ave_0) entered forwarding state [ 145.947280][ T9158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.958221][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.966429][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.975116][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.983488][ T3615] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.990541][ T3615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.001062][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.010698][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.018529][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.033391][ T9155] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 146.044128][ T9155] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.055796][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.064923][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.073399][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.081686][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.090108][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.098348][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.106438][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.114711][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.122833][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.131008][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.138828][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.147583][ T9158] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.160774][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.169161][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.177389][ T3615] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.184405][ T3615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.192135][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.200673][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.208940][ T3615] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.215970][ T3615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.223818][ T3615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.236610][ T9155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.244000][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.264121][ T9158] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 146.274951][ T9158] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.289851][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.298924][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.307213][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.315774][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.326096][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.334880][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.342432][ T9153] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.361763][ T9158] 8021q: adding VLAN 0 to HW filter on device batadv0 02:04:18 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045540, &(0x7f00000004c0)={0x7}) 02:04:18 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, 0x0}}], 0x42f, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) pwritev(r0, &(0x7f0000001400), 0x31f, 0x0) 02:04:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x2) semctl$GETPID(r1, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0xf5, "05ea76b8740a098c61906913bc8fe7bed885106c7b6614c908d4d8febb767ff83648d02b2fc2adf33dc1fb8ae2f4b0f85f16c3784ddd86e6e2be4ac6b98e20ea7fb94540ac7e7b19a668f40af4b585e5ecb07757bdaa43873fb749b7671dd1e4f5a95e97b621e9e66cb40e790c94be2e83da54cff646fbc3a5ecdaad2806b89f17925536886446c5dec42680d3a3fa85a92209b07c6b57f6b246862b72d1d03d50847d0bb65736f518810d15e9a57a4689c90bea7abe99e50a029b7a18f22caa8ea0bd3bf58b8fb68d21671ac59b151b013b38a7530294de83521ccb616e5fcdda62106ddcd203c4890ba88819cd51da92e4153df8"}, &(0x7f0000000440)=0xfd) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={r2, 0x58, &(0x7f0000000480)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e24, 0x3b5, @remote, 0x1}, @in6={0xa, 0x4e21, 0x96e, @loopback}]}, &(0x7f0000000540)=0x10) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000580)={0x1000, 0xa}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @local}, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='team0\x00', 0x80, 0x10001}) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x44800) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000080)={0xa, 0x7, 0x9, 0x2}, 0xa) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) semget$private(0x0, 0x3, 0x204) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_DESTROY(r0, 0x5502) 02:04:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000d80)={"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"}) dup3(r1, r2, 0x0) dup2(r0, r3) 02:04:18 executing program 2: syz_open_dev$evdev(0x0, 0x4, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r2, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 02:04:18 executing program 3: r0 = socket(0x2, 0x803, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000080)={0x9, {{0x2, 0x4e24, @empty}}}, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') recvfrom(r1, &(0x7f0000000200)=""/167, 0xa7, 0x2, &(0x7f00000002c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8}, 0xffffffffffffff26) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, {0xa, 0x4e24, 0x7fff, @empty, 0x2}, 0x0, [0x5, 0x3f, 0x3f, 0x3f, 0x7, 0x0, 0xe003, 0x9cc6]}, 0x5c) 02:04:18 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 146.544323][ T9270] input: syz1 as /devices/virtual/input/input8 [ 146.555274][ T9274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 146.582958][ C1] hrtimer: interrupt took 30696 ns 02:04:18 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, 0x0}, 0x7}], 0x42f, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) shmctl$IPC_RMID(0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @random="543cdc4dc75f", 'nlmon0\x00'}}) gettid() pwritev(r0, &(0x7f0000001400), 0x31f, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x10) 02:04:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x5, [0x4b564d03], [0xc1]}) 02:04:18 executing program 5: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x369e5d84) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) 02:04:19 executing program 1: 02:04:19 executing program 2: [ 146.762871][ T9293] input: syz1 as /devices/virtual/input/input9 02:04:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/160, 0xa0}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) close(r1) recvfrom$inet(r2, 0x0, 0x530e, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) 02:04:19 executing program 1: poll(&(0x7f0000000000)=[{}], 0x1, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x6008fdfa26bc9e03, 0x0, 0x0, 0x800e00519) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) recvfrom$inet(r0, 0x0, 0xd263, 0x0, 0x0, 0x800e0051d) shutdown(r0, 0x0) [ 146.964115][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 146.964123][ T26] audit: type=1804 audit(1566353059.215:31): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir265725631/syzkaller.Lo28cI/3/file0/file0" dev="sda1" ino=16527 res=1 [ 147.940595][ T9274] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.947929][ T9274] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.237773][ T9323] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x2) semctl$GETPID(r1, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0xf5, "05ea76b8740a098c61906913bc8fe7bed885106c7b6614c908d4d8febb767ff83648d02b2fc2adf33dc1fb8ae2f4b0f85f16c3784ddd86e6e2be4ac6b98e20ea7fb94540ac7e7b19a668f40af4b585e5ecb07757bdaa43873fb749b7671dd1e4f5a95e97b621e9e66cb40e790c94be2e83da54cff646fbc3a5ecdaad2806b89f17925536886446c5dec42680d3a3fa85a92209b07c6b57f6b246862b72d1d03d50847d0bb65736f518810d15e9a57a4689c90bea7abe99e50a029b7a18f22caa8ea0bd3bf58b8fb68d21671ac59b151b013b38a7530294de83521ccb616e5fcdda62106ddcd203c4890ba88819cd51da92e4153df8"}, &(0x7f0000000440)=0xfd) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={r2, 0x58, &(0x7f0000000480)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e24, 0x3b5, @remote, 0x1}, @in6={0xa, 0x4e21, 0x96e, @loopback}]}, &(0x7f0000000540)=0x10) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000580)={0x1000, 0xa}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @local}, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='team0\x00', 0x80, 0x10001}) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x44800) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000080)={0xa, 0x7, 0x9, 0x2}, 0xa) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) semget$private(0x0, 0x3, 0x204) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_DESTROY(r0, 0x5502) 02:04:21 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x8) dup2(r0, r1) 02:04:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x80, 0x5) r2 = open(&(0x7f0000000500)='./bus\x00', 0x8141042, 0x80) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x0) pwritev(r4, &(0x7f00000007c0)=[{&(0x7f0000000840)="a83b0c489bb1495a8f900dd85c23abad4d8274f9e1f5ee02f8a8674fc2aeed12cbef7abc86cfd9804199c568790a850000ca93509c4c11b8d4fbae9500000000", 0x40}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd0) fcntl$setstatus(r2, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000700)=ANY=[], 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000680)='lp\xff\xbf\xfco\xd5\xaa\xfe\x1d\x15\xe2\x95Q\x87\xa4\'\xd0\xd8\xe3\xa1\x83\xf2A/\x80x\xe9\x11\x05\x8dOS\xdb\xc7`J\x94X\xbd\x9eXg\x7f\xfdQu\xcd<\xbfi1\xd4\xbbb\xe2\xf3,^\xbc\xbb\b\x8d#%\";+\xb8\xc3\x9ea\xde\xd2,S\xa1\x14\xbd\xe9\n3-\x88B\x1f\xa5\xba\xfc\x9fTZW\vG\xe4\x1a6\xdf\x14o.mU\x94t\x90P\x84\x7f\x16\x89\xf7S\x8e\x12U}[\xa6\xe7\"`\x14\xdf\x04z:', 0x80) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r3, r2, 0x0, 0x80005) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000340)=0xfffffdd1) r8 = syz_open_procfs(r7, &(0x7f0000000380)='envh&on\x00') ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000800)=@generic={0x1, 0x10001, 0x80000000}) write(r2, &(0x7f0000000080)="124d4c9662ca9f18781d90bf3b8b517d2c26f1ae98b7fb96f1e1adc17b95281c8114", 0x22) syz_open_procfs(r7, &(0x7f0000000140)='autogroup\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000780)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1) syz_genetlink_get_family_id$SEG6(&(0x7f0000000900)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000600)={&(0x7f0000000300), 0xc, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="01dbdf25042300001bc3affcee2e68d908b1aa94a500fe80840000000000000000000000080000c08a2293966c589b82720c5039553ba8e8bcefecd9d14bc7ee815db35a37d1ab3e4e9333a928433a"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x4) io_setup(0x7, &(0x7f0000000180)=0x0) io_cancel(r9, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x4, r3, &(0x7f0000000580)="938b3dfaa643c8cc535a1a305254b25bb0bfc827dab4771faab076dddb46fcafeac5fd7a5f3a0ce6e5c7df1f2c326b03fa2a9b8e011c8bc8a6be809dd141f43dd23e4f0d12c0f8141e6589341430f200363d3f93479495b29d969f5cb1845f", 0x5f, 0x17, 0x0, 0x1, r8}, 0x0) 02:04:21 executing program 2: 02:04:21 executing program 1: 02:04:21 executing program 3: 02:04:21 executing program 3: 02:04:21 executing program 2: 02:04:21 executing program 1: 02:04:21 executing program 2: 02:04:21 executing program 1: 02:04:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x2) semctl$GETPID(r1, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0xf5, "05ea76b8740a098c61906913bc8fe7bed885106c7b6614c908d4d8febb767ff83648d02b2fc2adf33dc1fb8ae2f4b0f85f16c3784ddd86e6e2be4ac6b98e20ea7fb94540ac7e7b19a668f40af4b585e5ecb07757bdaa43873fb749b7671dd1e4f5a95e97b621e9e66cb40e790c94be2e83da54cff646fbc3a5ecdaad2806b89f17925536886446c5dec42680d3a3fa85a92209b07c6b57f6b246862b72d1d03d50847d0bb65736f518810d15e9a57a4689c90bea7abe99e50a029b7a18f22caa8ea0bd3bf58b8fb68d21671ac59b151b013b38a7530294de83521ccb616e5fcdda62106ddcd203c4890ba88819cd51da92e4153df8"}, &(0x7f0000000440)=0xfd) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={r2, 0x58, &(0x7f0000000480)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e24, 0x3b5, @remote, 0x1}, @in6={0xa, 0x4e21, 0x96e, @loopback}]}, &(0x7f0000000540)=0x10) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000580)={0x1000, 0xa}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @local}, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='team0\x00', 0x80, 0x10001}) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x44800) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000080)={0xa, 0x7, 0x9, 0x2}, 0xa) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) semget$private(0x0, 0x3, 0x204) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_DESTROY(r0, 0x5502) 02:04:21 executing program 3: 02:04:21 executing program 4: 02:04:22 executing program 5: 02:04:22 executing program 1: 02:04:22 executing program 2: 02:04:22 executing program 3: 02:04:22 executing program 4: 02:04:22 executing program 0: 02:04:22 executing program 4: 02:04:22 executing program 2: 02:04:22 executing program 1: 02:04:22 executing program 3: 02:04:22 executing program 0: 02:04:22 executing program 5: 02:04:22 executing program 2: 02:04:22 executing program 4: 02:04:22 executing program 5: 02:04:22 executing program 0: 02:04:22 executing program 1: 02:04:22 executing program 3: 02:04:22 executing program 2: 02:04:22 executing program 4: 02:04:22 executing program 1: 02:04:22 executing program 5: 02:04:22 executing program 0: 02:04:22 executing program 3: 02:04:22 executing program 2: 02:04:22 executing program 4: 02:04:22 executing program 1: 02:04:23 executing program 0: 02:04:23 executing program 5: 02:04:23 executing program 3: 02:04:23 executing program 4: 02:04:23 executing program 1: 02:04:23 executing program 2: 02:04:23 executing program 3: 02:04:23 executing program 0: 02:04:23 executing program 5: 02:04:23 executing program 3: 02:04:23 executing program 1: 02:04:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x5, [0x4b564d03, 0x7], [0xc1]}) 02:04:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/249, 0xf9}, {0x0}], 0x2) recvfrom$inet(r1, 0x0, 0xa1a2, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000004000)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000003ec0)=""/91, 0x5b}], 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000180)=[{&(0x7f0000000040)=""/108, 0x6c}], 0x1) shutdown(r3, 0x0) shutdown(r1, 0x0) 02:04:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:23 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:04:23 executing program 1: poll(&(0x7f0000000000)=[{}], 0x1, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x6008fdfa26bc9e03, 0x0, 0x0, 0x800e00519) setsockopt$inet_group_source_req(r0, 0x0, 0x53, &(0x7f00000000c0)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) recvfrom$inet(r0, 0x0, 0xd263, 0x0, 0x0, 0x800e0051d) shutdown(r0, 0x0) 02:04:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000010fcffff0f4000005fdabd02622ad07c1702000000003c826e8c00000100"/51], &(0x7f0000001780)=""/231, 0x2a, 0xe7, 0x1}, 0x20) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3f, 0x80000) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) 02:04:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x18, 0x249e1e, 0x8000000002}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f00000017c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200), &(0x7f0000000040)}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x10a, 0x1}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 02:04:23 executing program 3: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)={0xf0000007}) shutdown(r0, 0x0) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f00000001c0)={0x0, 0x989680}, 0x0, 0x0) [ 151.152236][ T9463] Unknown ioctl 1075339789 02:04:23 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000002c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dlm-control\x00', 0x20000, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="8044b66554d0dccf1c776a2f5ddf78f47bb7"], 0x0, 0x12}, 0x20) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], 0x1f004}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000840)={0x0, @aes256, 0x2, "84c6fef358f39d99"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000740)=ANY=[@ANYBLOB="8700bdf5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000780)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000007c0)={r5, 0x8, 0x10000, 0x1, 0xffffffffffffffff, 0x80}, 0x14) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0x9, 0x0, &(0x7f00000016c0)) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 02:04:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 151.183151][ T9472] Unknown ioctl 1075339789 02:04:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:24 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x8000000000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000540)=0x1f, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xb2, "73887b2e5b4f3cd6dab1e4667a7c2f9a46d82cc7626b7d96b0e42fcc0283d04fa19ae785c58aa862bd7bd60ac189d53fda79a45d55edb922b0da865aeedd5cf52360f92231f7d421470d862bc881ba44092ebacfa3798afd4d6d8a5fa1fdc69dd2571a9d8b4729f252e418ff2357747a018151694e212f07a626955809316fb48223e2786084b555a477d5b285c9e34a127e5e0eff679843671351f5a540399df3993864c072ad623a17dc76b973b62a6ca8"}, &(0x7f0000000440)=0xba) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000480)={r2, 0x7}, &(0x7f00000004c0)=0x8) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x80, 0x0, 0x0, 0x4, 0xfffffffffffffffc}) r3 = syz_open_pts(r0, 0x84042) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x2c9c, 0x0, 0x9, 0x1000, 0x0, 0x7, 0x2ea12, 0x891420a24a5f2652, 0x1, 0x4, 0x7ff, 0xa5a, 0x8, 0x80, 0x4, 0x6, 0x20, 0xf4d7, 0x8, 0x7, 0x3, 0x4, 0x8000, 0x5, 0x2400000000000000, 0x6, 0x9, 0x1f, 0xc8, 0xfffffffffffffff7, 0x7fff, 0x8, 0x6, 0x1, 0x7fff, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x10001, 0x4a7}, 0x0, 0xfffffffffffffffe, 0x7ff, 0x1, 0x200, 0x2, 0x5}, r4, 0xc, 0xffffffffffffffff, 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00fb15f313"], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC, @ANYRESOCT], 0xffdf) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000500)) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000140)={0x84ed}) socket$inet6(0xa, 0x2, 0x3) pwrite64(r3, &(0x7f0000000340)="171f555769f76213a53076796b9598aef276ce2bd03a70028b4b7a19c7ad40cac6ca3b9fe1134819ebc80af32b3c05fd8cbda1e62c95a0ef27549f51543ee548a4e50b1431d60d819869504da272fddbbbe1a6f603d4eddf74a052511e4e68d7ebe9f840094bbae4d4794fd7650d14aef94b42ba3d5c8bc9270f6f5e8797e9deb4e36bf0a42114b010911b41d082bb6a0b21e83e5e7e7cddd29e699fd40a8ff4aa08562627df9d8792c48f587eb3bb51de147d7bee7ef308806451f95043ed3688e29076ee895922273a8944", 