f7de54b0b202019859f19b595d7182c9f65782ddae5dc5a37f1f768c97c5732a42872771f990c75144114ffc61ac36ad8835f92a5b57cb8b48a16a0e48cf42c761767cbccdc5d8db2f72dc5b3d95efe71850ccd4b51cb6bb757bf411aa151e34c22988b2a165c002376f9815e047bc57bfc922b31ba511e97e74fdf640727a5b1a71446e65c0d861a62da326865898c57386c610e4a2b4ae4e7b24ebe4e02f3654a5bfe8519a1a70e4d7b0405a078f4e149ea945c6c6d7846eda06b5dd400546d3b83d9a880df327cf71595ff0c00bd94c556da766d443333ddff6b01fe7801e79547f26ecdb12d791edbe1862fa0e3afe43b018554bef99339be7ad668281b37c625008114b6ea8f7f141a9a048086820d465bbe4b7df46d70cb463a55ae49d3fa11fb4b6a1c4f572bc18ef291c01747b29a94fd5ed683400ae36414311bc0dd04d2994173a97b831ef72700f3c5a2e4700baaff50d450a3f782e1facce81c8c9fe6fb34e8768d23b5cae385aa43d378bc6308f1ab3482c0e7b11800162db1d4c1f1d4ce6339f913116a46c6406ee6c22a509258fff4138cf3197c2be3e8ec601281d52d3dae8b83f7d5810bbedea5dab637075f8e1cec0cb76540d09e1081c509d856df6e1c22032d76f6e80313b650f2f39783bed22019645ef2e81f246903705fb3512d3b2122c0a00bf1a11428d2078d1e352e80f43ea116b94367c26319ebe6daef87ff5d5c45d477d0829d51876ce4932f2015872f4749e4b8718e81b7d04329e574eb92844a3432be1bf321c63940355ee9aef5d18fc8281215cbeed5cb185c404d1c6ff6db6dd564f44e077846254408e4b13184be374e859bab2520cabb16cb1f6959efbdac17b913f9878204cdc1e11043ae7f1b1e935fdcdce8fbeb3482a1fd2048c3d4e67832c38106343454978a4a1cee842ab24fd3ba6ce4fd2af61d6fb68da60bbab9cd568ae259716cdfcc27f9a866e24238f0235ca12ac87241621dbb8f40620638c3454b638c7d58350a10308cb309520cdafd0fa9c45d6538d9f49045ed83f396c65771ab7ba26fd26dfe7c772008d40e5e5af39479722e051237d7d68f41b9a51c59bb5ba4ad038042465c00454bfdb0314cd0d70a8c0b468c130e53917f44dc49f0b82e22470daab9962aa81f7084b63630361cdbb70e2cae020f162813ad704e57b2f87bd211cc9eb1fe47afa8b556433e8c1085ce9d47a758bfce41b099d8d15306212d32662679624813d7c9bb04e76c675ccc819300182bfe609ad940aa102420f3239b967f31e178816152a739fba94e835e0b07cd950a34c6a00d7b51b242995d515408d5f56d4306319d8d9bb49a3fa76ef9586813b49e86cc1bad26be9a67301ae72b7b330d513e4f27131e39da73fc384d6f2d036e4a2a9fc57499d21a6bf56befaef891d9e8a4d1e09c70c2aa405e0c8e2345ffaaac08fa17de561a1d39996e30aa3565a153c3e246a7fa75ba6a3c21ae85595fb0627e0373c1f399355f8728fd80a2c94ae62f6cf6dd37c56814213293a6c1fbe7d24bcadf108fa7d7445fefe2442c62dd830455c92a66b3b61a151167b8ebbc26b05ca3f57c2d26c6dcde97f2b23176c86d46fd89fa7d9143e188d8fd75900bee4eda9821feedc20260882305c1c95f02daf33129a169bc25f00ec9efb3f2bf7ffde7773cc07c9df0f755fba5314bd679bc654b5f44cad74dedbe7d1b0f1fa015d79df6ef49a454c793c62973c61a4a24f74c06e83940859a774f2c051bae1d312e9a01230d8c51fc5b79316ca206b84e8b38afc978c36d8d874ff396e5cc6847668eaf8c9a6ac74d8c9ad0796def6df95312eb3d50ce7976be6361e1720c5320309326e97f6b40c11df6ba7ae39069903d1688567f9bf1a9de24e48d3559965a90d4b2608da48e371490c3a16514bf785ef2549fed6fea9b6bbed21ee8576339b312460f6f46c06f11bfc314e8fb321826f6a7a1a6ae79f79de76ba2383f45851bffc64265436e497204cfe6a82f2636966d4b1dd7341ef91f3b4031326fcb6e190207de99f0c16f1e6ce1dbbc52a3bdc6ad8f2d9204bb2a007d2399ecd8a49547fd15e438161ddd6f1bf0e4418982e929ae67b1f33011bc245f47bd74df464884912647924965a68e9beac2854d8f96b28feda85c09369f80b984393a3711ec142b452a1b2a0606ebd8a4fb6bdb3aab4e982b3c274e0406f4fb9329e281a40b80202e98630e69e0a7d94a8c5da51aa55f7fbb3a08b845b3be564429a7e6ffb3badddcfdf052b65d9f4a139386c7337eff61b54fd04f4fcf95211ee7e765bf6c81580a32f5078c2334daee7c534df8b7fc9658ed0ae5002aab336d496e47ac95972a6968953fe4d97ec6e4eb4502892cb487f5a4792bac836ba49775a8a416f881604c5bad7f0c62590e1e845e944d4e736ecc31454da6db8530d39ac6787954196aa20c5ab9ca97089870d6ca62a011dc45860f61c959ff65471966744c77d0c4c2d0659fb632714548650986d3e1203bb6bac7b04f6f55b5588a9eb545cd8d7d2accad25faf92ef47c5fb58510b0cd525f8a8af5f378f3c568f3b41b0cf01149458775e17c1697cc1d6e5a432ca69b58860868d9e9a9e130d3df663b7bd6483f60a3c9c659b5a12df0c3e62f5f358aec69a754c05ddf3dac92e1f95fee0f9a0daeee4fba989cdc69669a8cd6545e127f6c965a016f7e4b8795bc6089a76e294b237fd8594aa71e2166ad51d9d7d7eaac2080e80486e9c3fd63531a45db5c1a0067e782490862c0132f46fd89671c75ead6ff39ca971a78212b2c06dbc2cd0060b97e3c7705bcb89b4845bb95f9909f4ac10c48bbd4b0687e733aa8150fe7bb11a288ec53d012cb04352ec1969b820d3e0fdfa89abdb051ad857a98785142fa23439554b871be8dc1963346f15903943a0d575fb1e124f9ab18154b8e29a5f8cb6843c2a013d0e70fb64d343d9df61ac0b0f77ba5f3383af714dae23989742a2d7ecd9bb23e8f387c1b9664b4ca1189d82d0900d2fcf8355bb229fd1e404c49b63294c27fc664ca15518e4dd4999a5e3238eb159ebe9e91d8fc8f7c0e7b60de33ad04f9696a502524d2221a06a34dcda8075d87919ffe657466905438d98b92c7891d713bbbe3880e11f6dae1785a5b7cb5b7b8d299d7f8e132162d6248d39dcef509f54156bb4e520fa78053d47aca97b9a78821773068eb0991b303428e28cab32aa1889fad2e2e635f80ab9f3b9c4306470118ff537e709caad665ad93046e8a6a8c27a6200960cb09d82cc6a0b569f074daa25e4d43be9530fabe6aad1cffdc1ab2187c782c911beee0ad2e3a813e5278a58cfa12362f291dc281b46ebbdc91169731d8647d835d1d61b51baab0e1e8467dea2194459006ba4ba982588fb3a4da2ffacb2aedb2ba68ae0dcf0e9ea941bc8ab5f7ba2a330805a95ac5abe3a3baadcc92b4566bae4657d2a8b416b8643b16dde3134b80f903395d95dceb8c2e4cd024e146402b56374dbfb46d6378fc6eddddce1af8901bef0a56c8f012670a6a0571506f76405e7cbeed82c15b530a64500a64bfa143e30f703028c2fdc5ee169100d2c99551cf995a6a8bdb2c3b484b9c2f287263ab92827da45c08b93c042b89910a7ac067adb699343d82227edb6ec43524411e41348dd1e49afac6006ee72cece05e16e88b0351c6f34f0af8de0b25d586c9e5f7a0ccc404ef95ea4b24c73fcb769fc6176c5deab45d04c2accabc39b154e1291202fdf596b3f815cdf3763cfeefa8af56dbc44daba4ac16929c0a038c111ec5d605c705f6d8b3c8d906ed045d9d86dfc9e1813d424750e06c949a3553bfcaef4d808929915c1ddf443632d6c81c734cc89c8f68ee28a766c3ba384ca220d97c9cdd80346b0000b71aaa91305da433e50ee1a93ddff0624e45a0f57fa32fef004e3dedf9cd68e29f8e010f5eba75b4e5c615052976d3758fa6cd4b9e229fd02e0ab85fed9244176df3c465bcd8ea0cfa71bc885c5f1cb66335f2bbe45b2ae173a29ac4e4fc7d1120f074e463058be0907151dc0e25b814c55dba156f4e6310c702f21db754088277d4ac08adae7534f8145bff4c70a32b322e526cc957cbc91d36b317335061f10931373548615875ea8add0cd5215c53ad7fbd6751df5c3cec6deb0bbe0b1652c9156fb6bd1b098a4b56f2f4a7b3241334072b7e939058b0bd0ef3fe43bef7b60cbcfdaa32672b244872aa9deadeac06cdc02c7cb0c0e9b0b8dcce56db1270803619679568466e4bc62e56452e423b0e9f605b671be6545e5e1817e65397a59c45f2ff4dc21158855aaf9494c0a1817f9a04ca17ed41cdc135dfca4e63bf53bf02bef29d6f7f69e0fc8542051ea2ffa78f6a61a2438bf2e39d1660c7df254f2f1e6e9ff72c35cba022d11f59b166bdd9652a55c4eec7c52d237381c10d36e7b6dab3744b164117f962969b4c88422f35bdbf1f4937d620d8df8a97d8a3a9785c67365adbfdd3d28c31cbed4c4b71d38470e49ffb6a6da377b71f17aff1701c23541c66ea53313e732577713cd1b15b204aa821958c43e5ee81eb23b7f897490f5e59ce6a4a092f1ec7296bddb2a1c2ba62d778375c864955374b6f9f349ed6c2d4c037697a9f69990693a01b0280bf8712d2246b2179653321ccf65c3b07f503e7a64d60c4b86c33283f9954299be88508da8d35a082dc47d3da38be261cbf60c3d036a0df09b51989d16e323c8b66b983bcf63e409059e57cda0577711fa3b6c239fb92ffe7bed8f17fc09ea6d0879e74be641f9b5b24ccef5fbf182619485d676639b37e647cabf33879aa37e1ab775ca7ff136eb51246041af689decc599d288125dc2122e21b499b13f437c060dc925af13e3727b5452fcb8fd148c983f375e4c80301f64d33e808fb25d4a984e2800e32d538b741057617942891da34d3f5f6b0cf430178dd02ddeb70279cc37c3db1c597c116d34c557a409f2e1492cbeb9a0cc198b4fc34df145745c190f184419128", 