0xcc, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)) 02:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:24 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000002c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dlm-control\x00', 0x20000, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="8044b66554d0dccf1c776a2f5ddf78f47bb7"], 0x0, 0x12}, 0x20) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], 0x1f004}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000840)={0x0, @aes256, 0x2, "84c6fef358f39d99"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000740)=ANY=[@ANYBLOB="8700bdf5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000780)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000007c0)={r5, 0x8, 0x10000, 0x1, 0xffffffffffffffff, 0x80}, 0x14) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0x9, 0x0, &(0x7f00000016c0)) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 02:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:24 executing program 0: add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000080)=0x4) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)={0x0, 0x0, @pic={0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0xf8, 0x0, 0x8000, 0xa75, 0xffffffffffffdc4c, 0x1, 0x9, 0x7f}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x10000000000000d, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x1}) finit_module(r0, &(0x7f0000000000)=']posix_acl_access%$+\x00', 0x1) 02:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:24 executing program 3: sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_ALGID={0x8}]}, 0x24}}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000040)) ioctl$void(r1, 0xc0045878) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 02:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') 02:04:24 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 152.279234][ T9540] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 152.301173][ T9540] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:04:24 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") timer_create(0x3, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000500ff0)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x109000) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000140)={0x0, {0x9, 0xffffffff}}) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x200000000000000, 0x80000) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000100)={r2, 0x0, 0xfffffffff0000000, 0x100000000}) 02:04:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) r2 = gettid() ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000001c0)=0x1) mq_notify(r1, &(0x7f0000000040)={0x0, 0x41, 0x1, @tid=r2}) bind$inet6(r0, &(0x7f0000000680)={0xa, 0x4c22, 0x0, @rand_addr, 0x6}, 0x1c) listen(r0, 0x1000004) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000200)={0x4, 0x7}) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x6e, @rand_addr, 0x10000000000000}, 0x1c) shutdown(r3, 0x2) r4 = accept4(r0, 0x0, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000280)) r5 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x5000) shmdt(r5) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000012c0)={0x3, @output={0x1000, 0x1, {0x7}, 0x6, 0x5}}) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000080)) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000000c0)=0x2, &(0x7f0000000140)=0x4) fcntl$setpipe(r3, 0x407, 0x7fffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) write$binfmt_aout(r4, &(0x7f00000002c0)={{0x108, 0x3, 0x4, 0x17e, 0x1c8, 0x80, 0x134, 0xde}, "51fb796d1c53b689deae7479600f95b48329757be0caf44da0563fffc2572942ecd4460f69115c55efcd8bafea95899419768237a8ae4d", [[], [], []]}, 0x357) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000180)=0x4, &(0x7f0000000240)=0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000640)='y\x00', 0x2, 0x3) 02:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') [ 152.381160][ T9540] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 02:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 152.450568][ T9540] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 02:04:24 executing program 0: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3, 0x5, 0x0, 0x0, 0xff}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = msgget(0x3, 0xa8) msgrcv(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x57, 0x3, 0x1000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={r0, 0x7f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:04:24 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 152.510963][ T9540] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:24 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="0b4272481779ad684b3e8310b4f2fb174c4cf416ded73dc45bdb8d93193181a08f334b860161fb006f93b01559d5fe55e2112ed3c8d7a18fc05d05c21630f751b2fd332299e5b82d465198e431a2af2317d7deebef45f2b3b7f98cb6dc007847a564e262aad00b613c61bda9dfc09aae7a7f498da76708a39690d1bc17", 0x7d}, {&(0x7f0000000200)="8363524c7234d011f2cc480b0814d2801ad4c9d62460376d57c3a24e514932204644f9a70d4b9b84ec8f643e535302feb40e4afe7ff528848c4b674f8e8390ef5577dd40bd9cad4a98bf7fda96b4c89b0421572ca3521fe3c81c60b7712717aa44bee02a99c6e65819c59fcf8838bafaed7a844c46bc755c02674c8febce8b72bff9946e0fce6ba5ad129cd50d44ff948893fecfc5837fe718abb1b24b464ff910f5e14590b486b61628444bfe7714cbe98b9c3c8308aef40a5875f4d8a3397389ba73793a5de215d216cf85113decb1b10e8458596880136201623e6d9823f3da7c2baec7bf6269a30f", 0xea}, {&(0x7f0000000300)="962eb9e24de4cabae04eae21e1d76038393af3cd90c3a5bb9e044d37b1fe0a3ecdbe1a93b3bedba5417170a5f93aaf89373c7c32b949706cafe75c180014ed7edfbf527cc2c94acef07b162a7de369afa1ec2234a4af4c8633232b9bb88c90f921eb9567e5e8b0e6fd1362a77026c540101952265098592652bb71496fc6e47d6f1a6f9ee25871f703334f2b33a35fbb6c160c60f6e8bf3734c1f5d36c708411ef51ef5e00ee533d7e5ce36d4f5814a9354f8db11f05dada4f4074bbc0e916bf3fa720", 0xc3}], 0x3, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup2(r0, r1) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000001c0)={0x1, 0x10001, 0x0, 0x0, 0x6, 0x2, 0x5, 0x81, 0x9, 0x8001, 0x7, 0x3, 0x0, 0xffffffff, 0x5, 0x2, 0x9, 0x1, 0x8}) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x36cc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 02:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:24 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:25 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x5, 0x3) getsockopt(r2, 0x8, 0x3, &(0x7f0000000000)=""/19, &(0x7f0000000040)=0x13) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000180)={0x1f}) 02:04:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x100002002) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x100) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 02:04:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="0b4272481779ad684b3e8310b4f2fb174c4cf416ded73dc45bdb8d93193181a08f334b860161fb006f93b01559d5fe55e2112ed3c8d7a18fc05d05c21630f751b2fd332299e5b82d465198e431a2af2317d7deebef45f2b3b7f98cb6dc007847a564e262aad00b613c61bda9dfc09aae7a7f498da76708a39690d1bc17", 0x7d}, {&(0x7f0000000200)="8363524c7234d011f2cc480b0814d2801ad4c9d62460376d57c3a24e514932204644f9a70d4b9b84ec8f643e535302feb40e4afe7ff528848c4b674f8e8390ef5577dd40bd9cad4a98bf7fda96b4c89b0421572ca3521fe3c81c60b7712717aa44bee02a99c6e65819c59fcf8838bafaed7a844c46bc755c02674c8febce8b72bff9946e0fce6ba5ad129cd50d44ff948893fecfc5837fe718abb1b24b464ff910f5e14590b486b61628444bfe7714cbe98b9c3c8308aef40a5875f4d8a3397389ba73793a5de215d216cf85113decb1b10e8458596880136201623e6d9823f3da7c2baec7bf6269a30f", 0xea}, {&(0x7f0000000300)="962eb9e24de4cabae04eae21e1d76038393af3cd90c3a5bb9e044d37b1fe0a3ecdbe1a93b3bedba5417170a5f93aaf89373c7c32b949706cafe75c180014ed7edfbf527cc2c94acef07b162a7de369afa1ec2234a4af4c8633232b9bb88c90f921eb9567e5e8b0e6fd1362a77026c540101952265098592652bb71496fc6e47d6f1a6f9ee25871f703334f2b33a35fbb6c160c60f6e8bf3734c1f5d36c708411ef51ef5e00ee533d7e5ce36d4f5814a9354f8db11f05dada4f4074bbc0e916bf3fa720", 0xc3}], 0x3, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup2(r0, r1) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000001c0)={0x1, 0x10001, 0x0, 0x0, 0x6, 0x2, 0x5, 0x81, 0x9, 0x8001, 0x7, 0x3, 0x0, 0xffffffff, 0x5, 0x2, 0x9, 0x1, 0x8}) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x36cc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 02:04:25 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0}) 02:04:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:25 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r0, &(0x7f0000001440)="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", 0x566, 0xc001, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240)="f11d9485945532b02c13b63ecca90bcd5e45aae6c27dcfb60d8f3b82d09721908ec5fd0cd4fc40b461afc79758bb2ebb7ba7e67fc49a3d4bb896b2", 0x3b, 0x10008000, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x7, @ipv4={[], [], @multicast1}, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="c5cbdeda579d85f4a014ee69", 0xc, 0x0, 0x0, 0x0) 02:04:25 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0}) 02:04:25 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x7, 0x2, 0x1, 0x0, 0x0, [{r0, 0x0, 0x10000}]}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000080)) r2 = dup(r0) getsockopt$inet6_tcp_int(r2, 0x6, 0x8, 0x0, &(0x7f0000012ffc)=0x80fb268a) [ 153.431152][ T9646] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:04:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:25 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0}) [ 153.510094][ T9644] sysfs: cannot create duplicate filename '/class/ieee80211/:%!ime_type' 02:04:25 executing program 1: bind$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x1}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4050000000000000800000000000000630000004c010000009500000000000000"], &(0x7f0000003ff6), 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x468002, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x7f}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x3, 0xb38, 0x40, 0x1, 0xffffffffffffffff, 0x8, [], 0x0, r0, 0x0, 0x1}, 0x3c) [ 153.591650][ T9644] CPU: 1 PID: 9644 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #84 [ 153.599577][ T9644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.609626][ T9644] Call Trace: [ 153.612920][ T9644] dump_stack+0x1d8/0x2f8 [ 153.617251][ T9644] sysfs_warn_dup+0x9c/0xb0 [ 153.621753][ T9644] sysfs_do_create_link_sd+0xc2/0x120 [ 153.627114][ T9644] sysfs_create_link+0x68/0x80 [ 153.631881][ T9644] device_add+0x9e3/0x14e0 [ 153.636293][ T9644] ? trace_lock_release+0x135/0x1a0 [ 153.641483][ T9644] ? ieee80211_set_bitrate_flags+0x741/0x750 [ 153.647441][ T9644] wiphy_register+0x1bdc/0x2dc0 [ 153.647456][ T9644] ? ieee80211_register_hw+0x134c/0x3da0 [ 153.647464][ T9644] ? ieee80211_cs_list_valid+0x280/0x2d0 [ 153.647471][ T9644] ? ieee80211_register_hw+0x134c/0x3da0 [ 153.647480][ T9644] ieee80211_register_hw+0x1efd/0x3da0 [ 153.647487][ T9644] ? ieee80211_register_hw+0xc91/0x3da0 [ 153.647495][ T9644] ? ieee80211_register_hw+0xa91/0x3da0 [ 153.647510][ T9644] ? hrtimer_init+0x11d/0x1d0 02:04:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) close(r1) readv(r1, &(0x7f0000000080)=[{&(0x7f0000001180)=""/150, 0x96}], 0x1) [ 153.657941][ T9644] mac80211_hwsim_new_radio+0x1ca7/0x3710 [ 153.657959][ T9644] hwsim_new_radio_nl+0xb35/0x1000 [ 153.657974][ T9644] genl_rcv_msg+0xb52/0x12b0 [ 153.657993][ T9644] netlink_rcv_skb+0x19e/0x3d0 [ 153.658000][ T9644] ? genl_unbind+0x250/0x250 [ 153.658016][ T9644] genl_rcv+0x28/0x40 [ 153.670112][ T9644] netlink_unicast+0x787/0x900 [ 153.670127][ T9644] netlink_sendmsg+0x993/0xc50 [ 153.670141][ T9644] ? netlink_getsockopt+0x9f0/0x9f0 [ 153.670151][ T9644] ___sys_sendmsg+0x60d/0x910 [ 153.670167][ T9644] ? rcu_lock_release+0xd/0x30 [ 153.681117][ T9644] ? rcu_lock_release+0x26/0x30 [ 153.681126][ T9644] ? __fget+0x4e6/0x510 [ 153.681138][ T9644] ? __fdget+0x17c/0x200 [ 153.681147][ T9644] __x64_sys_sendmsg+0x17c/0x200 [ 153.681164][ T9644] do_syscall_64+0xfe/0x140 [ 153.691333][ T9644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.691341][ T9644] RIP: 0033:0x459829 [ 153.691351][ T9644] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.691356][ T9644] RSP: 002b:00007fbc1834ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 153.691364][ T9644] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 153.691373][ T9644] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000005 [ 153.752981][ T9644] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 153.762104][ T9644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc1834b6d4 [ 153.762109][ T9644] R13: 00000000004c7729 R14: 00000000004dcf30 R15: 00000000ffffffff 02:04:26 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@rand_addr=0x1, @loopback}, 0x21a) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@multicast2, @loopback, 0x0, 0x1, [@multicast1]}, 0x14) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x1, [@multicast1]}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080)={{0x3f, 0x7fffffff, 0x4, 0x7b115bd2, 0x8, 0x4}, 0x6}) 02:04:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xff, 0x40) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x21}, 0x4e24, 0x3, 0x4e24, 0x7, 0x2, 0x80, 0x20, 0xa9480f7c0e367c18, 0x0, r2}, {0x1, 0xfd5, 0x6, 0x4, 0xffffffffffff7fff, 0x35c50768, 0x9a}, {0x9005, 0x800, 0x9, 0xfffffffffffffff7}, 0x3f, 0x6e6bbc, 0x2, 0x1, 0x1, 0x2}, {{@in=@multicast2, 0x4d4, 0x33}, 0xa, @in=@rand_addr=0x574, 0x3500, 0x3, 0x2, 0x15, 0xffffffff, 0x1, 0x5}}, 0xe8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000000c0)={0x88ad, 0x1ff, 0x9, 0x7, 0x7, 0x2}) r4 = openat$cgroup_int(r0, &(0x7f0000000100)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r3, r4, 0x0, 0x7) 02:04:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) 02:04:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x2e, 0x0, 0x3f00000000000000, 0x100000000000000}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 02:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) 02:04:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x4, 0xa, 0x6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0xffffffffffffff92, 0x0) 02:04:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) semget(0x3, 0x0, 0x88) semget(0x2, 0x4, 0x4) semget$private(0x0, 0x0, 0x0) semget(0x0, 0x4, 0x4) semget$private(0x0, 0x4, 0x40) semget(0x3, 0x2, 0x200) r1 = semget(0x3, 0x4, 0x0) semctl$SEM_INFO(r1, 0x4, 0x13, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) r3 = dup2(r0, r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0xaea7dc53d0520f0e, 0x8000, 0x1, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @null]}) 02:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) 02:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:26 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80800) pidfd_send_signal(r0, 0xa, &(0x7f0000000100)={0x39, 0x10001, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x1, 0x9}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={r2, @in6={{0xa, 0x0, 0x0, @empty}}, 0x9, 0x4}, 0x254) 02:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x200000) r1 = epoll_create1(0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_dev$usbmon(0x0, 0x0, 0x10080) openat$full(0xffffffffffffff9c, 0x0, 0x2040, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ptrace$peekuser(0x3, r2, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) dup3(r0, r1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f0000000100)) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x301800, 0x0) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000140)=0xd63b) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000340), 0x4) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x0, 0x100004) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000400)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bond\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) ftruncate(r7, 0x2007fff) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) 02:04:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x2, &(0x7f0000000000)) 02:04:26 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet(0x2, 0x6, 0x7) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000200)={0x7, {{0x2, 0x4e24, @broadcast}}}, 0x88) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r3, @in={{0x2, 0x4e24, @rand_addr=0xab81}}}, 0x84) listen(r0, 0x4d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000002c0)='syzkaller0\x00', 0x10) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r2, 0x10d, 0xdc, &(0x7f0000000040), &(0x7f00000000c0)=0x3b8c3dfc45cf9699) 02:04:26 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{}, {0x3, 0xffffffffd927d9bc, 0x0, 0x0, 0x0, 0x0, 0x62c, 0x3, 0x0, 0x0, 0xffffffff, 0x0, 0x100000000}]}) bind$llc(0xffffffffffffffff, &(0x7f0000000480)={0x1a, 0x338, 0x0, 0x8, 0x5, 0x3f, @dev={[], 0x16}}, 0x10) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000180)={{0x0, @remote, 0x0, 0x0, 'dh\x00'}, {@multicast2, 0x0, 0x0, 0x0, 0x0, 0xbbf}}, 0xfffffffffffffefd) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000300)=0x1, 0x4) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 02:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:27 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 154.703812][ T9777] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:04:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(0x0, 0xbdc1ccfaa8a73c42) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x20, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="8e0000000ab5eef90bd6d36d142d8d0220ebf33cb431b82b2e4970b48f956d20b1ac36edd08a889de233e8266fd1b9d928611e42e8386074e6649af2e75760fa995a251f92a22f878b1ee5b8b575d8526447f80e43283f580281e2a5362f82ff6a1fdfd9df67f8145b8809de6413fd81f33ebcca809a5e26cd5099110e50b58bbe34461dfc45"], &(0x7f00000001c0)=0x96) 02:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:27 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x4) chdir(&(0x7f0000000240)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x2000, 0x0) 02:04:27 executing program 1: openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x802) r1 = dup(r0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000000c0)=0x7f83701a) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x545200, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) dup3(r0, r1, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f00000001c0)=""/224, &(0x7f00000002c0)=0xe0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0xffffffffffffffd5}, 0xfddf) 02:04:27 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000600)='attr\x00w\xec\xd16p\x0e\xf1\xab|x\xf3\xdcO\x1a\xeb\xbb\x10\x83\x9b\xf8\xca\x13\xc9\xecc\x03\xfat\xe7r\xb4:r\x8e6\xb0\xfd\xf9\xd2\xb4=\x1c\x9f!\xab\x05r\x929\x12\x0e\xb5\xf4\f\x1e\xdb\x04\x007\xf07\x91\f\xc3\xb6\xca:\xaf\xb4\xb4\xe6k\vb\x88Eq{\xd6\x0e7R\xa4\xd0\xc1\xbd\xdb\x9d8\x86\x82U\x955\'\xcbE\x90\x7f~\x96\x8c\x81B\x18[\x9d\xdb\x86\xf0\b\xce?\t\xce\xb1\xe9\x8fV\xbae\xf9\x0fV\x00\x00\x0e\xe9\xf2\xdc\xd5\xf0>\xc0j\xe1\xd3\x92\xaa\x16\xf3\xce@\x10~\xcb:^\x9f\x0e\xb7Xx[\x0f\xafE+K{0\xbd\xae\xc73\x1fR!\xbaY-\x86\xf1\x81lB\xd6\x12\xb4R>\x0f\xdc%\x88g\xdc\x8e\x99\xae\x9322%\xa1+\xa5eh\xaa\xca\xff\x95\x87S\xfe\xcfs\xa6\xb6\xf0\xfah\x1c\xa4IW\xe5\xa7\xf7N\xa9\xcd\xe5\xf2UA&z\x83\xc7N(\x980\x17uL\x8c\x16\x86GQ,\x16\xbd\x98\xb4\xf4\xcf\x12\xd3\xdd%%\xa2\xdfr0@ =\x83\v_S\xee@\xa4W\xba\x8e\xf9\xda\xfe\xbc$X\x98\xa8\xdb\xc7\ro\'\xd9fk\xf5:`\x93\xff\xa3/\xbc\xd5\xef\x01 F\xc1\xe4\xe4)\x05W\x95(Fg\xbc\x1b\x8ar\xe3\"\x82\x87\xa8\x04\xfe\xe8?\x8c\x16c\xe6\x7f\xfe\x016/\xe2\xd6\xdd\xcb\x86\xe7\x95\x95F\'\ak\b\xe5') r1 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\x00+e\x00\x00\x00\x00\x00\x00\x00\x00\\\x8d') fchdir(r1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="bf"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000380)=[0x0], &(0x7f0000000040)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x40000000000000f4, 0x9}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) 02:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:27 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000001740)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001880)=0xe8) connect$can_bcm(r0, &(0x7f00000018c0)={0x1d, r1}, 0x10) msgget(0x0, 0x38cd747aa22bff53) 02:04:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$nl_generic(0x10, 0x3, 0x10) 02:04:27 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x97d8) mmap(&(0x7f0000701000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3) read(r0, 0x0, 0x0) 02:04:28 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000080)=""/208, 0xd0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x81, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x100000001) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000180)={0x36, 0x38, 0x0, 0x1, 0x4, 0x9, 0x5, 0xac, 0x1}) 02:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000012c0)={'icmp\x00'}, &(0x7f0000001300)=0x1e) fcntl$getown(r0, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, r2) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "5c72808ee5b79d07", "11f15be576d9b7ebbc418ba108dc4543", "98470099", "acf4afebc67f33d6"}, 0x28) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000340)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x20008000}, {&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000180)="ffa2dbb7fa0d24fc889c290ab0fc8b936deb4d96d7ad8ae70330b567d0fc69540abbc8965e243f304a36fb8450d5b36f8039def735eaae6d4d9aa98aa66ca8f86f156c073ce51d35bcdfffa70a0c0d3e278b9af03ac6675f0dc5fe056be598c6752f9b23eee014589866e595d38031c9c4ef6f005733079f930a05fcb88d241b61e8cd77235c2448d8e5166263132992dac924b8028e0de42f57df1af2afde29c371318d230dfe00a5565bd49f2553b2a64d14aeb73f8f385c08f018db42a17e", 0xc0}, {&(0x7f0000000240)="dd04331c7e12c9929511e8c58e6c8f163b56f3018e029cdd6b38499014d3cd0223429525679f1963ef6007dec23ac45703a04d6c8439a6a3a90766c301938766524655991fae99650ef11b6d99cab490d5c3d1e19210b62a49f6a33840c425167be04762197c7151671307ea3ade9359abc9464aaf01031023e66f179ca8e0aec45bcfdc96c5ad9442e5cb8b3b9b9fc0a2295b89472c571f97da381f95ca467053a6b09eb9c454be0c489425f0c8f71141591d6213", 0xb5}], 0x2, 0x0, 0x0, 0x9d90274b68a5a88}], 0x2, 0x8000) 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:28 executing program 0: r0 = memfd_create(&(0x7f0000000140)='GPL\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='~E\t'], 0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) 02:04:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000079c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xd1, &(0x7f0000007a00)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000000000)=@sco={0x1f, {0xffff, 0x4, 0x7, 0x1, 0xfffffffffffffff8}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3e87fe22c5821fa619957c0183b2633a241e8bc045f81ae2144960c2e33aade7a8543eddba019ebaa9e4a60c38a2e00b4811e4e28f79ebf4b3277c4abbc90392ccee28217fc61a485cd1472ed606ca3da07258bce23ee3eb7e300dfbdbbe941e3da0cf86944b9810e8f670d5a94800dc0c5fdc2e312b1623fedbbf3991ab60a5cd05cbea4183f08c8add7757bbaf4d5712e45562cf9365cb8c8017dc47013097a2ea7abc8e09b2e82fab918d7065994eac49bf3d969428aaf98003442e3813d87e223b5c6d3c264b5c5f55babfc4a3a9cd8e06b336406de7578950e8f4f87c9f721cc8", 0xe3}], 0x1, &(0x7f0000000280)=[{0xd0, 0x10b, 0x6, "efdd016a8c6511f09a61cdf230ed35732b50162015e62ecbf356525f6c0382bb249d6085d9abb180e2b9350312c0486a7bfda5b3f5d644a6857aeee5f038ae8cffaf127ce0555160f7f955c3783218685102fdbdd21a69cff4dc5a4eefe682a49680be32688ca9b5ebe78385ca07593f3d50c4f52ccff8bf4b33313e71e3fcbd5703bee79b2a5b4aad4e7476f6b48516b302853698ee18b78642127fe7458053676bdadc5cf189563f6e4c1a8c91e068c90e9f5873cca68fb29792bd8f"}, {0xf8, 0x1ff, 0xfffffffffffffffd, "2405abc453da2ec79ffd15a99d2bb77e4138c862e6fb20f7e31a4eebd525ae9d8e6e5f02b19ef9a48ea5973663c7dad54026bacf72d82232387585f7f075359c76a506ac363d93b0325e6175c746f22193730131177e7636d8d37db389c850d1c02e09a967789ceb4a437716125da1adec9661b79962eebcbdb814c1a5f896bb47c50c00432e92f63b5958536381ba8ac0d03c25f3aa30ec3988d22409a3b94640520ea53e31ed6a35e8052b77cafe95bd100fe3411f0d166beb588c50fc34bec08555d33ff1b986165702fd96fb9592ff218ca23f34d0fddc8279126f7c88eaa1f6a5"}], 0x1c8}}, {{&(0x7f0000000480)=@sco={0x1f, {0x8, 0x0, 0x5, 0xfffffffffffffff8, 0xad, 0xac8}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000500)="bca82bdf8a0e3a29aaa01214bf7300a2e3ae6916f80132c552405d52dca7317260cf2b877d31f439ec82c87a41a5be3c3920de8369dff20fea7b04669297d2c33240afb2cc309e50ff2c3982c1e94537df9803a3605dbabe5d916c3835fa7c7c4b42907c86122d156132b86191e3c7e2e932db543442cb4043c8894246e0a1e5d2b182fa0147add7fd9ba5fc8427298fcc7fb3", 0x93}], 0x1, &(0x7f00000005c0)=[{0xb8, 0x10e, 0x6bb183ad, "033f1fec038f88f767f17df53070a77570b18b9454b569bb0df306a499e58c000eb19e15d7b6cb39467dfe496f6a4f99f852651a8b5c971c8e1fecc2041ea9ef3bbb522da05a394121f20f5a3e0a6fa2867a1dad341d9609cfece4354e6bf8eea1826b57c3f08930ac0fa539dcaa6fabb11522fd52e030e22593a6b980f64a1944f355f2bb1c92aeaa6c693811da29decbe0f0fd9ac99e1a5b38d10909504d5bc053ffd2ded7ac"}, {0xb0, 0x105, 0x0, "92d7d1dc63a4da5b0121bffeeed50b5081e599251da559b2641c5049675270f02e0af4722fc6ff2b5def367bfd46b00db1945afc9ab31cebbc7bbb6598d648e71f71a74d590d3b2f552fe3899e561272d42b4ea0d815869080d563d6f094579979c46d28956b0825e3b134f40c43cd49225d48ec4bee185778cbab1b653fde23bc5676aa151ae55d2f82d7579cd2eb0923b922a1407e06c709c7"}, {0xa0, 0x47f4920e4f622ded, 0x20, "26ac57db1586b5d46d38438b2c91753ca41f3bd83cc29f672dad6108c12b03e243b7c266a73673a5043db137afa0921401e0011620cbef72d304e5eafb3f15bafff3fd51336a649bafcfa91d4e4870674d8dad8a7eaaf433e82bedbca5afc00f452fc714dd04c23ec324a111fb8703b6ee1b752262e19d3f224982175e785d03ab8e0b4ec2aa377ef86e5ffe"}, {0x30, 0x84, 0x20, "25337690876ae616b7827e544d7e98d885fbb35010f84d8647bdf03f74"}, {0xd0, 0x106, 0x3f, "c57b51e0213224d31f8bf1828ac82469b6c77917de3f1e227d6428892f14785b9e586c91ed17c2d82403034da7b1bfe1e257ab66241b8683e4c26021a959c903586104b24e30b5c5a1556811f05bd6f3172a4d0b862d2b451fc3d7e0e2fa314a9726df71214f9f76df4b76df77f73c29c1b60cd512860c9e57a2cbc20c37aea220cdc31b3f75dfae8e57128a557857dcf20358903dda07212aed57516cde7a363971e2d8eaa3e2d46a9645809638f1bb54d500f187746df0d9479e64dbb7e6"}], 0x308}}, {{&(0x7f0000000900)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000000980)="1549d85e5d98f7fdccebb23e0cb8c30279e586766365419397f93fc79c67917c7318d2852c739c28e148dfaf3e63f07487db9b6b5803b3571ce6db16c4b932922252de14fe21498af48159ed42765e8e4ccfb7d761c33c4bff34d659be046735fee14acc515c5be3e01511c5e04abd368d5baf336339362fea49d9bb38f447a5c92e8a0e7dfe7df880b9a54c1f594e54764ea368b023cefb52a915434144b100725ccc55f68cfa5d546cab980da8a8fe8f30577a440b4112ffb76ac88caa2900d7152a9cb8e568e19f0433cd19df4612483f65", 0xd3}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="c5c60285928d478a0fe8f6a8ba91ac3af0055bdfe8399fc76edc2da804eb84367221aaa18f66d6bf21af59d18668e59472604beadb5f59ba6c8b9d2cd63ae557356a586d9bc1fbecfcf65778d3af4fcaf193e2f62a1203854630f6923515d8eef37f4569f32744e2e4526747d970c411e3be24eafa3f6d5d45c824a509bafca222a7938bb9318dc95a23b53d88e21ba910f27bb251432a1515aa123ec50be5f64b5b3474ada767e85a9575ffa6bc24d3d3ba42e9af2a53976d8195b9c408f5918b0c843b11ff72fe010b689f372598696efa958d3588995459192463", 0xdc}, {&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000002b80)="96d0194c3b30ee3179537850c9ccd31ae48d7ad0e4b4e32d235a1b633e963f3cc8be50df96d3333dde952fbac252cc17dd4af038c5ecd309a4df236b472c1053e885e54fe2946f9a57f6d9fd315ca35893303bb8b78349a3406152f07d972abc7a113ec705ce7c5346524c84bed69a2f0b1310effd0d6fe665", 0x79}, {&(0x7f0000002c00)="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", 0x1000}, {&(0x7f0000003c00)="ec8a8ffbb589fca799a2f3f13b4ddecd7b34fce801efba9513bd530ed5e003bed4e5798dd9b35c84b889fbff7badf3a5e864f4", 0x33}, {&(0x7f0000003c40)="cbe1508d2c4b2c2daf319fb0de561d", 0xf}, {&(0x7f0000003c80)="6bc0f58cb0904c4f3c373383b3e7d84cda01f083f0f320d42e977a18259a7f2241eaadec26f90d9b2f7f6034d20f0af4ab5e9380815f3eea", 0x38}], 0x9, &(0x7f0000003d80)=[{0xb8, 0x10b, 0xffff, "4ee16ffbf5282ce54a5380aa1a7f6086e42792cdb43ff253edbf11ff2c31bfd02bbb0434ac9c6cf6eab279891dfeb542a18cc4c466fe1f6b55b14494d54b5b0ab0747a8bf2b3b4029e9b6fc54828a2f9b54a1d8737f14166eae65f9ed05a7d1f2b4ac59d70a372a9b1e5dd51f9c5b001b7ad12c4e5c371fa2bd578b8a4b2f48794f6bed0f47536d852debf46394c1f1ac19d306e3e590e4117347d1e5b5036ee3014bde54b"}, {0x50, 0x10b, 0x400, "df59959f3149feaf7f96ecb75f2bc1fe879e967df83f2b4f336cf057883b07261fc3da50350be1efddbf36b3e94a332bdb6e19ecc0eae7c5003688fc5ad2e29a"}, {0x70, 0x0, 0x1, "693042eb210268201c63cddc68853e4510ce73513a8a10163cf5db0a0490d26d66815ea39ae709aaadb7d34680c3e2f82d49ffcd69c0639c41e7dd49d5ddf1115d293b814f1a0a7b0fc938d8d41309ad70d01cb7f6753ed940"}, {0x20, 0x116, 0x0, "20f94dde5a952867c7"}, {0x108, 0x100, 0x92b3, "4ea0ccce8831f4f5df9d2600a27149da2e62402cde9aa4a438573dd7e731685af47d39f26552856eb15d5cb4c104c4c84357a6a8cc7a662338ea7783a67afd980aeaed232ad5422a9857ea8837f0f305ed8b1a1a5888ac9e4d9a0c26bc5ead88169a4b06f4e6c4f2275d2ca46609835b1cacdc3fefa1f5ac31ce0c94ec09071154fcf29f1c6ea04efc3604a94d78cbfff96c3a7f59cddeeb85b55d6f9b53a119fe7280ee82a0f0ff3a9c7f049e8ac64849c0a9c2e3506ad35dea7252c36f15a025c6dd6dc6a205cda51a6ff8db05f0e3fc75b9ec53ca894fa4deab9bbf39778d0fef93c8d8b9de98199743c105d7e439cf681817e5f4e343"}, {0x60, 0x114, 0x8, "685a1a56a2dc1dee5892854e342ce0a4eb0cc3b83aab7d12dd5368a12e360e402d82ac8190df397984b248885cabf34ca8313b9101c24bb7d900556a0b214cff34990c92b3da05f49367"}, {0x38, 0x117, 0x602, "5e08eb3fe403b8eab0fc14452d006542ff8f94bbb31d7d7d8bd02358d3a60b2c737d4665"}, {0xd8, 0x11f, 0x800, "02b96e15e33750fb4a8e572594999d837d084c74d73d14883099da40af7c6abf19d2d45def9124ba0cc4a98a229af5b5a4d22e2a0a10d3bd86ef4a84b91187c8558ca23c55a27441db750af28c6b03a57ab123f380e6c9cd9e285993f0dccbfb4d16feee668de87d4c15ee202faa731ca7b7614ac58cd0058de71e1fdf1eafdade389a0a66ed26fb46b2d06ec78234e2a0aa4b08a74e5fa283aca946d7780656bf8a3d5009963ba8bdc636ebde7e42d29e2a147055d7d34e34c4a14ab4c79c7cd7af7501d8"}, {0x90, 0x11, 0xfffffffffffffffb, "e4c8c80592304b5eaa5d89bf321b2bdcdbafead239bc80d776c5230d12fbb77d3676de41586988283e4b2acd7d49401d8798be4757fd7f05ac75c299d2d84afd219a44e3066ccdc088ec3e9344b0afb3f60c2aa79a0fe464d1e7de21f0dafa825fa6dec5fbba1c368bc48f1fc537fedae4569a7f5ff816a4c0c78d00"}], 0x4a0}}, {{&(0x7f0000004240)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x4, 0x3, 0x2, {0xa, 0x4e24, 0x0, @remote, 0x6}}}, 0x80, &(0x7f0000004380)=[{&(0x7f00000042c0)="bf3438df9374a38843e5bc8b757ce3054024d5e601013795cce4816e88ac2af9f0e752e91edcfa39b9356b41de0f9e2357e74d574180a1000554f69627c7826e419dbf7eb1c3a5ececb20fe1f21eb4cd63596a300414ec3a8e7a4798351f7446177084b3ffd99498ff609dd75e6b8e234bbe6fc85fd370175aba2cf30f373829f9316add924a6d76ccb1e2", 0x8b}], 0x1, &(0x7f00000043c0)=[{0xb8, 0x108, 0x1, "8034e1d2314dd7086474b9ff6deff77ef5adc3f9230c8fea9a9e781f84055c9f7cab1ddb324de9f16f37629b8ffe81b83bf21c320774ad87e1fe1169c18f7b5d787871b35da50bbdd6c255965011cc099dfb4a6865bfcc75e6bc6687fdfb80f0d56f30e521709b06cab0a09d4bb19d80d2d68d12299b3b95cf08f56582be2742556c85e1011f205be39917c1770b292238e726e93acf1d7ad7b01f8847368d2a96"}], 0xb8}}, {{&(0x7f0000004480)=@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0x8, 0xc0, "e9bf2bb9be34517f6576b7e45a0210ae2939df6b7ded66cf2737ab83da707866f397e8a9df2de1fa188526095cf6d9fdff92394ba97fd104b81256ebb72a93", 0x3f}, 0x80, &(0x7f0000004600)=[{&(0x7f0000004500)="0d88449777fd19aa9a37e00853c31f16892c2212a9d28873e3f5464c6a71153d4392175757fae194b974a5537a9776adc55c7bcaf85979b4f04eccab07e6aa862b5a6154a876990cf840ac788b964b41d5e3567db850f256920c5adc594b8e4e661feb5aeb57ced7c3e66b5622013b642c6a77d57fadbae3aca9fa34ab74c8bdf3835da8ed0610bcd7dcbd92b42f5cd168eb0f87e823439a41d778c5572e1540c8888f939b615002cd0b46186f7557d3b7b5a6a4081d1e7f4f6ae8016cae0039af2025aa8896d766a330fae30a378166ad4cb13e837f", 0xd6}], 0x1, &(0x7f0000004640)=[{0x20, 0x101, 0x40, "dbb94403360b00c67a393b9927260fb0"}, {0x90, 0xfd09acc6df1aeb84, 0xfffffffffffffffd, "b742d86a3975417dd92d14cc0516a65bc34816bedf1032381ee04e508c07c2f8ab212b82b08130f401064104bb33d1e8ae5becd2844a0919cde36dd7bd5829c01b3c292dad4508b427b48ab6111e99493c88fce2888948cb59d04911ed4496b830cc614b2a7c49166222f6f47ad26a1353c2bf680608320124add8"}, {0xb0, 0x10e, 0x3f, "dfc2585a30db32bdde894c6fe1d6205fba6d62e39a945509c5ace335f5ac83338ba8590e4c5f82beb6133b49796402cc467172691111c81012a2855436797a952f481b8affb809621383f7d7627b170d78d986c38cdd7d22f9f872d76fe925aa6871a58153331460d8353ac010d21241483911c395e49646dd9207ea56bf78ffad04efe1db5cb4035c4e5d7c0ee2cc23356c379761654c6b8c5d401d"}, {0x10, 0xf8a836087a722f38, 0x4}], 0x170}}, {{&(0x7f00000047c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x1, 0x3}, 0x3}}, 0x80, &(0x7f0000004900)=[{&(0x7f0000004840)="dc756a80acd266bd7c0c6a68659a4f705858f5a7d1802073dfa134e3023ad89cd40c5b20e453df0b1db3ef2d0ba86e61668f10aea56b191663e79cec75ca", 0x3e}, {&(0x7f0000004880)="04336228de781c0c4150d010240638c2dd430ae3adc3894cba6bb2ae0f5b252aa04b9a903ab2aefd75891eb5b3eaa6aa110c1c3227a464bcd1a30958dec0341204753f0dfd29b5263479dcf115bfab2cd21f07065580508128ca50b54356400cd9f361e4815e570c6944aa481e47ab622aa0", 0x72}], 0x2, &(0x7f0000004940)=[{0x100, 0x10c, 0x4aa, "199448ae8e5edd977ffc6ed7e3470ab43c0b6f83279679a48ad99d317b6c9cced13aaaf15bcea6a4deaeebffff0e050db77254b8966d5c2da84f259da7ae5c396de11e02bb3d35f44af1eaf2bca18e92f122c3843da033bd8a439679675586feb3b8f0e73fff8411da52c4518a65a4970506410fd5908c4ea7f1334dad2a943778be09913d9e616d0169d0e3a1bdab9cc54e9f510c256215f678849bdb18575b268093e08f4c139586c582f820496ac1587b67f285dd2a478bec40aca86479152460def290aa6deed2c8b631b94eb9afcfd8ec31b0f15206f6d13622f1f1680b5b6b76e72ba1b03c952c3350d8"}, {0x1010, 0x119, 0x5, "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"}, {0x1010, 0x29, 0x5, "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"}, {0x78, 0x110, 0xffffffffffffffff, "48e547e7d976b18be7095018413c7ddb7c7e35cc6e94b0c696fe20343d39c0b63c88927617bc499f0cd85159786f08ccaaacc723b5e774b5dff96b3423cea16a58e4077ca0f89d9bc22578f0fa7821bb8aad23145e9e919bfdfec117f8a3c0ea0e"}, {0x18, 0x111, 0x3, 'K'}, {0x28, 0x88, 0x1, "98d7d55d32d59c9b266e925437e09c2299a7"}, {0xd0, 0x10a, 0x7, "389b88182f45032bab6f7dad46cee50f6b287b8ce60228a4efdc87d8b21e96388c3d63dbea2cfcc81a988911d4da94c3f427be4736a39e1756cbdc5c7af470fbea5b010c08b0d45409d18ab76370e220d1619d1fde1a7018f8bc117d3fc2523c1e224e74e754302fad16fb09d9971939fd0769110e08c3829dd44b0c54bf32e7712f7fc1110542ada24362f639693ac8d26e03ac093a76f849d11a7e93b177193aad7259cd2204d97e75c710892e6d6871bbcc02b515f97b25fbcc0be8747e94"}], 0x22a8}}, {{&(0x7f0000006c00)=@ipx={0x4, 0x1, 0x77056a02, "712ae3295d69", 0x9}, 0x80, &(0x7f0000007200)=[{&(0x7f0000006c80)="944b773f971345272c84ec7429dda6ec72235c1ede7ad5797c81e29f45661abf192184d155180b945d3beefbc0a3a052a527be10a441b3be5ed25c428f341cbba0bd580bcaca63b93b0751aff95a9d8a3b8c09994f07ad31e8c1859710da45e3dd2e551459589a9a1c1155f4ab000233661ca3ac94fb9fa8a37ce9f47ded35", 0x7f}, {&(0x7f0000006d00)="d192dbdbd21b70732bc68eda2ac9f1a74b64652c919c7d44a23ac0f694fb11d7189d33864ec344fdbddadd2b49a3ce39f48cabe840c6b18c66fe4adb33029e5f6d944c7bc3d20d282df5af322f81c9a90780217dfe446ac7bc2c03f27f14231a64813a3d10c2980d2b2749bc63dc326a5c0841669af51189075270634972296605daaabf5c89430a4c3e215c9355f6ac08c0dea4ec9680a5f4f441d38a6e10270bd0d4bd7341ae9f4f83099d4b213bb919216c173e848458b40fb74a50c36604c550aba24075d556751c2c9d75f1e1a5ba956ce5ccae61a7a52ff661f7eb65c59fa1702465e006845cab06", 0xeb}, {&(0x7f0000006e00)="c47a50eebcd43306ca38e1f7666c399ebc7f4be9b0c0a70e2551c3b7da8c595e4c5ad2d4ba80cbafa248264a5dc766682dcc9278602e4629268e187cce84ebbbb9590ebb3b4bdd19a0a178b14bd815a4a4db42a561fff2115069f0d7e06bad959fbe3d8705657480e48b68f047eb5151d03e915bb1502b144073a154", 0x7c}, {&(0x7f0000006e80)="867e35296d45bcdbe40ea461eb5a312e925bf47b624aee09dd5807c2718d3835b775d66f4051a2092da4c29efdb53b9741c84f792ac4b723625d912e2262aa45463b13dd20ca4fe26e0eb987c3019ee8db07916f99b21210864f5aec9adbf4a8473591e8eead14b20d8853c19528f01d0a3d59e452a9b10df8334d1ccf0d9d4e690ec1e47d1c469ee261e923a1122061489d484ca506c8689142b934a19a06bedfc57a8ff02a637e05e0819352ebf747f91ba5669c9e1d3907b6f4f81fa5fa52a2f43765e17f0d5f2eeaab2628561367c9e90f6e6713d6e6f92af59524b24e0c7cc14887d7a000a8958e395e6dc416", 0xef}, {&(0x7f0000006f80)="70501963d880e5f31052f7ca72b542f81ca2f68742eda858e2ae614bd939015d96d25df3937f20e2cb7f3f16a3d4fdcc5080264b8bb4ba6abe050d4cc13ad417e26bbcbc15751655d1b74e30e5bc61ebcfcf9aa8c3fc8d2a1abd3214e2be6861a095175eda117b7c39e0d180647a1a456499b1ff4c08210f56ad5dfd2466d2ad3a", 0x81}, {&(0x7f0000007040)="099ef618d492e2f2bb4514b64519c2f695488e9e27425ea3980c5e911a92b83a90884c81b16d2d3e5d419c02b66ab8bc444cede9f6c8ebeceac924e38aca3a936ad9545b569ebff061e8299ed63ad3826acc9baf5c24ef819ce5b76893d8d606e5ee66b347572dca86902b4439fd2a3b47ddb0310bedfb90ececc8fb0d313797470fcde652f138f91e7489d653440a992f88232d195aafbe31dae30e8b940225ce6c1337715e7de53695f35a6c", 0xad}, {&(0x7f0000007100)="d0ad1fc15b7ccb172c4879d80ff6e1263e9d05245a95e578fa56d992556a7022309559a1bec2ff3a81368d9f7c2b81ead4d83c01cb6f037003683d9d8a0ddad439bf1f1fde243a02aef7d60fc1c7e39f092a6028d2c73a9533dbdca81d7bbd35b63742b8b6d2481d8afd0e632f6fde7a19f8a61fcd49a408e8df47726e3b5c081dff960509746fcc2639492d72501ccacdcb9b47d590a4e09532feb5cb78784f457761a81cecc6b0", 