0x1000}, 0x1006) 18:08:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="06000500000000000000"], &(0x7f0000000200)=0x2) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0xfffffffffffffffc}, 0x8) close(r0) [ 1144.285646][T23909] R13: 00000000004c0285 R14: 00000000004d2678 R15: 0000000000000004 18:08:03 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1276, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 18:08:03 executing program 3 (fault-call:1 fault-nth:12): r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) [ 1144.457890][T24031] ================================================================== [ 1144.468609][T24031] BUG: KASAN: use-after-free in debugfs_remove+0x10d/0x130 [ 1144.475918][T24031] Read of size 8 at addr ffff888085757e00 by task syz-executor.4/24031 [ 1144.486891][T24031] [ 1144.489244][T24031] CPU: 1 PID: 24031 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #87 [ 1144.497864][T24031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.507941][T24031] Call Trace: [ 1144.511263][T24031] dump_stack+0x172/0x1f0 [ 1144.515624][T24031] ? debugfs_remove+0x10d/0x130 [ 1144.520500][T24031] print_address_description.cold+0x7c/0x20d [ 1144.526663][T24031] ? debugfs_remove+0x10d/0x130 [ 1144.531607][T24031] ? debugfs_remove+0x10d/0x130 [ 1144.536479][T24031] kasan_report.cold+0x1b/0x40 [ 1144.541255][T24031] ? debugfs_remove+0x10d/0x130 [ 1144.546202][T24031] __asan_report_load8_noabort+0x14/0x20 [ 1144.551841][T24031] debugfs_remove+0x10d/0x130 [ 1144.556868][T24031] blk_trace_free+0x62/0x140 [ 1144.561472][T24031] __blk_trace_remove+0x78/0xa0 [ 1144.566332][T24031] blk_trace_ioctl+0x239/0x300 [ 1144.571132][T24031] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1144.576690][T24031] ? avc_ss_reset+0x190/0x190 [ 1144.581564][T24031] ? tomoyo_domain+0xc5/0x160 [ 1144.586266][T24031] blkdev_ioctl+0x276/0x1d10 [ 1144.590876][T24031] ? blkpg_ioctl+0xa90/0xa90 [ 1144.595478][T24031] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1144.601417][T24031] ? ___might_sleep+0x163/0x280 [ 1144.606289][T24031] block_ioctl+0xee/0x130 [ 1144.610623][T24031] ? blkdev_fallocate+0x410/0x410 [ 1144.615662][T24031] do_vfs_ioctl+0xd6e/0x1390 [ 1144.620373][T24031] ? ioctl_preallocate+0x210/0x210 [ 1144.625493][T24031] ? selinux_file_mprotect+0x620/0x620 [ 1144.630967][T24031] ? __fget+0x381/0x550 [ 1144.635150][T24031] ? ksys_dup3+0x3e0/0x3e0 [ 1144.639581][T24031] ? nsecs_to_jiffies+0x30/0x30 [ 1144.644532][T24031] ? tomoyo_file_ioctl+0x23/0x30 [ 1144.649480][T24031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.656348][T24031] ? security_file_ioctl+0x93/0xc0 [ 1144.661481][T24031] ksys_ioctl+0xab/0xd0 [ 1144.665654][T24031] __x64_sys_ioctl+0x73/0xb0 [ 1144.670265][T24031] do_syscall_64+0x103/0x610 [ 1144.674906][T24031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.680795][T24031] RIP: 0033:0x458da9 [ 1144.684699][T24031] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1144.704311][T24031] RSP: 