0xa8}, {&(0x7f00000071c0)="828328e3859063ffe8cb2b328dcf06f4794c10f41da4c85050d7e86a4d2bcf2d7490df04f2", 0x25}], 0x8, &(0x7f0000007280)=[{0x58, 0x11, 0x4, "8afd5b9b164cef4f7aa4dd2f41188f2e3df0e328d3373e172639ffa911d4cf1b746c141085fd57bf5e99b5914d007e02c9d365e48ecad715577f2f1923a809c160e6"}, {0xc8, 0x1, 0xffff, "76d74ae26ece49a2168969f3b58d71f0c32fa94273b3c3d87c311fb02cbadda904c6d470e7016e5359a1ea9f1d3aded7abc4268fe8126f54c3941e2edf14fccf07f3bf14da37d3abcc8d147004022ddaebe8dd33c918a276a722c1ddff5e86c75140e70786993719987bcfe6daf4d446417fadc7234f69d2eedaf1f5338ec84667e039225e2582ee3b90353bfedf82f622216a9c451e79cd1e01262a2acecb992e980e0b054b85a5f04901bd0427c88fc8d1e4de48"}, {0xb0, 0x101, 0x7, "73cc73af3c0dc591c6756ba846ee39953e186bb6656910724df46ee69b3c15ba9c8fc93c63f34b73fafeecb09e178b643b217944b8fff30fadc13ffce303530f1b06eba416f3987edef19cba7e30bac1796f3e4d2b8eed08fdd1c643a3c4a274bf4cd4d2ba3d44988130ebb4a27e2d12f0729c5f32267e90d21b731bfc676a3467265184d31c710e500c59e8eeb413580f52a99a482a85fc6868"}, {0x78, 0x112, 0x8000, "08b5b4ec7ab3a8ed30e17061ef04efcbf5e15ad3f639b859f421dda3cc1c504074abc358943317acb92fc8c1a42310feb4df94dcb931f44608831c697f048651da7bc03871743ece70cf32b7aae0a00749680d68843bf653762dd04e01d8f64434fb136914"}], 0x248}}, {{&(0x7f0000007500)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x80, &(0x7f0000007640)=[{&(0x7f0000007580)="b48514d63ed613c432b5eaa3aa3ded398e4c9502b1f357b2c66ea28aa383428974e86817c24e3c878781d98f0a4fedd49704e6b486e1a962918b555de7b82e2e144f33942be1eb34220eea0291ff6d8a1b7116dc3510de6addc44c85931bef472751541e7e88ab123c33be5ff1f09e28068c621f9cf289737b9784", 0x7b}, {&(0x7f0000007600)="13e4bab353dd2438986ab60f0f0e852af37db6f8ce9f7ef26f620164e22f479311cdd8bb788d68acd2581aeabe1966b6", 0x30}], 0x2, &(0x7f0000007680)=[{0x40, 0x101, 0x8, "ffb54e9043e029871a171c2852458cce2c98c997e224d8ecb23fa94745654b0ab1f75568e1ba1af21d37df93361cce"}, {0x38, 0x115, 0x800, "00ff0bdc2e6b0117908185bd678465e657efcbcfca359f789686044ad9da070311ce0c4ec311"}, {0xc8, 0x0, 0x75a, "1a82dc94393bb83c924e8ebf6d0e080b50fa8cae496858dc33cc1d334e254648f6dcb32bfe22d097f43bf3a615a9ffd427d96eb74c026d4865d69a8dbf0a4b1bab1a7f9861dc4fcf7ee2929a4b530a2e26c39ea06fdfd935a99e1c1639245e98d68cc68ab38a44b347067c38924479deb6c92577887e4dd255826abff6a066c296330476232e03194e4e12713da9791d4f50862ddb30b5c6e9ffde43c96b2249948bc1ab962606d364605137d72770051706"}], 0x140}}], 0x8, 0x10002) 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x880}, 0x6bf570f0b20dfcb1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000380)={0x0, 0x4, 0x8, &(0x7f00000002c0)=0x8000}) mmap(&(0x7f0000068000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r2 = geteuid() syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0x80000000, 0x0, &(0x7f00000002c0), 0x4000, &(0x7f0000000300)={[{@prjquota='prjquota'}, {@nouser_xattr='nouser_xattr'}, {@lazytime='lazytime'}], [{@uid_eq={'uid', 0x3d, r2}}, {@subj_type={'subj_type', 0x3d, 'IPVS\x00'}}]}) mmap(&(0x7f0000000000/0xa000)=nil, 0x7fffdffff000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) sendmsg$unix(r0, &(0x7f0000000240)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x4000080}, 0x1) [ 155.925873][ T9877] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 proc:/self/fd/3' not defined. 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:28 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x10001}, 0x1c) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:04:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffe48, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1a, @dev}]}, 0x40}}, 0x0) 02:04:28 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x3, 0x6, @random="962c85e043d8"}, 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) io_setup(0x3, &(0x7f0000000280)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0xfffffd7e}]) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) 02:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xd5}, &(0x7f0000000080)=0x10) sysfs$2(0x2, 0x20, &(0x7f0000000240)=""/43) inotify_add_watch(r2, &(0x7f00000001c0)='./file0\x00', 0x1000000) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0x8b}}}, 0x3a0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) 02:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 0: socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x80) 02:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x17, &(0x7f00000000c0)=0x6, 0x4) syz_read_part_table(0x8000000000002, 0xaaaac10, &(0x7f0000001480)=[{&(0x7f0000000280)="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", 0x1271, 0x81}, {&(0x7f0000001280)="1c9b28a86f1e61c4281b8c23a9b1f69bd738662be49c44850e1049196c19c3d0bd9de26a9bbaec22a65f8b3af202fb27edd360d1e78b2e9ae078ec6aaee55d79ae20ec75839d000c261795ee1e87640760877e519b8c98399264fc42ef14215d70", 0x61, 0x8}, {&(0x7f0000001300)="75d5fd9367fe798cd69f5b9ed5364adb9f61c1e432358d0538be9b2e319fd9332141f58725cb6d25dabedb39e62f8bc0248eef47a60c060ea0f10c7b588007244acc7f0754a3cfa90d2b2f626c1cdccfd3b5312be0c8c5449df4feae5fa39e3901e8f0bdb735369862ef33ccc190d688c8769678befe2e299ea35dc94e6075375f24ce7711bcee5f933018b0716a17382e981ac6c2b48e", 0x97, 0x80000000}, {&(0x7f00000013c0)="a89a85de1bf2e1634ffa4c9233ec0cb9124d65980a3c7c8b976cc1f279a800816f79eaace345bb8e9d9128ca33dd7da26c879bb1b5d89c3561fbf2a9b9f47137617d2a5352c703df8f0d3e165a5b0845e9806e46839eb24f470b20c3db81a45667bf4dd9f361d753865ab1bea7fe1b5ac0db75d9a1efebdcba7dceef352d81f9c2dc23a54571471702df0eebd0ae2f7258e2b5e5d6937e2c7fad2a8e6851ecc9e96ce79efe85081972bdd1f0778c4bab849fad55f0b9c96e85254ec22c6b", 0xbe, 0x101}]) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, [], [{0x8, 0x6, 0x8, 0x340c, 0x100000001, 0x82}, {0x7, 0x3, 0xffffffffffffffff, 0x80000000, 0x1, 0x1}], [[], []]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001500)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000001600)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000001640)={0x3, @bcast, r1}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)=0x3) 02:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/cgroup\x00') r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0xa, &(0x7f00006ed000), &(0x7f0000000000)=0x4) 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000200)=ANY=[@ANYBLOB="020000000000e30000002a42791d1200000000000000000e0000000000000000000000000000000000000000000000000000000000000000000d00000000000092b50000000000000000000000ec10d9ea920e0956070ea0c60b53987972c12c6db7a8692cb44ecd19ae705fab8143d2ce6efa4729d5ff9136ab5aa82b0ef7f0f2b54ddae6e5e691f49814e0f5f8c054593fbcd5c6ecb6fceb31a84b6b5e4bdd3e3f12fd3a73f549b5a99760dec410e66852ccce91b64f423021b78f8720dc32e5a2b124c0ff96c4589a391c328ec78e6b5de05c7df5d3"]) 02:04:28 executing program 1: semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}, {0x4, 0x400, 0x1800}, {0x2, 0x8000, 0x1000}, {0x1, 0x3, 0x1800}, {0x3, 0xffffffffffffeb80, 0x1000}, {0x0, 0xfffffffffffffff9, 0x1000}, {0x4, 0x8, 0x1000}, {0x7, 0x5, 0x1000}, {0x4, 0x3ff, 0x1000}], 0x9) socket$alg(0x26, 0x5, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) 02:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:28 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000000c0)={'veth1_to_bridge\x00', {0x2, 0x4e21, @rand_addr=0x3}}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000000)={0x9, 0x4, 0xa4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:04:28 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xbfca}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffff9621}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4000000000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000040}, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$vsock_dgram(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4000) bind$isdn_base(r4, &(0x7f0000000080)={0x22, 0x9, 0x1, 0x3, 0x10000}, 0x6) 02:04:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x17, &(0x7f00000000c0)=0x6, 0x4) syz_read_part_table(0x8000000000002, 0xaaaac10, &(0x7f0000001480)=[{&(0x7f0000000280)="67424ce52fca4953feb41befb7c6af20c1034eaa58eeaf9c325992512eab4409520d718a46dc17c1ff723180d3d63c8d1d61a8d18a80a777ae12fe095c5d23ed4759500ccd34d4f883a835242143c4e6560093084daaf0587b34cfd1fd328dd3bb534ed7013bc93b415763aebda9950292fd2bda14eafd98bc58ff0c16877f7e238266b82796b9692645c375d9c64431d2bebba6c6725d8837a3c00401604c4d78ade5ee10374561918bbca582999b1db99423b27b290a2728e0be9145ece923a3690de7369307cb95db202f42252966ae0e130096510f2cf52819f213236a4aaa13a26f4d47dcf267749c3decb7059ee76933efa2653093cbdf88987874b0b54eedbadc44d3a02bf81799c7e4cb36097ecc13744f2fafe5a1ad93a9a9d1462f394d2bc74c7a0d01fd4cf1509c11a07bf216f13f87b3c4d66cd8f9d2b86fcc7bccfa8d954dc771985483931725501b005ab5876961c4a645493d67e73b30fbbc5a81e26cd71a0a72a9f370c20b81f2b634f2fe22e71fdf15ae801dc13b23d6b38aeb688b4da965f8b519ee45aa515bc90d777d0aadfdd2a0e033ca77afb7a7e28650354d990a807b69b9af8f06f8e9a5a89e2f8a2333b23377622963687802ec985a0d5a525fdf920251149f4b263cdd283dcc1c0b67bda400593fe265b82904c294b5176be36c0ec9c132866c597264fc0ab94ec202256e51a1e5737fdd79ee6feb57e89968e8a5bfc9dc56a60dca42ca973b7574f162b03ee5b4cde9cbb9c3baf1897ac500964f9d79ce545ae5736fb34fc194cd040014d35d69c13cc8cb727e62c16aa3cb48b30120967e5c4faecd0e113601e23ac1ed1e414254a5a8608343a79bb734aa18a4f9652c1eadea51bcbfa92c3b5a87b63dcc3b459e6e4f8a45c3a57c44feffe1de87e000f19777b0f41433bcf30bf520140bb4224ba3ce3fa3235e834b3e81f655481657ecba749dfde31a5883f88a63fcaf398bacc294cca5f8f77630c6ed6ef38adb10e60cfd7b95e9c334214550f89bea015d2b26cba45f608ef5f4b3c4d0e4e9c3cf19a8a9e9fcc37e3a7b8ac96ba4b18ac534e6b8a6ea11e1f8ca850764b7fa0d46680c1bfa3382929dd311a48f11857d5a224390316dabd77e71087bbcf78b5f15f7f2123168d1cef220cbd42d8b77b66be278c52f1e8356bf0fdbaaf767886f9a55794267b2dcb15263cfd45e149289b90ef20c05fcbac9ee7bd48265b905b7092720dbb2de50571cebe6e38fb9528c0fd6f0f4198a0aeb7078b56888b48abe8be2b00fca7c5bb4e404f8c3d64db681b2b96063f37defa1c80aba7d8d75989ecb489bbece9a59aac7e50fe4c74092b0fd931cb630f87fc687309d03fd0cf020fc962eb44a0097f7195e50a5021d73a79c4b0ae3b00680524f82cbab48adb5d947087c8195b2d7dd99a2f18565b017b33a7ed04f8c704cf9cbd4860b45d55d601acc2dd05d4f89416c1cfd373adc192371aee10f07928d8fedf033f03691629a1da6487f6d5aaa78f48ad9c520bd50cb417ab01b17f4fc86e55d0338e2f74daa3cd83beb292c283ca48111011948086ee21a33f230d69d3499ebccb8791edd6fe05f1cbc4fcf94f53f626c3632a49fba84f2f3d99e6dd0d9d1e1ec7c332d3220e16abb6463cddacc7f3e7db67c5b11f37fc8ab7b8149de1d1e88cf4176d76d4dff0e090f30028f25a3ab457b6aabb7dbf271f0fb411241f461fc902789c0a6bfcfab7d6e73f0a1ac01e2b75440c94835bf6ae5b8f90da5143b185d31848afd749834c3bbd7c4393d455a77ecc05462d824ead6bc24b8105a28d724e8daaec66f9ff5f36e4d6f8ba47cc35ee907f50ee80ddc61f97556460072320a6c2bc5b8290a7eab5ca4f156c2b132402b8c2193bfc64371ecdfcde9a06da74ea9aa0a801fe5ea239a17db7237016f276fdc948113de2391e2d53b0e21072a8876b813564ed7ee352d26b3693a08ab8f5bc9ff9c389223ef4e2afba7136748de292dbe04b4b1760524426f3bc2fa9db61907aae39e025a2feb82e72499db5ae9741d05caac49f80b122d5efa3081ee5c2e550961265bf21b0e0cebcc7da0772dab347062c002124ca2d9916a5de047df20e1db4db595c09f97f87ddb1225b74b4008cb87d4186f79b03455c1891833db347f3b0bb02df998b638c6660248ffd8046258f22d20c0a9a5567d62d74038bceb286d5ec302bcab2467cd3612d41ac75bf6f7150b7f3b91abf90d4e605ec3d70c8a9f6d557514615b632544a5447cde89d941fbdbc842c5069eb6ab82435f2cb359c1bebb9eb539b00a64d43d0b877a6c443af49ce00bf4ef315f7c7a3e0462c352d237c7fdb8fe3dc0b343562b3b9bc6ed2c9ab9dfdaa25da8d5749b9d400efee67e8a452e61921c193ef6211ffdd59910545520773e455818ab23c81bed5c02bc2674adc67ceb3be9cb93941c4da6d64d3379418578af6adea0e10bdf0dad6050d32ae6b2f5eceb0faa6b3c3fccc4124d13fc2f2051240364d2495a51a26ec89c1abe079cc3ebfbf91372e012e774520bec880abf3608c9b9c7ec09ae8d7a42b01933e59e10bbeab89772c3d3d05f45accf2c2e6f802a1e14097938f58c6e07253f2dd47664f38bb89e228978bcf55c968713058938cf39209d638900bb699ede3b1920c69efee9beae11d4596747076120315eb192248720960851016a7182615323017841056a467860eead48718e880afc4145a814a22f1675f4896c6727e880ec60fd50c7822b9175e142ebe9b808679d6f2f52fbaaf88b76f891476db22d9268344409201b9426cc2bf3a363151612744b9cfca911ee52069b40aba970d5e96b0b6475c7d96685b44853be36db1f5487dc5db81a2e5b4b6c65d9f5e6ccbd30b2ff894f3ca7ea886c24b53a168bcd66c708ffa7d5185af444f3ce6e15ca5c6d13e4fdda4414b485448d81dc39afb313da36f8ebb3957c22f4530bb3f14121fa84c2ee0f17239cef1b9ef040cc77d3ad134544f01528e07a283abd54f07497a13741ff22ef080087a0ab88d8c0cbf7d0693ae06f4354672186520c16537075c0e4341a5cb68b5456a9dd6bc8c66879765ea23c0aecfe7794d8bfb28554fb2df55f7156a70478c873bcb97167f64069e35cb4a3c2576639d614b8406f9f4379c6233c256902060eccc982800cb3b2ec212e484038f8527a11a00a305567b5e74dd971039a3a69c431a831d6db72969c6fa34ae607d270aeda20518962bd1d59a999b63eefd4336d516c8c63af8ef72112512a3dcea854530e518712113cd2b142148e84eae3bfe3ed896141744462fdd5ae995dac4522b59691249a2f3c8982def98d2ce4d6c340e75f331fd0c53e551d2aa41313137cf6e5496c405e08689291b4b0082feb0e3c525b3a2232a7fc611facf77707eba9d0ed914e39031b71e52ab5084a9c59fbecdae55a226c5c003fa1ee53b4457bca94ce8e9e69dad0eca7a64bd5073095a49c991e517ca7e1eb8341fbe9aa26e124152bfcbd75da06d47c83032253a1ac16144aaa6e2087770163ab24d4ce49f0229d161ecbedf18e14050f23a78945a23fcbdb004e53a1e3f0c0e38f1f1a183c6a803a26329d3e035a1789cfa19bad8afd0224bb633d731ac684f718c9083a99ccbfe349fdd3d061bc8a894795335ee93c7a1f3a452b752653e4268db08a2efbd211e988c90ceae51a4c68e1130e2485aba869dee5e3d10a5cdd0aba57454613320eac4d3929069c836f071cb4f44fbbfe05620afea756e9d5cf5999b358de474602804629a838fc046a7403aad1bc1ba02e157a122a72b2ce84bf61adf4fe32d51ee12df10d14ad7dfbc464dc63cc6817bab06c7ede3652a399bbec8fc51c58761fc4d4dba66d1b788dbb83fa0c9a2fe1acb5d6859536a6fda4e6bde49196f614379b9cb68474f8ecc247df3f3184d5457846f38a94b35a078b64b260b175431ad3a49ab2d3a79d11e52055e6c61e9004de3df49899937f6d3d733e7263f213c3d416ddfbd3ddb6948da8343e320b41a7998866c90986834ddeb8d187ce2cb0644d1b2a6a9a932a0ea1be98914ac598c004ba1b5fa47e808289f0b3c71be1943486c9ba6747a0ee640577c1f9461a7a80837a38b0e8b8febd96c0325a839ca40e0d57ea1c10e4299b18e3e71e9e3b9d2b338be1879eed9af9d9180e605617dfd136c039154167fb35ad7e4d8d92cac172bd7d144dc1d352029b266977f076485efd031daddce69ee5354d6bf4bfb02a94c97afef60e4e697d983ab2fa02f743ffce3d040f88b1a78b285aee0880eb92e3ee1cf5bf23e075378eb09b9384ac4f6a1307e45d65649f02aed739b9904719dfb4f1f61659b4922053e109ff0da743a630dafa69739f67fbf1419591140f08280d7e84fe834ade1a3fb27c0288232ddebeb85353bb979b895d01605acc716b7c3f4d697d0c7e83ebf230deb2aa872f18fb2becb89ea8d9970b59914e75a5de9659412cf7da6166735b1e41c933dfe73964cd780c814a748847dd5665b86dd91f2e479c169136370ec2a594724c9a0eae15bc54ee718308e762bb2c1d85dcc3873a15a51de64bc3d93f67d592d3a5fdd01f0ab73e545e56c20ab7db5dc7ab744ec10702c404c6bc6e3ecf01c4d307f72d150fa4a72e0b52d3f29be484b71e987214494f2f823b802c4a8907e207b2c0b1c41c0d02d3d05e70fbf28dfe5fedc3091b7f86c293b70839bd9b67fed5e9bd39a489cd9c83752d20dcd7dc159a3c89ef5c06608fa0199d0ce1ae2527280b2340c4aa3508727b36a0621ef1ad875e68a624b242e707159f27ed0f6212cf0f8b3e20da003d25a990690b4717a5d13b8c0d56efc3864b1d15170b49ccf4418968b2ad363d00d591f5f31b905c74d5748781c2cb968192049852401864249169d2273a59b137a9bc45d8cd5b37de38e45a1269301cf96df20591d7158348fe19114950f57decbdd5b0c95100611bad4e26804b57bb9ff6521cec833c125efa6bb981a5ac2412a92d62d45126ed9fff70322ab9f7974295c9042cec00fc3a9b96efcf324e5e90967e702daa98169aadc8257e2fd969cfd626d2f99765697d74a84cc00d382d62a9329d3e86298f26af007e87b3a280dcebedf2c55a8ed2de0ddd3b582c6116e94148a4c566d0b7a612baee125cb96a58e9e7b3c551fdb2765ad7c87bae080fa84ca7174efe27c9f259e9ef403016f059f1b8cae44a1546244d15e1bce850593725b3180659a0dbe00449b176313134c04ab3ac35a69892e59703534539151e52192e8df554a1723095fce51275a4d7bdb62ca73709ab0ee16568fd553e55e8baa1468911eb6964f8edddb06a8a7ded584d24490ce792ca95fb94888b4ec3633ce96bda63cad9a1caccd48be7c841c2b549e03b257ae6993a390e1f48e70de609c69db167e7191e81165f1e29e4d86b45dc5a57b0957f2aea40aa994489e617be2d2ce9ddb172c23129e9f60ec810fd312965a0dc0d88ed622da62e9496574aafe73dc1e4613e1289fca6504fa17c909825c174ef4e6db3be59d36cb32e6abc3e294858afb7dffc12641de0e4fb34cba36055e0d5e965269fdc172293cafeb374ce1ed8a6bb262be060d6043ec349e0f950c2bffab57fc703ec278a7621673aa73c81540e539746194300aa77f87cfd2568b9557b05b6b34240213b05ec75e1fc674695b37e2050df1cf176534501db34d7b75e945bb75ea58256905ea1c87dc2e94318659c44069f0a83154a56e545f64082bd1b7b2efd33339efcc5407a786c728fb90880b2c4d21e9421887804", 0x1271, 0x81}, {&(0x7f0000001280)="1c9b28a86f1e61c4281b8c23a9b1f69bd738662be49c44850e1049196c19c3d0bd9de26a9bbaec22a65f8b3af202fb27edd360d1e78b2e9ae078ec6aaee55d79ae20ec75839d000c261795ee1e87640760877e519b8c98399264fc42ef14215d70", 0x61, 0x8}, {&(0x7f0000001300)="75d5fd9367fe798cd69f5b9ed5364adb9f61c1e432358d0538be9b2e319fd9332141f58725cb6d25dabedb39e62f8bc0248eef47a60c060ea0f10c7b588007244acc7f0754a3cfa90d2b2f626c1cdccfd3b5312be0c8c5449df4feae5fa39e3901e8f0bdb735369862ef33ccc190d688c8769678befe2e299ea35dc94e6075375f24ce7711bcee5f933018b0716a17382e981ac6c2b48e", 0x97, 0x80000000}, {&(0x7f00000013c0)="a89a85de1bf2e1634ffa4c9233ec0cb9124d65980a3c7c8b976cc1f279a800816f79eaace345bb8e9d9128ca33dd7da26c879bb1b5d89c3561fbf2a9b9f47137617d2a5352c703df8f0d3e165a5b0845e9806e46839eb24f470b20c3db81a45667bf4dd9f361d753865ab1bea7fe1b5ac0db75d9a1efebdcba7dceef352d81f9c2dc23a54571471702df0eebd0ae2f7258e2b5e5d6937e2c7fad2a8e6851ecc9e96ce79efe85081972bdd1f0778c4bab849fad55f0b9c96e85254ec22c6b", 0xbe, 0x101}]) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, [], [{0x8, 0x6, 0x8, 0x340c, 0x100000001, 0x82}, {0x7, 0x3, 0xffffffffffffffff, 0x80000000, 0x1, 0x1}], [[], []]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001500)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000001600)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000001640)={0x3, @bcast, r1}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)=0x3) 02:04:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:29 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000480), 0xfee4, 0x0, 0x0, 0x9a) fcntl$dupfd(r0, 0x406, r0) 02:04:29 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = msgget$private(0x0, 0x488) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/121) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x2002fffffffe}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000000c0)=0x2e1) 02:04:29 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x2000000000002}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xf48307def9bca4e5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x7, 0x9, "e06fdf7ebfd9e12ba6cdd9ec1b5244e3d6b5268f248b8915cfe8ce2e5d8ddcdfbba0eec2fa5ce2a1062c465c6e522c0b0b950fd0856ac9f89b4fa0837113bc3cf976e525640ff3eeefaba3c0b864fa936fabcdf127ca1fc217dfd0075b2fae4f6d5f27a89fc3fa951f93ac56fa0e614cd562770fe3a364e9d33318806b7ae2e8e2ebb7385509bd6e088874009553a104528feea7cf07a6f12f18f7a38341a65f955760649c00212fe7c634e521e8e0a7ee58664f5a1ea6f11a84d65a9d541f2f7a42f6f6c5499d1716a41c69897378650b524c079a90b9ff96c0b815b69ee27616e20dba4aea768bf4ff1dc3a8755f36558fef44031ca99305ea9113e7a6e6e2", 0xab, 0x4, 0x4265, 0x80000000, 0xf94b, 0x7ffe, 0xfffffffffffffffc}, r3}}, 0x120) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f00000001c0)=""/184) 02:04:29 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = getpgrp(0x0) r2 = getpgrp(0x0) setpgid(r1, r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x80000, 0x0) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f0000000200)=0x4, 0x4) ioctl$int_out(r0, 0x5462, &(0x7f0000000080)) capset(&(0x7f0000f0fffa)={0x19980330}, &(0x7f00008e7000)={0xff, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe0a, 0x2) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) getsockopt$inet_int(r3, 0x0, 0x747605a0ce6fead6, &(0x7f0000000240), &(0x7f0000000280)=0x4) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendto$packet(r4, &(0x7f0000000340)="402003115c9d1c9b18b1f51ed5e556ce148a53b2bee20ae948081bccbdd08a87ac0be02481726ce715a8e0e8fba9a4fbbef4200e0ac3259920997b2ee7328a4553e64c57d11ee5796c29242dbd5d59515b8fc1ef2da8b6187e2e789a009383bfe3b84cdb0be399dd2c52179aa8", 0x6d, 0x8000, &(0x7f0000001500)={0x11, 0x18, r6, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r5, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) recvmsg(r5, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) ioctl$SIOCX25GSUBSCRIP(r4, 0x89e0, &(0x7f00000000c0)={'ip6gretap0\x00', 0x4, 0x6}) 02:04:29 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x17, &(0x7f00000000c0)=0x6, 0x4) syz_read_part_table(0x8000000000002, 0xaaaac10, &(0x7f0000001480)=[{&(0x7f0000000280)="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", 0x1271, 0x81}, {&(0x7f0000001280)="1c9b28a86f1e61c4281b8c23a9b1f69bd738662be49c44850e1049196c19c3d0bd9de26a9bbaec22a65f8b3af202fb27edd360d1e78b2e9ae078ec6aaee55d79ae20ec75839d000c261795ee1e87640760877e519b8c98399264fc42ef14215d70", 0x61, 0x8}, {&(0x7f0000001300)="75d5fd9367fe798cd69f5b9ed5364adb9f61c1e432358d0538be9b2e319fd9332141f58725cb6d25dabedb39e62f8bc0248eef47a60c060ea0f10c7b588007244acc7f0754a3cfa90d2b2f626c1cdccfd3b5312be0c8c5449df4feae5fa39e3901e8f0bdb735369862ef33ccc190d688c8769678befe2e299ea35dc94e6075375f24ce7711bcee5f933018b0716a17382e981ac6c2b48e", 0x97, 0x80000000}, {&(0x7f00000013c0)="a89a85de1bf2e1634ffa4c9233ec0cb9124d65980a3c7c8b976cc1f279a800816f79eaace345bb8e9d9128ca33dd7da26c879bb1b5d89c3561fbf2a9b9f47137617d2a5352c703df8f0d3e165a5b0845e9806e46839eb24f470b20c3db81a45667bf4dd9f361d753865ab1bea7fe1b5ac0db75d9a1efebdcba7dceef352d81f9c2dc23a54571471702df0eebd0ae2f7258e2b5e5d6937e2c7fad2a8e6851ecc9e96ce79efe85081972bdd1f0778c4bab849fad55f0b9c96e85254ec22c6b", 0xbe, 0x101}]) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, [], [{0x8, 0x6, 0x8, 0x340c, 0x100000001, 0x82}, {0x7, 0x3, 0xffffffffffffffff, 0x80000000, 0x1, 0x1}], [[], []]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001500)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000001600)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000001640)={0x3, @bcast, r1}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)=0x3) 02:04:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 157.179412][T10046] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 02:04:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') getdents(r0, &(0x7f0000000080)=""/25, 0x4a7526df) getdents(r0, 0x0, 0x18) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) 02:04:29 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000080046000038000000000000000000000600000000000000000000000000000000000080000200000000000000000000000000000000000000007239651fad3bf23901942f97b0f321f37fceb7dd9bd6ab0887e1b6c4974af922ce17f6429d9ba0aac5830f2423d6c6d6ae2f03da3d4d45fa122b503f806e514b678d92ed1d36c91d9835eb03828a0accf6fb02c20e05de66e567fe6b9e2a87bb5536a756b583b0a068944314d23482ed7b92ca668a9dc02aa1180778c5f811ba10bda81428fbbd2250ec48054c348c078c82bd9347bc3d811c8990da60147600453b1e1e0befe82adaf279a219d32102ff496ceb09edfd1d41b0fd83e46284f7663d51958b2fc1b3243240e4e967ab1e0e3ba70edfbf3b5ec1041d9ab2d2a128c26d4041180c0ec2a6c44656dab53496b4c34306ee2f55cba31a55abb94e6c70b5e9dc17b6f9e2fad6f1aa67348c9899246b1977b28293c9e41d4da0045b683724f292f2c622ea"], 0x0) 02:04:29 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:29 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="0ae001808f", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e09d1c21e345a8b3923851e4af"], 0x1) recvmsg(r1, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/63, 0x3f}], 0x1}, 0x0) 02:04:29 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) lstat(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)) 02:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:29 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:29 executing program 3: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x100000001, 0x4000) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000240)=0xffffffff) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000440)="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") r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xfffffffffffffeb1, 0xfffffffffffffffe) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x50000, 0x0) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f0000000080)={0x3f, 0x4, 0xd357, 0x5, 0x0, 0x1d, 0x11, "7a70094cd6051b31548b0e0b742b73d90cbd3488", "61350ddb8522ef2cb1c543d25cf35290f7b9ecd7"}) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000200)={r4, r2, r2}, 0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000100)={'crc32-pclmul\x00'}}) 02:04:29 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:29 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x18084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r0, &(0x7f0000000000), 0x0, 0x800) 02:04:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) socket(0xa, 0x6, 0xfffffffffffffffe) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='nlmon0\x00', 0xffffffffffffffd8) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @initdev}, 0x10) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[], 0x0) 02:04:29 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 1: r0 = semget(0x1, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/123) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000300)=@in={0x2, 0x0, @loopback=0xc000000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000001480)="fb", 0x1}], 0x1, &(0x7f0000000100)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 02:04:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000000)={0x6, 0xec, 0x64, 0x206}) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000080)={0x3, 0x0, [{0xaf, 0x1, 0x0, 0x0, @msi={0x3, 0x1000, 0x8}}, {0x0, 0x1, 0x0, 0x0, @sint={0xfffffffffffffffb, 0x7f}}, {0x4, 0x3, 0x0, 0x0, @adapter={0x9, 0x19, 0x5, 0xfffffffffffffffd}}]}) pread64(r0, 0x0, 0x7ffffffff000, 0x200000) 02:04:30 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:30 executing program 3: syz_emit_ethernet(0x16e, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) 02:04:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x9) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) 02:04:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_opts(r0, 0x0, 0x3, 0x0, &(0x7f0000000100)=0x276) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000040)={{0x4, @addr=0x1}, 0x8, 0x81, 0x25a00000000000}) 02:04:30 executing program 0: unshare(0x2000400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) rt_sigreturn() io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:04:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:30 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[]}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x306, 0xfa, 0x90, 0x6, 0x80000001, @local}, 0x10) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x1000) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:30 executing program 3: select(0x40, &(0x7f00000000c0)={0x800, 0x8, 0x401, 0x80, 0x9, 0x8, 0x0, 0x10001}, &(0x7f0000000100)={0xfffffffffffffffe, 0x7, 0x6, 0x6271, 0x2, 0xf, 0x5, 0xf83d}, &(0x7f0000000140)={0x7fffffff, 0x80000000, 0x40, 0x7, 0x1ff, 0x7, 0x649, 0x1}, &(0x7f0000000180)) r0 = socket(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x112, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a00410000a84308910000000400020008001e0001000000000065aac0120eb034090006000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000", 0x55}], 0x1}, 0x0) 02:04:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x88994cdca2243e9b) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}, {}], {}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 158.165904][T10181] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.3'. [ 158.208569][T10188] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.3'. [ 158.231034][T10185] overlayfs: lowerdir is in-use as upperdir/workdir 02:04:30 executing program 3: clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, r0, 0xb) [ 158.256193][T10194] overlayfs: workdir and upperdir must reside under the same mount 02:04:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr\x00') r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setresuid(0x0, 0xee01, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f00000000c0)) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0x5, 0x9}, 0xf) fstatfs(r0, &(0x7f00000001c0)=""/236) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x2, 0x4) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2, &(0x7f0000000000), 0x20a154cc) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@rc={0x1f, {0x8, 0x3, 0x40, 0x3, 0x2, 0x1}, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="c049bd559be85a794deed4452569991c7801c92a180dce3c825fb7266cb97885f528e99646e835946abd8bcc53d9bc19bfe9c27120062000dde50c83db3cb7247f3275c0abbbd9b7e9036ab2e4e6eb", 0x4f}], 0x1, &(0x7f00000001c0)=[{0xb0, 0xd02186aea7fc73d3, 0x101, "7aed7735f90f552d52042ab82c2560f53c43d5468d095894a9e019e4575945cf673e3b9f97bb687f5b379739f29e2741a240f5693725252c962c55c065c70665127bb5977e915a19e4c102ad8549da34b79f3d12ff3b292020285dc09861b57ae3a63157617b5a22d21b56260a3f5bc56dc32bd78ee170c430b36f2e6912ae03c9da7027aa011ce2319434492bfbc4a52546b1447875fd466a4330f616cd2621"}, {0x20, 0x10b, 0x3, "7bfac3b0a221a87a874270d493"}, {0xc0, 0x112, 0x7, "49fdefc50d92ed22445420a354e9b061eca8a09b7ae3041bde2a52c05789e2ea2599b972053d061454c52db1ed341f62cc263225bc6b4699e6e546868ff86bb71cadb6fa502cc534ee1645bad8129686e032be498f7ff0691bf1484f2a59ded3efb1feb2cc65947c239c2fdf740a656931a66335a2448de07119881ef20f9890ad16d97bc02cf3dddb64fa82bb80f6bb2b0bbabaeb44717feea40fb27ac4fae3cd1fce0eff797ed7ac"}, {0x68, 0x1, 0x1, "cc44e6f7f7a72e4399edf92fb5fbf67c44004c6ab5538cf057b3651ed425dfa59e6df9d9a0679ab3627f571c828e701c56c96065c562b0078db9c7b459d70d5e816783b3eb74e79bcd0341f0007bbfbfcdb05889b1f3cdf8"}, {0xe0, 0x10e, 0x5, "6f05c5f99985a43865c055f3bcd962d2831da56322d920ca590f2f07a269a1b1191a8698382555fb92d6dafc6ab18d70ef7a5854a01333d41accb46205d494ae8024693994707076fce045cb0e0bd55ba7dfd66826fd86afd41c7d339becae9ac023ed6cb57c01813c634f471d8eb1d9d8f54dff67975a1df2d1d7f6844f44556ceb97db38b791c61b32ae8a96361882f0b4fb999fd2f2cec7dea025f01f11f4149b09d112808d1097ea045da8a126946bdca25f760266dbd2e09857f79d3771ad38728fe2eab94618"}], 0x2d8}, 0x8000) 02:04:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x11000)=nil, 0x11000, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10002, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x8, 0x3, 0xab, 0x7ff, 0x6}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x9, 0x30}, &(0x7f0000000180)=0x2b1) 02:04:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000080)={0x1}) 02:04:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x79}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x80800, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000003c0)) r2 = fcntl$dupfd(r0, 0x406, r0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) open_by_handle_at(r0, &(0x7f00000000c0)={0xa2, 0x3, "e75916679c066674b7fe11abdf582559f36ca72c407cf3f74aafe1b1231f880d46c8cf177a5864083c1ff60a48e92b4975160568ed0d061aca235d33389cc81f7ce0bd2526eac11591ede05ce3133815a7e685d39da4fcd01741463fb7c79440b71e76217aa380d3d26c38e04c7934a75b73d4609a3342346075877c197fa4b7678d487ec4099ac9229125343a93ede74db4772475a048f2a934"}, 0x8000) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:30 executing program 3: r0 = socket(0xa, 0x0, 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x18000, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000040)="240000001a00110214f9f407000904001f00000000020000000200000800040003020000", 0xff57) 02:04:30 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'erspan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="905c1406433b"}, 0x14) msgget$private(0x0, 0x40) sendto$inet(r0, &(0x7f0000000000)="b9b885d13cc7ee23a8c82bbdbb08", 0xe, 0x0, 0x0, 0x0) 02:04:30 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x440000) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x1b60) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff84, 0x0, 0x0, 0x0, 0x2e, 0xffffffb5}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xddde2b11f8b82e22}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x0, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x7}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 02:04:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400, 0x0) getpeername$llc(r1, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x100000001, 0x10000000000084, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) 02:04:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xf8, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x202000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x1) ioctl$KVM_GET_REGS(r0, 0xae03, 0x0) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:31 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000000)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0)=0x1, 0x4) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000080)={0x5, 0x200}) 02:04:31 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="b6d58be4f146504f46065eff685834a620a0fd2901c07aa9b26e7083b21344c0d695443ce7e54cdee1adea3d8f1331063fa698b1cbc94ffc4b9e2ec9356ac8f4621170a464b5911a42f821bd7314a11ec3c17a3085f4aeb06c84a1506d8f4e045c36af6982d1908a85cde27928040d77b331da2b4f6b46e43b01980ee85045f216457a5d0a225e5b0e30d50084c4d6151f59e147733bdc366c0e662a63512c87f876cfc0a63c52e0efeb23c37b42422c833810f48c87667a34cc0c0e24bdff8826cbcabb6d7d8e2e99309e134b8ab537e9", 0xfffffffffffffd7f) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x265fafa18072fe80) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x200, 0x20}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000540)={r2, 0xfffffffffffffff9}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e21, @empty}}, 0x800, 0x8}, &(0x7f0000000200)=0x90) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80000, 0x0) getpeername$inet6(r4, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x1b) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000180)=0x400, 0x4) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='syscall\x00') ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000140)={0x1, 0x0, [{}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x4, {{0x8000, 0xa000000000000000, 0x2, r2}}}, 0x28) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x2, 0x8000, 0x80000000}, 0x1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x28002, 0x0) ioctl$TIOCCBRK(r3, 0x5428) 02:04:31 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000180001040000000000000000020000000000ff05000000000c000b00080000005ac1b46f1c51cce06d5ae985fd80d081c12a75b41a56b8320c0326e39e4077dc7890d46ea1cf26ec30bb26c0da0e2287346f84a437e1d715618bedf2aa796a6f67e1eaaa3bf6721236637af7b9a28a1ed7d61028facfd43037e9a1ee167cfa6389e9a89428d612fa8ea1fde7073ff88b90b61c0a33521c62225a9b72", @ANYRES32=0x0], 0x28}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x9, 0x3, 0x4, 0x7}) 02:04:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x154}}, 0x0) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:31 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x800, 0x0) fanotify_init(0x0, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) 02:04:31 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x30881) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000380)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x4000000003, 0x0, 0x0, 0x0, 0x1, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00/\x00\x00\x00\x00\x00\x00{}?~6\x1b\xc5\xb6\x00\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x12\x00\x00\b\x00', &(0x7f0000000040)=['.ppp1\x00'], 0x6}) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 159.171237][T10325] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 02:04:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0xa003}) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getpeername(r1, &(0x7f0000000140)=@llc, &(0x7f0000000040)=0x80) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xce}}], 0x210, 0x0, 0x0) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:31 executing program 3: unshare(0x600) r0 = socket$inet6(0xa, 0x88000000000805, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000080)={0x2cc2, 0x1, 0x300000000, 0x5, 0xf, 0x2, 0x1, 0xfffffffffffffffa, 0x3, 0x44, 0x2a8, 0x5}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)={0x1, 0xffffffff, 0x90000000, 0x1, 0x4fb, 0x70e11672}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x200, 0x20}, &(0x7f0000000040)=0x132) 02:04:31 executing program 1: r0 = memfd_create(&(0x7f0000000140)='GPL\x00', 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x90000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="24000000e67d985957d07ef9f5ddbd4e6663e6762bfca3879139722ea02fa02b221d9795e8b8735f85dc1a"], &(0x7f0000000180)=0x2c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x1}, &(0x7f0000000200)=0x8) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRESDEC=r0, @ANYRES16], 0x46) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:31 executing program 3: syz_emit_ethernet(0x72, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0c5193a680dcc1a6c6495ae4b945cc04883500000800450000640000000000219078ac2414bbac1414aa0000dd6e6d6acf145c7c45e3c2fd5cf2b1a769fddee34df7543f708e63d7072de33119563fb11d0bac79e98cecbf44a580806f49d43e1498054373eee17c661dffdd63fe17f4f450b8ff0cfad7d440cbddb7c8ffb8ec8838624166d588fd0955db7f949eb0f1c989f59554803f74235ce15b992a80d4b1db3d7c95b9bce2d27c00c5798fc15d9028f4f33d80a84d91433ad955023821437d9ada3ffb3afbc344f87d576bbc54952f1acfd0b990ab7b7e5663b2e456150c7e5ea6afbb33dd"], 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x101000) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "5d6ac54bd715feef2f9a5b5bf3f47b82"}, 0x11, 0x776d78e1b6f2d245) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f00000000c0)={0x40}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0x8000) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 159.421920][T10364] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/3' not defined. 