002b:00007ff04e240c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1144.712746][T24031] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1144.720996][T24031] RDX: 0000000020000080 RSI: 0000000000001276 RDI: 0000000000000003 [ 1144.729102][T24031] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1144.737083][T24031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04e2416d4 [ 1144.745079][T24031] R13: 00000000004c0285 R14: 00000000004d2678 R15: 00000000ffffffff [ 1144.753176][T24031] [ 1144.755525][T24031] Allocated by task 18032: [ 1144.760073][T24031] save_stack+0x45/0xd0 [ 1144.764243][T24031] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1144.769898][T24031] kasan_slab_alloc+0xf/0x20 [ 1144.774838][T24031] kmem_cache_alloc+0x11a/0x6f0 [ 1144.779703][T24031] __d_alloc+0x2e/0x8c0 [ 1144.784033][T24031] d_alloc+0x4d/0x2b0 [ 1144.788037][T24031] __lookup_hash+0xcd/0x190 [ 1144.792628][T24031] filename_create+0x1a7/0x4f0 [ 1144.797403][T24031] do_symlinkat+0xf3/0x290 [ 1144.801826][T24031] __x64_sys_symlink+0x59/0x80 18:08:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000000)) close(r0) 18:08:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'gretap0\x00'}) [ 1144.806766][T24031] do_syscall_64+0x103/0x610 [ 1144.813630][T24031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.819825][T24031] [ 1144.822253][T24031] Freed by task 18149: [ 1144.826449][T24031] save_stack+0x45/0xd0 [ 1144.830975][T24031] __kasan_slab_free+0x102/0x150 [ 1144.835936][T24031] kasan_slab_free+0xe/0x10 [ 1144.840446][T24031] kmem_cache_free+0x86/0x260 [ 1144.845129][T24031] __d_free+0x20/0x30 [ 1144.849727][T24031] rcu_core+0x916/0x13a0 [ 1144.853977][T24031] __do_softirq+0x266/0x95a [ 1144.858476][T24031] [ 1144.860810][T24031] The buggy address belongs to the object at ffff888085757dc0 [ 1144.860810][T24031] which belongs to the cache dentry(97:syz5) of size 288 [ 1144.875309][T24031] The buggy address is located 64 bytes inside of [ 1144.875309][T24031] 288-byte region [ffff888085757dc0, ffff888085757ee0) [ 1144.888600][T24031] The buggy address belongs to the page: [ 1144.894508][T24031] page:ffffea000215d5c0 count:1 mapcount:0 mapping:ffff8880a3f8e4c0 index:0xffff888085757840 [ 1144.904850][T24031] flags: 0x1fffc0000000200(slab) [ 1144.909837][T24031] raw: 01fffc0000000200 ffffea000263b148 ffffea0002525488 ffff8880a3f8e4c0 [ 1144.918439][T24031] raw: ffff888085757840 ffff888085757000 000000010000000a ffff88805aac40c0 [ 1144.927026][T24031] page dumped because: kasan: bad access detected [ 1144.933469][T24031] page->mem_cgroup:ffff88805aac40c0 [ 1144.938679][T24031] [ 1144.941007][T24031] Memory state around the buggy address: [ 1144.946730][T24031] ffff888085757d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1144.955414][T24031] ffff888085757d80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1144.963678][T24031] >ffff888085757e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1144.972122][T24031] ^ [ 1144.982640][T24031] ffff888085757e80: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc 18:08:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x4, 0x0, 0x0, 0x0, 0x4396, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000100)={r3, 0x2}) close(r2) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCAX25GETINFOOLD(r4, 