02:04:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0xa003}) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getpeername(r1, &(0x7f0000000140)=@llc, &(0x7f0000000040)=0x80) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xce}}], 0x210, 0x0, 0x0) 02:04:31 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x0, 0x37d8000, 0x2, 0x9, 0x4, 0x9}}, 0x8) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) dup3(r0, r2, 0x0) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0xa003}) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getpeername(r1, &(0x7f0000000140)=@llc, &(0x7f0000000040)=0x80) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xce}}], 0x210, 0x0, 0x0) 02:04:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000), 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x800, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='To\xa5\xca\x8f\xf7V%D\xabD\x0e\x91\xc3\x98\x8d\xa4\xea\xe7\xa7\a\xa45rp\xa6\x80S!\t\xd5\xf8\xa2>\x9b\x00\xc73)\xfb\x95H\xac\x7f\xc8\x90-\xe6\xb5\xe7\xfa\v\x1d[|\xae+[\xe2\x82\x8dO.\x9f9pa', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0xccb4e3dc68780329) dup(r0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/27) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) perf_event_open$cgroup(0x0, r1, 0x0, r1, 0x0) 02:04:31 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0xa003}) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getpeername(r1, &(0x7f0000000140)=@llc, &(0x7f0000000040)=0x80) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xce}}], 0x210, 0x0, 0x0) 02:04:32 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80, 0x800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x200}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x101}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}]}, 0x64}}, 0x4000000) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) 02:04:32 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x103000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 02:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@initdev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001780)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003680)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000003780)=0xe8) r5 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b00)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003c00)=0xe8) r7 = geteuid() stat(&(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000003d00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = syz_open_dev$mouse(&(0x7f0000005c40)='/dev/input/mouse#\x00', 0x7, 0x10000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000005cc0)={0x1, 0x70, 0x7, 0x400000000, 0x5, 0x6, 0x0, 0x5, 0x2000, 0x8, 0x2, 0x2ea, 0x8, 0x0, 0x47a, 0x800, 0x4, 0xffffffffffff0001, 0x3f, 0x1ff, 0x4, 0x10000, 0x199b, 0x5, 0x100, 0x7f, 0x2, 0x7f, 0x5176, 0x6, 0x400, 0x7fffffff, 0xffffffffffffffc0, 0x3, 0x7, 0x1, 0x2, 0x10000, 0x0, 0x23768f6b, 0x4, @perf_bp={&(0x7f0000005c80), 0x8}, 0x800, 0x8, 0x6, 0x4, 0x14000000000, 0x8, 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000056c0)=0x0) lstat(&(0x7f0000005700)='./file0\x00', &(0x7f0000005740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000057c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005840)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000005940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005980)={0x0, 0x0, 0x0}, &(0x7f00000059c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005a00)=0x0) lstat(&(0x7f0000005a40)='./file0\x00', &(0x7f0000005a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005b00)={0x0, 0x0, 0x0}, &(0x7f0000005b40)=0xc) sendmsg$netlink(r0, &(0x7f0000005c00)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000005600)=[{&(0x7f0000000100)={0x1e4, 0x18, 0x309, 0x70bd2d, 0x25dfdbfb, "", [@typed={0xd4, 0x30, @binary="676d6bf339b2a607ce53852e957f8aa528088f6098ca24ad369c77364707286d5308cad608a03b35adb54835fac6dbbad791d50a4e014db64b33bd99927e2f23b46faa3b448b2d3ecc286bc3c455f5adee7de564b052f34d6f5abcb16eb8caa774d139e7694fcb6a4c470a46f61a6a5e8415b75466ca18b9f5e87b14a3879b485545998bc350997c00a3ca0ba861918d012c64b2305f995c50e0ecf42244810aa23f35e1db4271c1de6a355445b0ccdc346309a6fae0bde5d5d890f2c6ca0fb60af5ce0dfc2b7168c02695317feed1"}, @generic="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"]}, 0x1e4}, {&(0x7f0000000340)={0x10fc, 0x11, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="024a5d0d1716b9ddb539f74dec2c6188c239ef0eb55c18bec4d88a9596b1b41940a3caec5b5d3c73a1efe3ec36d2fece6599b1b698fd4747d3edbed61d3d5e70625663f7abe51852085e0b7d9b4c4007e613456cf2f55a3c692a353caa35874775d818be3cbd2c840f8ab85f015fca19e36f38c082536c67ada38eb4c24c87e3538c3665a18db9aacacb8b54623452918dd9cf773f71b0e026970e3c2e32aea6be3d6c0d550d5205", @nested={0x1038, 0x3f, [@typed={0x14, 0x4, @ipv6=@mcast2}, @generic="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", @generic="d793d209c8a2ebc7750b75", @typed={0x8, 0x7e, @fd=r0}, @typed={0x8, 0x3c, @ipv4=@rand_addr=0x20}, @typed={0x4, 0x6d}]}, @typed={0x8, 0x67, @pid=r1}, @typed={0x4, 0x58}]}, 0x10fc}, {&(0x7f0000001440)={0x1a8, 0x23, 0x20, 0x70bd2c, 0x25dfdbff, "", [@nested={0x48, 0x8d, [@generic="18e8bece6a8b944f1fe28d2a1ad92b5043cb76e3e837dbaa6b00e9816c12fb831f8116780710f02a120882d709954ba879d1ea1a4fcd83", @typed={0x8, 0x82, @fd=r0}, @typed={0x4, 0x62}]}, @nested={0x150, 0x7, [@generic="b3f18ba0d57e9bbbf048b82ed58bac9e70ce9a2d93dd4200cc61f07d19b54fd93cbc860d547e93acb3c768ef8dd7badd251f96c0c55600345265ad1e06450c5ea607", @generic="221a36322f89e4752d0f9ac6958ed619b44d9acd8d7502a875c640a2f1c9ca67d27bf32809c7ed73f3c1c52c524c21ab7f06871677841f569330051b20e38ae9f6fc8088f135465d13226057b13043d917b5e8aae5abc3ade86c63bc1d7511ec8365fd390e22934dfcc5493952470e", @generic="47c3b86493f639ec549be8e52961039343b8c4061f56b22582de2a3b4e068a67948d11802354014f31963c99ccf9299a99517dde22491e9226dd1c4ce57459504240cde7bbd1c4bfbbe40f97e4cb1a74874f7f6b2cc6b13fba228c8bf4764d8b8bbbb0be3842b72ff8dfb26b5a7b49a1577c2ade3b87a5198c6827ecf03701baf3335e44878ae87d1f8bb5e9164138e1605aecb03e8d03ae873d"]}]}, 0x1a8}, {&(0x7f0000001600)={0x1c, 0x1d, 0x2, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x1, @str='}}\x00'}, @nested={0x4, 0x8a}]}, 0x1c}, {&(0x7f00000017c0)={0x1690, 0x14, 0x1, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x8, 0x3a, @ipv4=@loopback}, @typed={0xc, 0x96, @u64=0x1}, @nested={0x11e4, 0x40, [@generic="4eeef0477c2145019cd3f1dfdd9966ebe32366ac719128e49cef1d23f6e07ad562c306ba373790681e419c93919075fe6d06f9855aea768a23b197a7cbb05b77b367f491692bff9b51466614df9d7139b1bdf66ab752c5625363a25cabba0b0ef70772d0aa0cd228c54833e14200618a75f0c6f11b2966442e080be809cd6530d81e40ecfa5e4c99263423eb5f7bfabd55b9e7b7ac205bf5ba2b61466278c973f183d2620f1bd2829ed9bd52836c931dbb119aa2ee8177611f0c324197b52d3010a02383d424dbc7a93279c63b41c9ad9410c9eba8ff073e466c177caf42b92a43133af9c4c6efaa71e2b96819ad6514927d4e3b86", @typed={0x8, 0x51, @uid=r2}, @generic="2f03f6fafe7df0d5d920e63463c66e41b0117d7aa811beaf7a79ef651ce2541606adff4fae0586eaf06cf7be690d0ad82076e1e01ef869b724023b54218f93928a33bab0c7829b9bb5513a237c59e4b90589243ad5f65a15", @typed={0x8, 0x18, @ipv4=@rand_addr=0x4}, @generic="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", @typed={0x8, 0x14, @pid=r3}, @generic="c1f9b85a687bbadf5d2c9a194b4844b9bc0a9c18bbeb9d1a65cbb4571fe09ed9719296b4f0d479b0f26f07124afdccdbbe069cb82bbeb7f3717b8c83d155e52f6ca4f30d85c46f4d081ccf7ff56203d086e2d482edac643b9379e387f12f0903f6b2e3496b074acafaefdc96ce1cf4f820cea32ebf602f6bab"]}, @typed={0x4, 0x71}, @nested={0x16c, 0x22, [@generic="97dca83252bf9dcbc960113735e04849a69f0f3c3cbf02835b358609f1a68d6bb660b4d116054347948f2000f140ca38b1", @generic="7b9735ef2af96719ac56ef65ea95c09b20778d4ba5bf01c6d658d797bbfecd03f70a0cef12838a17eab6527dd66f474cd8df278257481e45e3d4b287596bafb1270f985f741f6768ffe151e89295956640a028f400fd6ed2aabdf1c6a99e9283d41393ff20bbe9d5f4a2a677a15e72ee1f1c9eec585da5bc89a64efbdb0f2d178a6d0c2f26a773c3a51fd7570d8c66edcbf7678d249e196076698b5a887392c797b740905dc1b207a7cb2521", @generic="31177ddc172d245ae4c40618ce0226fd45e8019d07399c375b2fbc4a19d440aeba7b1105ff937a713c39332310e316ca4a602e70eee54d4db74d545eb6991db2cc1c1a186719e40304a39f7ceb32e84ab018c92ca93a9abc7c049f1dae2c941262c2b7e27da116a8865525e5f43a19726c4c2a79279e5710ca58d0df864254723f5740fa55e6201151e771"]}, @generic="ae9013db41c4d69b1ec3afada3709710394d994a9411220651266ee7adc236fc2a577e0997bc2e2c76fa03fa0ecca8571080e2048995345ce457cedeec5a35921ff3c669d76c6442e44d14be14fe73fab1e98cfa4eb1e9b65c0cde2d1ee0d11068f4e1a7ab5494273eea61a52f2596f6a02f7d65b11d0c44b5e092a5813cb7b8ae5660aac76f4c1e3f6e57b19fc51e6aba52bcfcdc721894bd6d8c415f29ee0ce2c57329c91921cf1270d44009", @typed={0x8, 0x5d, @u32}, @nested={0x258, 0x95, [@generic="e7150744afb21ff89bc04b8e60a7abe0847588e02817bf", @generic="0c64fb328d9897f492747d7c078379577dd0e24cc42beaf64388af8e46aaa01986255190affe5ac4558b6c2a02f874dc329c6180a7181f885966bb1fb5f078db221eaee5c83180833c1c6e6bd2c4d613accbbdc677f596e261ed2e3dd15bd1a687a7251478ec1078a7b8e7fc4284306930a5d96ccba69059c4ac612931e8709c57dfa963119c92ad25081dc50bbf7f077367a6ce3582d09f55919511951f96f6cf3589240391f8b13ec72e8ad5354bf8dd162a9c767d49b4c8aac4fcf7fd009ba02e97d2dd29090b99bf078012ac19b7377b73cf916a91563dc0e873e73dcb634179772d9b2eef2c1fac84", @generic="e67345772514a037f3fe432b9e9477261169c3728ca690ac7d8bae241884477c56a5c04d12b6ad9f9d97880de6bab53ba7893b939a2dacf39cd8dc90d567dc9a0857b3a4d81eadc9", @generic="3a8f70cea2745f0f1ae712987044c9c3f3223823550e2607b63010a77f14fd2553c4f4c1f8aacb4dc63d2912a26fbe81b9fef895a13b58e8db1a646bb9e7665ec8c939e3b4006c17df35ec480d6b67f4e27011d7d45908ac912c42ada6adb5b3772f8bacb882b5049dbe25d7cd3effcccb8c990ba3eb3f4ee0b66b288c262c0d221ffc68c18f818bfd09f1054eeaadf7adf7d8ba0cfc7495511724cc2bdaf2c1f6cbe6ad318ceac89f7055773cbf267d7caa4a181763625ae2a8f5924c4bfb71d48d171a67859e2bf3cd86be68a7401c839af64617eb2fd37dc448a36d", @generic="6b91a5c5a7a545b2a21386e076b8bf669b7ebafabff4ad6ea09711dc48b587", @typed={0xc, 0x23, @u64=0x9}]}, @typed={0x8, 0x8e, @fd=r0}]}, 0x1690}, {&(0x7f0000002e80)={0x2e0, 0x24, 0x10, 0x70bd29, 0x25dfdbff, "", [@nested={0x12c, 0x1b, [@typed={0x14, 0xd, @ipv6=@remote}, @typed={0x8, 0x8d, @u32=0x200}, @typed={0x14, 0x96, @ipv6=@dev={0xfe, 0x80, [], 0x22}}, @typed={0x8, 0x15, @u32=0x9}, @typed={0x8, 0x72, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}, @generic="73f42e573905cee5f41e6281982bc026656ad59896a7ae5a59d628c12ba854533eb529c05fd900fbdfbbd7a52c3800526e6da5d748dc15b7138d3f69ae0e3297e307ac868afd8ac3a05e624c666062b456904404081c70eae07f91f446b28b5e6b4fa172ac78b85627eca451de5edcc02572a4f172ccf67f4f0e65f8c6233627e5ce333fcc75d4332fbfb59b0fa12a9016aacdca28922249a42164d57ad326317b16533f70a894f1c170515e9b5401689eb9965d46d6fdb4595e85071fc38bbb365dbff5f1d576431d9724dfac8d6f665658199378875a77813cc16fa6b7a04df18bf84d4931"]}, @nested={0x70, 0x20, [@generic="6b1e75882b503c9516a4fafa4e19f6bfeb77d88a2d3059ebf29fff3135334e00d85fe83f9f6497af2e01168205429f5b51b3e203fd9c91ca6aaefc1b3455e5808162cf6e148d782a6a679027e23d9d109445721647a8e1", @typed={0xc, 0xf, @u64=0xfffffffffffffff9}, @typed={0x8, 0x3c, @u32=0x5}]}, @nested={0x134, 0x40, [@typed={0x8, 0x1f, @ipv4=@dev={0xac, 0x14, 0x14, 0x24}}, @typed={0x14, 0x48, @str='cpusetvboxnet0\x00'}, @generic="c7e7a8c047d91d20adcc1e5e9c69357268aea5e39a677cc0aaa7a4f6c3bac05e06c700836636f903e006a47b24990d15053c9832145844fbcc322b53483a08ab7880c01270bf52c4c57e0593ea8dad72968de76430a62bd366a61010847d153316da46c2d12dd4bc2c02b91c15145dea309df30c618fde4a22ea4909c14074723c7461a12f96d5baf3b36d", @generic="26657c912f8a7b5f59a7b50fbbff38561b78c8ca4c92f06dfeac975bb05c75f690f957e5af5b2cbaea5c5663fe0247aeb422b734a2eaa1a2752d", @typed={0x8, 0x2c, @str='\x00'}, @generic="1d60509d0d50cb93e02c3a9c106df40a7b6546440e87929f507ba64d9a1969f9b2c70fde1b96e9d65132bdc64f5dff6a03d48b8ec060207c61ea7d158a87072393407e8362"]}]}, 0x2e0}, {&(0x7f0000003180)={0x28, 0x23, 0x20, 0x70bd2d, 0x25dfdbfe, "", [@nested={0x18, 0x58, [@typed={0x14, 0x35, @ipv6=@mcast2}]}]}, 0x28}, {&(0x7f00000031c0)={0x4c0, 0x41, 0x400, 0x8, 0x25dfdbff, "", [@generic="c3edbec8089cb71430c828bd94a072b2735a33e7e4f7529168aea2d5de21a7c9b73149e88092f9c50e42632a590ac5d45eb3adc0f3126b4ceb051148030046f786a04dd280ba35b76c7d7563cab21b7aeb7fbb49947ac6ff27b539764c22e9791f39e1", @generic="9589a1d3ab6016d4a86664e508a3134b2ecd5ca065923c69a27e76e42ad72e", @typed={0xc, 0x4d, @u64=0x4}, @generic="84d18adaa94c7c2c2a2e49687965a7930a974d58c2e7a10eaf4fb50ea288c26d23ce47702769e4216b45358e2866ff35495e127f68772a7ea31065820673c47efc86fe96dd7f5bd2a60001c6a3237eb026ce156747e54ac3f25a0613cd64276df75ae52c7cbf0eb3301a96261fee3ac3cc7045c5cba79d8ee5e22322f485c88b03ed0d33a92e6110c50cbf89606f80170baad6637bd4013269e1d162aacaa99202b818d308e130edf55382d04a3ba858421178be6bb7581485c40dbab72818438c638b28a9", @generic="c82fd7d5af593da0db55de72d824bf56e429ed917556b4b24f2b5f5cc65fced19fe38cca619ad29dc78d270455744e3ca2f99aeeacf523c1cb45a1b32df44b8604fe86681674e220f23fbbe7310d4b7e73d9e36b1fad089135ac0d7b2096b8a88a56b9f48a3e898eb2412e970d35baafb44b72702b38d4f340c4c458c476febc1df48b0bcfa18d2d78af4d0d74f91544a8f833be8cf3817e1a29a3a1f507456b3f5445842958eb2f908b9a64b0dfe2bd56d18ce909737e5e395c1e7412d4ba92261a495c385075b5b3bb0265134a5b7830db179995e6fc28b017c93e956fecfbb9f1e84fe256", @nested={0xec, 0x30, [@typed={0x14, 0x2b, @ipv6=@ipv4={[], [], @multicast2}}, @generic="03d8807749b1cb82bfc4d057bc2cb4e53e198f983b8a0bbd94508f3243048048b645661f9c5b377af6e8ad785e6ec286206a94a5fd973a8a55ad3eeab393384c59759433299ae8c12db0597937c31716f7a76701ef7e41b1abefa81f1af4f55d7e2f34f79312c4be30cd9d1bd680b8dc366a600eef3bc1979d8ab75b0fe1942a4a9f5d2e2b309d475a13ac96475b5df4ef0507b28cb31b3f946612fe028af759f0253f73f160ac2434868c16688265889615f5baf563e70d", @generic="fdd8fcc2ce95004d028c60b45008a8", @typed={0xc, 0x5e, @u64=0x6}]}, @typed={0x8, 0x22, @fd=r0}, @typed={0x38, 0x95, @binary="df56bf05b6b409c37384413a04cbd011a6fbe4d029b1a0ee3a21670dfe1f5692bd629b6ba6514b4bc8bd65f0d5e3474fde9c58"}, @nested={0xc, 0x7a, [@typed={0x8, 0x60, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @nested={0x13c, 0x3f, [@typed={0x8, 0xb, @fd=r0}, @typed={0xc, 0x4b, @u64=0x9}, @typed={0x8, 0x5f, @fd=r0}, @generic="cc191cd5145ee525881b73e31dc97a324617aa070a449bb99d5c693b52458213360878864157c919dd926b1bdff237fb88523f75090638f4c99022b45851bae9bc04a46e9818575d805a2cc6bb3823e4a2fb413ea04b73e9ed26967a78502c7009f78845b59975fc8ced24fce98c81a4a0fdebf970522e976cf15e2a47218abec5d8f9b4c5faacf12ead3e92", @typed={0x14, 0x5b, @ipv6=@ipv4={[], [], @loopback}}, @generic="fe1ea5ebe4ae8e677888ced99c2fff27963fdc20d2dae8b8d8acf8a3f7c600fe83bfcb03203ebf80b9b3f25ad177665c7303473df04245a1a13041e05c7d4de4f9ee9cf4d31a975b08f1e9340ce4e4cf3883db2a", @generic="e5430a0c6612d4aac8f9e9b945aba8c376ab21e482c1ec7e7e0e027ed4835f83f4b0ba1c9f"]}]}, 0x4c0}, {&(0x7f00000037c0)={0x330, 0x35, 0x200, 0x70bd29, 0x25dfdbfd, "", [@nested={0x228, 0x49, [@typed={0x8, 0x5a, @uid=r4}, @generic="cae192b9dcc0d966a24d8f8735808bb14ed68832c09a5396e673e0c91243e600d19330e7df998f03", @typed={0xb0, 0x81, @binary="8118b6fe3928b75b58156234caa81acefff00c2d5f06689783511bd4b0362dfae07380e5fb91f3d83d1ee245f7bc7372c6c85c25388b4475fcc99fc6383dafd49fb0723d4038b25b6daf6e68995c22f2146b1e23219c61a6e6f5ea20f0d22534f367c5e5c1933fd91b9ad4fb1f05364681fb8094868880aeb05db15d9d672de9bf9c8dfb865fcf700c5fc06d48b987b682d41e6c0ecce6afc01ec307ef88ecadade27073e026d5d6bd4d76a0"}, @generic="77d6aa04fd7866fb4f44c1b57a7f82997722de455e683d50bdb21595c14ac9d2ff13c9631048384b51b3378f9345935cc5fff36be170e6e9482491eac60393599b68c913d9d83d3dfaa7a4ae01dfc3cb2c7032d9050cf9e4f1d0daf9b5b0c1e4336886bd2496527f14dbb34229f003ccff71fa314acdaa7a5284aae8964d00629d04d8fcc59b9506f0", @typed={0x8, 0x20, @pid=r5}, @typed={0x4, 0x30}, @generic="891bee0119e5f689682cd56a975537a6d6f5962375eff1ca1fd715534d391c0db2b8cad323b545126654d5694d5e347951a823b25b2027f9eddfda4c7b4012c2caded626c9bcbccff37216640eaffd27901c9b11ebe87789a281fc07cee918be0aca315b70327c64a2d9732ae2bb7107b556965f43786c52bdce8609d5145f343f7301143f58cc51d49628e705f9f267f0313cb1efc1ca9a7e6675a98e78c2c08c179b", @generic="6b14faf946219443", @typed={0x4, 0x8d}]}, @typed={0xc, 0x3c, @u64}, @generic="7aa3ba968bc27c9b318cdb0c0a82bda8c04a61d3985c31b0d2105b366cd5322338576ee2397c5f18334b2a13725f6b1eb1a2c7a701949204b4e24598f4570649865076e34fba963db9ec4fb9aa34b3f57974593471ffedbbf7f1c9465aa2ead23da0bd11e441125a2c95fec29097280bdbc27a0ef492d43043f16e5cef0bf5c7a95f1c1b852d9b807139466f83ebaed03b129637", @generic="e31d7b3d8be3111d6af06766bd9b0ec23359dfc65060a778fe60226df9b3636a226567b433c770612bef4ac90d68a5846c93ffe04acdc70e4e25f20237b3eba9b386b4382c39dc6e787ceeda56d0634f800d02b8958c"]}, 0x330}, {&(0x7f0000003e00)={0x17d8, 0x31, 0x0, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x1f0, 0x59, [@typed={0x8, 0x18, @uid=r6}, @generic="4b31471f777606bde24d0ad73d8bdb508aa7d3a0e58662dead97f65ad88b6ecf43750d35cecf72f1fb1540bd773325f0abbf27dfec527265df881747bd3feeaa396658a7eb3177856f742c46ceb03bd09017119aae6eb61d6bbc7cb6b779903f53871f566ad1259c603b6054797417fd117d2d8d38152cd9b49fb27bd4db3c4205bbb3f7b81c75ec24b3e906a6badf53358bba57e7ddbcca89191054ef6a4e0aca96454d7b674e4a6926aa068a9702c13b5711e6b01239cf21c52414b06510f979f6a93fe822594a3e5d29c809db221b322ad97af99748ca47ea6fde62812a6a7e8c24a81d0102a4764246fc", @generic="b186c4b8fdc23e04610f720fe26a01c62312d5ba4a7c42316ede50c36834da6b95336cc58a4f664cb8a556e2004f57c9cc7b0a24d91f441ea738722119626c05128ada00d0b26901fecc0720c27a1ff36f517e5784109d2582c116f5ec7ae07746191ca0d4060465c3b082e68cb2ed62dd973719a52cb323986303b0d4bc00ffe1b636d6daeca88a11ec1ae594086eee8b5645ee2d7af40d1ea3faf95565a619ddff169ff50912490aeae743812eb295a1ce44804c2c1820ae39e5081b49b613ae27e51c73e9fcd98890d8a995b55bd315587358813d9430b40dada935321b5678603692b8021b7c39108fbed040073b45882bdd3de41c"]}, @nested={0x27c, 0x41, [@generic="ca2c89940285c00f0d0aa9d2eab4bd78a4a675c4b89a3bacec51e37eb5fe68a51d99fc4f332774dc3ae876996b8cf2f4541dc217d7e40b4d116deb4f4c1c10c8f19b4fb84baddb007d3c7dcae3c68ea9d7e4e23cc21eeea7870b37bc1f9b2338d92967dfe25920dfbb5d16cdc377603b174b0dc14710ba5a24188e3ded856bd8fe2b8e91d130595e885f2bd04356c46ca4aa5f9985272cd75cc82d5f994a7e25db7fec5aeda6ba42b6945351534457be8b268197b87e172d12316a8226b9dfdf2fbbe2358b6ab59bc094daf66635473b87440e9839c3f12d220acc58e492860090966a6de453c0287d116e5d5c33142e4ad57807", @typed={0xd8, 