0x89e9, &(0x7f0000000180)) ioctl$CAPI_CLR_FLAGS(r4, 0x80044325, &(0x7f0000000200)) [ 1145.008178][T24031] ffff888085757f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1145.039493][T24031] ================================================================== [ 1145.054487][T24031] Disabling lock debugging due to kernel taint [ 1145.068680][T24031] Kernel panic - not syncing: panic_on_warn set ... [ 1145.080196][T24031] CPU: 1 PID: 24031 Comm: syz-executor.4 Tainted: G B 5.1.0-rc6+ #87 [ 1145.102255][T24031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.120208][T24031] Call Trace: [ 1145.123524][T24031] dump_stack+0x172/0x1f0 [ 1145.128144][T24031] panic+0x2cb/0x65c [ 1145.132701][T24031] ? __warn_printk+0xf3/0xf3 [ 1145.137458][T24031] ? debugfs_remove+0x10d/0x130 [ 1145.142322][T24031] ? preempt_schedule+0x4b/0x60 [ 1145.147860][T24031] ? ___preempt_schedule+0x16/0x18 [ 1145.152962][T24031] ? trace_hardirqs_on+0x5e/0x230 [ 1145.157989][T24031] ? debugfs_remove+0x10d/0x130 [ 1145.163609][T24031] end_report+0x47/0x4f [ 1145.167777][T24031] ? debugfs_remove+0x10d/0x130 [ 1145.172617][T24031] kasan_report.cold+0xe/0x40 [ 1145.177282][T24031] ? debugfs_remove+0x10d/0x130 [ 1145.182126][T24031] __asan_report_load8_noabort+0x14/0x20 [ 1145.187742][T24031] debugfs_remove+0x10d/0x130 [ 1145.192529][T24031] blk_trace_free+0x62/0x140 [ 1145.200278][T24031] __blk_trace_remove+0x78/0xa0 [ 1145.205994][T24031] blk_trace_ioctl+0x239/0x300 [ 1145.210763][T24031] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 1145.216378][T24031] ? avc_ss_reset+0x190/0x190 [ 1145.221062][T24031] ? tomoyo_domain+0xc5/0x160 [ 1145.226317][T24031] blkdev_ioctl+0x276/0x1d10 [ 1145.230916][T24031] ? blkpg_ioctl+0xa90/0xa90 [ 1145.235615][T24031] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1145.241424][T24031] ? ___might_sleep+0x163/0x280 [ 1145.246263][T24031] block_ioctl+0xee/0x130 [ 1145.250581][T24031] ? blkdev_fallocate+0x410/0x410 [ 1145.255861][T24031] do_vfs_ioctl+0xd6e/0x1390 [ 1145.260450][T24031] ? ioctl_preallocate+0x210/0x210 [ 1145.265556][T24031] ? selinux_file_mprotect+0x620/0x620 [ 1145.271016][T24031] ? __fget+0x381/0x550 [ 1145.275185][T24031] ? ksys_dup3+0x3e0/0x3e0 [ 1145.279593][T24031] ? nsecs_to_jiffies+0x30/0x30 [ 1145.284440][T24031] ? tomoyo_file_ioctl+0x23/0x30 [ 1145.289539][T24031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1145.295779][T24031] ? security_file_ioctl+0x93/0xc0 [ 1145.301053][T24031] ksys_ioctl+0xab/0xd0 [ 1145.305193][T24031] __x64_sys_ioctl+0x73/0xb0 [ 1145.309777][T24031] do_syscall_64+0x103/0x610 [ 1145.314354][T24031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1145.320500][T24031] RIP: 0033:0x458da9 [ 1145.324415][T24031] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1145.345213][T24031] RSP: 002b:00007ff04e240c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1145.353613][T24031] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1145.361581][T24031] RDX: 0000000020000080 RSI: 0000000000001276 RDI: 0000000000000003 [ 1145.369814][T24031] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1145.377775][T24031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04e2416d4 [ 1145.385759][T24031] R13: 00000000004c0285 R14: 00000000004d2678 R15: 00000000ffffffff [ 1145.395080][T24031] Kernel Offset: disabled [ 1145.400647][T24031] Rebooting in 86400 seconds..