0x84, @binary="4383c51ba0e685c88ed0a04a8e983a0b79d970317bd3fd282fc79aa50d6a0e41c5a429b7df45e67ebf505d5262dcf7aca7a88d40f3478d91503ce5150b91cb95666deeeb658d5fc154e9af929855ced940b9e6f29ef32f8df4d75a2b342e50a87f8b6b15e8444b342ed01289d25bcef4556eb41c5ad5be331c881495c9ab00303ceb8a7e97c5669ef3baaa7be15ab9f8a944f7424936c9435273c0f5653d5a1e57941e0dab5d668d48ef527cbc9db018a1023578a56e1b039ba7bc970c996a6fe42bc48f8b44473b65a3e0ff93471a5dd2"}, @typed={0x8, 0x6a, @str='\x00'}, @typed={0x8, 0x1c, @fd=r0}, @generic="f857af2a81b37b85a48910df4d158d242a4c5c72d309385d1e82f288307bc41720c229b55190afdd3c4e1f6ad1aa19575d3dbf2027ecc26c0b0364d6d1c47cf57822c3819946e1bde794529327f48279a8db3c2e3f60aba9bd2d571d50217ded50501af773a3520ae8140cdb7334293d030c895acd0be66f86a079f09d02e203fd1ee30d202331e1daa1de86e11b22f507", @typed={0x8, 0x7a, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}]}, @nested={0x18, 0x34, [@typed={0x8, 0x84, @uid=r7}, @typed={0x4, 0x31}, @typed={0x8, 0x2, @uid=r8}]}, @nested={0x111c, 0x14, [@typed={0x8, 0xe, @uid=r9}, @typed={0x8, 0x10, @u32=0x4}, @typed={0x4, 0x5a}, @generic="054e63f092a12d4f5c3367df9130cb2103a9e1757e90b4305e2fb9f5d60109b643ac2e9a467c0994814b92", @typed={0x4, 0x25}, @generic="0545c65504f4ce484e5db549812add4c2bcce812bba406f1d6040e505c893523b05e1952b2b5ab9d49c2225e7a38bff3f16ddd9aab147fb8d63e1803333e3c614384c9a8b738a7f06e0b5fa8b149da1026c01f9dd73f6d85d1ff3401df27b4fcf8f9204d6ef56c7c1cfac99d60137d6edbf530fe5c9b97c0eb9907b783a68c7e3b2b23d87d9ffbe36c10f083733444604595a2aa254659cce408d08e420697867316bbe4c5f7eccd7d65ff4db6367a0e98b87148bc3f059dc9f67876c92d14fbd13ef3fe65ad994fc1ebf6690528bd78e5", @generic="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", @typed={0x4, 0x67}]}, @typed={0x4, 0x2f}, @nested={0x210, 0x27, [@generic="9207f122bc968bbf62696256ff5573978a0a36fa5e7e28c00fcb63ba4181737c726d5079333641ac30c7aa7bb7575f4bcb80668959ef1d72f4f08eee624c22ebf3acafb9634673e7de4716f40dbebd714ca601862303c4b469977249f487be8b43334f470172c4bfa843e90dfad71977d0549aedadc3354f591a88454f10dda5c0f5d5", @typed={0x8, 0x8b, @uid=r10}, @generic="10386f15abd5d5c5f8da136d8126545076a1481ed2f65a9068b244cb8cada1f6dae1420eb70c95efa6114bd43ac3b7d54eadba08d3b481501255a4500da82ef5d82700b1be94ebb6b9e3cf9181b60724266ae750d9722e6f9f37fe46ec47dbee6dcc51ff08db69a29cd05c4069c77a844d6ca56207265e915ff28101ba1adfd6be6fd4fbd2e63893ecd6a1d13d4eb84a79f3d054adc25e9db92ad2ed998bdfe2907419e0ee8e32d0c21f05a6bbeb8c3f5c7ee237dede37ae6f590d38c4395389439758786a69a7fe0ff200d66e0bd1f8e1c0427b0bb93b26185d09c477", @typed={0x7c, 0x22, @binary="09876d5c5a76f551552f33e390d6bf276c5471f399a6af080b82df1793e2c454aed146cedc355d15a189de5a114e91a18b5d87a03faa005bf5236f777d5499d5cb1e91da41116fb6f6c9e2ee65f9a6ec2e61151806d1353b803802609bdc27ff22753a20d8874705fd56fee390d522b143764b8b9b"}, @generic="7eb8b51382c89b10ae6afc15f1b060a41074d28eebbe0a2227fb2710ff", @typed={0x8, 0x52, @u32=0xfff}]}, @typed={0x14, 0x38, @ipv6=@initdev={0xfe, 0x88, [], 0x6, 0x0}}]}, 0x17d8}], 0xa, &(0x7f0000005b80)=[@cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r19, r20}}}], 0x60, 0x1}, 0x4040001) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@bridge_setlink={0x20, 0x13, 0xa29}, 0x20}}, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0xa003}) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getpeername(r1, &(0x7f0000000140)=@llc, &(0x7f0000000040)=0x80) 02:04:32 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) readv(r0, &(0x7f00000016c0), 0x0) 02:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x5) uname(&(0x7f0000000140)=""/86) 02:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xe, 0x0, 0x0) 02:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0xa003}) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x5) uname(&(0x7f0000000140)=""/86) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454da, 0x400010) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:32 executing program 1: r0 = socket(0x10, 0x6, 0x5) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0xffffffffffffff3e) 02:04:32 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x5) uname(&(0x7f0000000140)=""/86) 02:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 1: r0 = creat(&(0x7f0000000040)='./file1\x00', 0xd) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={0x0, 0x94, "f7ee96951c1adc035246cbea512622ec95b229b135e52a0e8b55b39c61003b9e9d36e693ae539f37a1d6357a03f7744c0f6659f1fd585aaf6086e0c0894ad60d19f2282a2d55990dabfdcb281c3fa71910fca00a7bb12c1df8c94082621313622ebb983f26abb832befeee6340d48c155e96e7142bf00670d3adf103c6ef087d7abeb99cb8f42ca816b2c41f51946c9ff68eceeb"}, &(0x7f00000003c0)=0x9c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={r1, 0x5d, "3fee55224acec32008dfccd240c8ddaefc65d483d14a0cc134a867a9f2e2cdaac7818a96d870f34bb6ea2c39acfdba486191aec38d3e13760a0c42d428b8356a419ab91ba0220d66342cdd148710fce1c8317133b13323b65b7ead1bc1"}, &(0x7f0000000000)=0x65) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={r2, 0x61, "b59fc39e0909de341add9f157e8ad7349b4d55b9861734147a4892aab4aa7e90ee32319547d6ee5acd56c53aac0709b4eae62dad3ad11914d55a76a25236f01c44ebfe0652d58c2245dc6e14b62f88688518fc368c277c818a1c21bec6fb775fb3"}, &(0x7f0000000180)=0x69) connect$rose(r0, &(0x7f0000000240)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, @default}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0x8, 0x8, 0x6, 0x400, r2}, &(0x7f00000002c0)=0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000400)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x5, [@multicast2, @local, @dev={0xac, 0x14, 0x14, 0x11}, @broadcast, @local]}, 0x24) fsetxattr$security_selinux(r0, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:vhost_device_t:s0\x00', 0x24, 0x0) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x5) uname(&(0x7f0000000140)=""/86) 02:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x80004506, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x7) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2820, 0x4000) r2 = request_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='\x00', 0xfffffffffffffff9) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="b27e89c029b87c5e610ed8360166f6c16447e6deaea394c83bd31cc182874ebf4f7e255354d889d98bdbbd6b3c8bdb322a1bba1d019c0d4d030d8ba47555ffc90ca2558d322299db4708876c0ca07536e3d319992d22d1f5fd6d1d77bca7639facee8ab4db45a407b36e94fac7bf4acb193b8407ade4a6c478d3a9727b1f909d26cd13a08b68a229e953a83b", 0x8c, r2) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='/dev/input/event#\x00') ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f00000002c0)=0x6) 02:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:32 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:32 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x5) 02:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:33 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x40900, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil}) 02:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}}}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x800}, 0x28, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") prctl$PR_SET_MM_MAP(0x24, 0xe, 0x0, 0x0) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:33 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800001000008911, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) 02:04:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x480000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 161.244745][T10631] sctp: [Deprecated]: syz-executor.1 (pid 10631) Use of int in maxseg socket option. [ 161.244745][T10631] Use struct sctp_assoc_value instead 02:04:33 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:33 executing program 1: 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:33 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:33 executing program 1: 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:33 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:33 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:33 executing program 1: 02:04:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:34 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:34 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 1: 02:04:34 executing program 3: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:34 executing program 3: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:34 executing program 3: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 1: 02:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:34 executing program 1: 02:04:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 1: 02:04:34 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:34 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:34 executing program 1: 02:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:34 executing program 5: socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 02:04:34 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 1: semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f0000000000)=""/104) 02:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 5: socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 02:04:35 executing program 1: r0 = memfd_create(&(0x7f0000000040)='\xebK\xb0is\xd1\xad\x9b\xa9\xe8\x14\xaa\xc1p\r\xe5\x9c\xdc\v\x84^\xa2\xedd.o\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) lseek(r0, 0x0, 0x3) fsetxattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='t'], 0x0, 0x0, 0x0) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:35 executing program 5: socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 5: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) 02:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 1: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x8941, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) accept$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 5: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) 02:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 5: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0xb) sendfile(r0, r1, &(0x7f0000000180), 0x80000000003ff) getsockname$netrom(r0, &(0x7f0000000040)={{0x3, @rose}, [@netrom, @default, @bcast, @default, @default, @bcast, @netrom, @null]}, &(0x7f00000000c0)=0x48) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0}) 02:04:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:35 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0}) 02:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1e9) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x5, 0x200000) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xca059bf54b6e1ee3) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) dup(r1) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000052c0)={@initdev, @multicast1, 0x0}, &(0x7f0000005300)=0xc) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000005340)={@empty, @empty, @loopback, 0x0, 0x7, 0x1, 0x500, 0x2, 0x40040005, r4}) 02:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:35 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:35 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0}) 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 02:04:36 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:36 executing program 1: epoll_create1(0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4}, 0xfffffffffffffe40) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x11) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000013c0)={'filter\x00', 0x4}, 0x68) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ptrace(0x10, r2) 02:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 02:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 163.957863][T11014] FAULT_INJECTION: forcing a failure. [ 163.957863][T11014] name failslab, interval 1, probability 0, space 0, times 1 02:04:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 02:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 164.138601][T11014] CPU: 1 PID: 11014 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #84 [ 164.146605][T11014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.156651][T11014] Call Trace: [ 164.159933][T11014] dump_stack+0x1d8/0x2f8 [ 164.164258][T11014] should_fail+0x555/0x770 [ 164.168678][T11014] __should_failslab+0x11a/0x160 [ 164.173615][T11014] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 164.179320][T11014] should_failslab+0x9/0x20 [ 164.183800][T11014] __kmalloc+0x7a/0x340 [ 164.187949][T11014] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 164.193669][T11014] tomoyo_realpath_from_path+0xdc/0x7c0 [ 164.199211][T11014] tomoyo_path_number_perm+0x166/0x640 [ 164.204663][T11014] ? smack_file_ioctl+0x226/0x2e0 [ 164.209658][T11014] ? __fget+0x4c1/0x510 [ 164.213790][T11014] tomoyo_file_ioctl+0x23/0x30 [ 164.218593][T11014] security_file_ioctl+0x6d/0xd0 [ 164.223590][T11014] __x64_sys_ioctl+0xa3/0x120 [ 164.228238][T11014] do_syscall_64+0xfe/0x140 [ 164.232712][T11014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.238574][T11014] RIP: 0033:0x459829 [ 164.242439][T11014] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.262014][T11014] RSP: 002b:00007f849628ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.270395][T11014] RAX: ffffffffffffffda RBX: 00007f849628ec90 RCX: 0000000000459829 [ 164.278337][T11014] RDX: 0000000020000180 RSI: 00000000000089e0 RDI: 0000000000000005 02:04:36 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 02:04:36 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000100), &(0x7f0000000200)=0x4) r4 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x400, 0x20) ioctl$VIDIOC_S_PRIORITY(r4, 0x40045644, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 164.286282][T11014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 164.294226][T11014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f849628f6d4 [ 164.302169][T11014] R13: 00000000004c57ad R14: 00000000004d9e88 R15: 0000000000000006 [ 164.310865][T11014] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 02:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 164.455117][T11064] FAULT_INJECTION: forcing a failure. [ 164.455117][T11064] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 164.468344][T11064] CPU: 1 PID: 11064 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #84 [ 164.476314][T11064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.486360][T11064] Call Trace: [ 164.489642][T11064] dump_stack+0x1d8/0x2f8 [ 164.493951][T11064] should_fail+0x555/0x770 [ 164.498346][T11064] should_fail_alloc_page+0x55/0x60 [ 164.503513][T11064] prepare_alloc_pages+0x283/0x470 [ 164.508600][T11064] __alloc_pages_nodemask+0xb2/0x5d0 [ 164.513857][T11064] ? stack_trace_save+0x150/0x150 [ 164.518860][T11064] kmem_getpages+0x56/0xa20 [ 164.523337][T11064] cache_grow_begin+0x7e/0x2c0 [ 164.528075][T11064] cache_alloc_refill+0x311/0x3f0 [ 164.533071][T11064] ? check_preemption_disabled+0xb7/0x2a0 [ 164.538766][T11064] __kmalloc+0x318/0x340 [ 164.542986][T11064] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 164.548684][T11064] tomoyo_realpath_from_path+0xdc/0x7c0 [ 164.554212][T11064] tomoyo_path_number_perm+0x166/0x640 [ 164.559652][T11064] ? smack_file_ioctl+0x226/0x2e0 [ 164.564649][T11064] ? __fget+0x4c1/0x510 [ 164.568778][T11064] tomoyo_file_ioctl+0x23/0x30 [ 164.573515][T11064] security_file_ioctl+0x6d/0xd0 [ 164.578425][T11064] __x64_sys_ioctl+0xa3/0x120 [ 164.583077][T11064] do_syscall_64+0xfe/0x140 [ 164.587557][T11064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.593420][T11064] RIP: 0033:0x459829 [ 164.597303][T11064] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.616883][T11064] RSP: 002b:00007f849628ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.625263][T11064] RAX: ffffffffffffffda RBX: 00007f849628ec90 RCX: 0000000000459829 [ 164.633207][T11064] RDX: 0000000020000180 RSI: 00000000000089e0 RDI: 0000000000000005 [ 164.641149][T11064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) [ 164.649094][T11064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f849628f6d4 [ 164.657037][T11064] R13: 00000000004c57ad R14: 00000000004d9e88 R15: 0000000000000006 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 02:04:37 executing program 5 (fault-call:3 fault-nth:2): r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}) fcntl$setlease(r0, 0x400, 0x1) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000100)={r1, 0x3e, 0x13}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'sha224-avx\x00'}}, &(0x7f00000001c0)="2e520a7ddc9aec47b83477534c1ff11ed66f34e30b60256bf6b66c8ef063c456fe2f623b4853c14164a1b8792111b1d9bfc500567051995c8d4c564f1800", &(0x7f0000000280)="29b1d850657930f8dead6f17f15abfd246f6d4") 02:04:37 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) [ 164.893184][T11097] FAULT_INJECTION: forcing a failure. [ 164.893184][T11097] name failslab, interval 1, probability 0, space 0, times 0 [ 164.933985][T11097] CPU: 1 PID: 11097 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #84 [ 164.941989][T11097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.952034][T11097] Call Trace: [ 164.955320][T11097] dump_stack+0x1d8/0x2f8 [ 164.959650][T11097] should_fail+0x555/0x770 [ 164.964063][T11097] __should_failslab+0x11a/0x160 [ 164.968996][T11097] ? tomoyo_encode2+0x273/0x5a0 [ 164.973840][T11097] should_failslab+0x9/0x20 [ 164.978355][T11097] __kmalloc+0x7a/0x340 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) [ 164.982510][T11097] tomoyo_encode2+0x273/0x5a0 [ 164.987188][T11097] tomoyo_realpath_from_path+0x769/0x7c0 [ 164.992826][T11097] tomoyo_path_number_perm+0x166/0x640 [ 164.998290][T11097] ? smack_file_ioctl+0x226/0x2e0 [ 165.003305][T11097] ? __fget+0x4c1/0x510 [ 165.007445][T11097] tomoyo_file_ioctl+0x23/0x30 [ 165.007454][T11097] security_file_ioctl+0x6d/0xd0 [ 165.007464][T11097] __x64_sys_ioctl+0xa3/0x120 [ 165.007474][T11097] do_syscall_64+0xfe/0x140 [ 165.007488][T11097] entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:04:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) [ 165.032150][T11097] RIP: 0033:0x459829 [ 165.036037][T11097] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.055633][T11097] RSP: 002b:00007f849628ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 165.064042][T11097] RAX: ffffffffffffffda RBX: 00007f849628ec90 RCX: 0000000000459829 [ 165.072011][T11097] RDX: 0000000020000180 RSI: 00000000000089e0 RDI: 0000000000000005 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) [ 165.079981][T11097] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 165.087949][T11097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f849628f6d4 [ 165.095915][T11097] R13: 00000000004c57ad R14: 00000000004d9e88 R15: 0000000000000006 02:04:37 executing program 5 (fault-call:3 fault-nth:3): r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}) fcntl$setlease(r0, 0x400, 0x1) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000100)={r1, 0x3e, 0x13}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'sha224-avx\x00'}}, &(0x7f00000001c0)="2e520a7ddc9aec47b83477534c1ff11ed66f34e30b60256bf6b66c8ef063c456fe2f623b4853c14164a1b8792111b1d9bfc500567051995c8d4c564f1800", &(0x7f0000000280)="29b1d850657930f8dead6f17f15abfd246f6d4") 02:04:37 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 165.125762][T11097] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) 02:04:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:37 executing program 1: unshare(0x400) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f0000000140)=@in={0x2, 0x4e22, @rand_addr=0x9}, 0xff78) [ 165.213301][T11134] FAULT_INJECTION: forcing a failure. [ 165.213301][T11134] name failslab, interval 1, probability 0, space 0, times 0 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) [ 165.296727][T11134] CPU: 0 PID: 11134 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #84 [ 165.304731][T11134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.314764][T11134] Call Trace: [ 165.314779][T11134] dump_stack+0x1d8/0x2f8 [ 165.314793][T11134] should_fail+0x555/0x770 [ 165.314807][T11134] __should_failslab+0x11a/0x160 [ 165.314822][T11134] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 165.314836][T11134] should_failslab+0x9/0x20 [ 165.341911][T11134] __kmalloc+0x7a/0x340 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)}], 0x1}, 0x0) 02:04:37 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 165.346064][T11134] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 165.351779][T11134] tomoyo_realpath_from_path+0xdc/0x7c0 [ 165.357321][T11134] tomoyo_path_number_perm+0x166/0x640 [ 165.362785][T11134] ? smack_file_ioctl+0x278/0x2e0 [ 165.367798][T11134] ? __fget+0x4c1/0x510 [ 165.371951][T11134] tomoyo_file_ioctl+0x23/0x30 [ 165.376701][T11134] security_file_ioctl+0x6d/0xd0 [ 165.376712][T11134] __x64_sys_ioctl+0xa3/0x120 [ 165.376724][T11134] do_syscall_64+0xfe/0x140 [ 165.390779][T11134] entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:04:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 165.390787][T11134] RIP: 0033:0x459829 [ 165.390798][T11134] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.420228][T11134] RSP: 002b:00007fbc1834ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 165.420238][T11134] RAX: ffffffffffffffda RBX: 00007fbc1834ac90 RCX: 0000000000459829 [ 165.420243][T11134] RDX: 0000000020000000 RSI: 00000000c0585609 RDI: 0000000000000003 02:04:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x8000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c", 0x2}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x4, 0x3}, 0xfffffffffffffe40) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f00000000c0)={0xe, 0x8, 0x7}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x3, &(0x7f00000013c0)={'filter\x00', 0x4}, 0x68) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x4000, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) 02:04:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 165.420248][T11134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 165.420253][T11134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc1834b6d4 [ 165.420257][T11134] R13: 00000000004c4d7e R14: 00000000004d90d8 R15: 0000000000000004 [ 165.435326][T11134] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)}], 0x1}, 0x0) 02:04:37 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x2, &(0x7f0000000180)={r0, r1}) 02:04:37 executing program 3 (fault-call:2 fault-nth:1): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)}], 0x1}, 0x0) 02:04:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 165.689422][T11189] FAULT_INJECTION: forcing a failure. [ 165.689422][T11189] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 165.706395][T11189] CPU: 0 PID: 11189 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #84 [ 165.714368][T11189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.724419][T11189] Call Trace: [ 165.727706][T11189] dump_stack+0x1d8/0x2f8 [ 165.732024][T11189] should_fail+0x555/0x770 [ 165.736428][T11189] should_fail_alloc_page+0x55/0x60 [ 165.741611][T11189] prepare_alloc_pages+0x283/0x470 [ 165.746702][T11189] __alloc_pages_nodemask+0xb2/0x5d0 [ 165.751960][T11189] ? stack_trace_save+0x150/0x150 [ 165.756963][T11189] kmem_getpages+0x56/0xa20 [ 165.761440][T11189] ? check_preemption_disabled+0x47/0x2a0 [ 165.767134][T11189] cache_grow_begin+0x7e/0x2c0 [ 165.771873][T11189] cache_alloc_refill+0x311/0x3f0 [ 165.776870][T11189] ? check_preemption_disabled+0xb7/0x2a0 [ 165.782565][T11189] __kmalloc+0x318/0x340 [ 165.786793][T11189] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 165.792499][T11189] tomoyo_realpath_from_path+0xdc/0x7c0 [ 165.798023][T11189] tomoyo_path_number_perm+0x166/0x640 [ 165.803465][T11189] ? smack_file_ioctl+0x278/0x2e0 [ 165.808460][T11189] ? __fget+0x4c1/0x510 [ 165.812591][T11189] tomoyo_file_ioctl+0x23/0x30 [ 165.817330][T11189] security_file_ioctl+0x6d/0xd0 [ 165.822244][T11189] __x64_sys_ioctl+0xa3/0x120 [ 165.826898][T11189] do_syscall_64+0xfe/0x140 [ 165.831380][T11189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.837246][T11189] RIP: 0033:0x459829 [ 165.841121][T11189] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.860700][T11189] RSP: 002b:00007fbc1834ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 165.869084][T11189] RAX: ffffffffffffffda RBX: 00007fbc1834ac90 RCX: 0000000000459829 [ 165.877049][T11189] RDX: 0000000020000000 RSI: 00000000c0585609 RDI: 0000000000000003 02:04:37 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x10, &(0x7f0000000180)={r0, r1}) 02:04:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 165.884995][T11189] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 165.892941][T11189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc1834b6d4 [ 165.900883][T11189] R13: 00000000004c4d7e R14: 00000000004d90d8 R15: 0000000000000004 02:04:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa283008120", 0x12}], 0x1}, 0x0) 02:04:38 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x4c00, &(0x7f0000000180)={r0, r1}) 02:04:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x8000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c", 0x2}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x4, 0x3}, 0xfffffffffffffe40) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f00000000c0)={0xe, 0x8, 0x7}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x3, &(0x7f00000013c0)={'filter\x00', 0x4}, 0x68) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x4000, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) 02:04:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa283008120", 0x12}], 0x1}, 0x0) 02:04:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:38 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x4c01, &(0x7f0000000180)={r0, r1}) 02:04:38 executing program 3 (fault-call:2 fault-nth:2): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa283008120", 0x12}], 0x1}, 0x0) 02:04:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 166.427226][T11231] FAULT_INJECTION: forcing a failure. [ 166.427226][T11231] name failslab, interval 1, probability 0, space 0, times 0 [ 166.470575][T11231] CPU: 1 PID: 11231 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #84 [ 166.478586][T11231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.478592][T11231] Call Trace: [ 166.478609][T11231] dump_stack+0x1d8/0x2f8 [ 166.478624][T11231] should_fail+0x555/0x770 [ 166.478641][T11231] __should_failslab+0x11a/0x160 [ 166.478654][T11231] ? tomoyo_encode2+0x273/0x5a0 [ 166.478666][T11231] should_failslab+0x9/0x20 [ 166.478677][T11231] __kmalloc+0x7a/0x340 02:04:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85", 0x1b}], 0x1}, 0x0) 02:04:38 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x5421, &(0x7f0000000180)={r0, r1}) [ 166.478694][T11231] tomoyo_encode2+0x273/0x5a0 [ 166.505627][T11231] tomoyo_realpath_from_path+0x769/0x7c0 [ 166.505643][T11231] tomoyo_path_number_perm+0x166/0x640 [ 166.534798][T11231] ? smack_file_ioctl+0x278/0x2e0 [ 166.539821][T11231] ? __fget+0x4c1/0x510 [ 166.543981][T11231] tomoyo_file_ioctl+0x23/0x30 [ 166.548755][T11231] security_file_ioctl+0x6d/0xd0 [ 166.553692][T11231] __x64_sys_ioctl+0xa3/0x120 [ 166.558371][T11231] do_syscall_64+0xfe/0x140 [ 166.558385][T11231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.558393][T11231] RIP: 0033:0x459829 [ 166.558401][T11231] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.558406][T11231] RSP: 002b:00007fbc1834ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 166.558415][T11231] RAX: ffffffffffffffda RBX: 00007fbc1834ac90 RCX: 0000000000459829 [ 166.558420][T11231] RDX: 0000000020000000 RSI: 00000000c0585609 RDI: 0000000000000003 02:04:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85", 0x1b}], 0x1}, 0x0) [ 166.558425][T11231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 166.558429][T11231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc1834b6d4 [ 166.558435][T11231] R13: 00000000004c4d7e R14: 00000000004d90d8 R15: 0000000000000004 [ 166.746660][T11231] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x8000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c", 0x2}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x4, 0x3}, 0xfffffffffffffe40) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f00000000c0)={0xe, 0x8, 0x7}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x3, &(0x7f00000013c0)={'filter\x00', 0x4}, 0x68) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x4000, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) 02:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85", 0x1b}], 0x1}, 0x0) 02:04:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:39 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x5450, &(0x7f0000000180)={r0, r1}) 02:04:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:39 executing program 3 (fault-call:2 fault-nth:3): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a2", 0x20}], 0x1}, 0x0) 02:04:39 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x5451, &(0x7f0000000180)={r0, r1}) 02:04:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x8000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c", 0x2}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x4, 0x3}, 0xfffffffffffffe40) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f00000000c0)={0xe, 0x8, 0x7}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x3, &(0x7f00000013c0)={'filter\x00', 0x4}, 0x68) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x4000, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) 02:04:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x2, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a2", 0x20}], 0x1}, 0x0) 02:04:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:39 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x5452, &(0x7f0000000180)={r0, r1}) 02:04:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a2", 0x20}], 0x1}, 0x0) 02:04:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:39 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x5460, &(0x7f0000000180)={r0, r1}) [ 167.479890][T11314] vivid-006: kernel_thread() failed 02:04:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x10, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) 02:04:40 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) read$FUSE(r2, &(0x7f0000001240), 0xffffff7b) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x6115, 0x8) 02:04:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) 02:04:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4c00, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:40 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x6364, &(0x7f0000000180)={r0, r1}) 02:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:40 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8901, &(0x7f0000000180)={r0, r1}) 02:04:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) 02:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4c01, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) 02:04:40 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000100)) msgsnd(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="fc91c271b731a636a802cebc2da9f9867b4a891ffa652b833a83e1cc5a7a9406001f14a02e201bfd9e47e56edc7c24cb6770a4c905175091825ba8e900f1fc58d14afb54aa24d433f2f9893f4deb718bd9cb75a7a5f81705db95f3382e8ca83e1fbba2035a551a39b79afa8907d38e5d48e5a6460151cc906565ee49cfac54d416057f7e69b162a59cb1e30046a179efda1e137655151f91a8f81f90cfc41bdf817fe6c6d92619193b2c4a5f4c98a55d7ef91253e000000c5a6c8fa74da70e301d7b608d280c3a70f8fa9e5c2e638c31809b6d113a459dfd261470c15e3e665981b078004c0ebc3e78585d"], 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180)=0xffffffffffffff80, 0x4) msgrcv(r0, 0x0, 0x10000027c, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x200000) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000080)={0x4, 0x18000}) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) 02:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:40 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8902, &(0x7f0000000180)={r0, r1}) 02:04:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) 02:04:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4c04, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) 02:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4c05, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:40 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8903, &(0x7f0000000180)={r0, r1}) 02:04:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:40 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4080, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x1, 0xffffffff}, 0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000200)=0x10001, &(0x7f0000000240)=0x2) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000040)={0x0, 0x2, {0x3, 0x3, 0x1, 0x3, 0x25}}) 02:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5403, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:40 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8904, &(0x7f0000000180)={r0, r1}) [ 168.403481][T11458] FAULT_INJECTION: forcing a failure. [ 168.403481][T11458] name failslab, interval 1, probability 0, space 0, times 0 02:04:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5112, 0x0) [ 168.528206][T11458] CPU: 1 PID: 11458 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 168.536204][T11458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.546247][T11458] Call Trace: [ 168.549540][T11458] dump_stack+0x1d8/0x2f8 [ 168.553879][T11458] should_fail+0x555/0x770 [ 168.558296][T11458] __should_failslab+0x11a/0x160 [ 168.563228][T11458] should_failslab+0x9/0x20 [ 168.567715][T11458] kmem_cache_alloc_node+0x65/0x280 [ 168.572890][T11458] ? __alloc_skb+0x9f/0x500 [ 168.577381][T11458] __alloc_skb+0x9f/0x500 [ 168.581688][T11458] netlink_sendmsg+0x756/0xc50 [ 168.586425][T11458] ? netlink_getsockopt+0x9f0/0x9f0 [ 168.591600][T11458] ___sys_sendmsg+0x60d/0x910 [ 168.596264][T11458] ? rcu_lock_release+0xd/0x30 [ 168.601005][T11458] ? rcu_lock_release+0x26/0x30 [ 168.605828][T11458] ? __fget+0x4e6/0x510 [ 168.609961][T11458] ? __fdget+0x17c/0x200 [ 168.614178][T11458] __x64_sys_sendmsg+0x17c/0x200 [ 168.619092][T11458] do_syscall_64+0xfe/0x140 [ 168.623571][T11458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.629436][T11458] RIP: 0033:0x459829 [ 168.633304][T11458] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.652885][T11458] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 168.661264][T11458] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 168.669208][T11458] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 02:04:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5421, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 168.677153][T11458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 168.685099][T11458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 168.693042][T11458] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 [ 168.703031][T11470] vivid-006: kernel_thread() failed 02:04:41 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000005c0)=ANY=[@ANYBLOB="020000000000000000000000000000007d00000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="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"], @ANYBLOB="000000000000000000000000000000008200000000000000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/130], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, 0x0) 02:04:41 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8906, &(0x7f0000000180)={r0, r1}) 02:04:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:41 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5112, 0x0) [ 168.831017][T11482] vivid-006: kernel_thread() failed [ 168.895080][T11505] FAULT_INJECTION: forcing a failure. [ 168.895080][T11505] name failslab, interval 1, probability 0, space 0, times 0 [ 168.921157][T11505] CPU: 0 PID: 11505 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 168.929168][T11505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.939224][T11505] Call Trace: 02:04:41 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5450, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 168.942515][T11505] dump_stack+0x1d8/0x2f8 [ 168.946848][T11505] should_fail+0x555/0x770 [ 168.951265][T11505] __should_failslab+0x11a/0x160 [ 168.956198][T11505] should_failslab+0x9/0x20 [ 168.960691][T11505] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 168.966389][T11505] ? __kmalloc_node_track_caller+0x3c/0x60 [ 168.972180][T11505] __kmalloc_node_track_caller+0x3c/0x60 [ 168.972195][T11505] ? netlink_sendmsg+0x756/0xc50 [ 168.982718][T11505] __alloc_skb+0xe8/0x500 [ 168.987034][T11505] netlink_sendmsg+0x756/0xc50 02:04:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5112, 0x0) [ 168.991778][T11505] ? netlink_getsockopt+0x9f0/0x9f0 [ 168.996950][T11505] ___sys_sendmsg+0x60d/0x910 [ 169.001613][T11505] ? rcu_lock_release+0xd/0x30 [ 169.006349][T11505] ? rcu_lock_release+0x26/0x30 [ 169.011169][T11505] ? __fget+0x4e6/0x510 [ 169.015307][T11505] ? __fdget+0x17c/0x200 [ 169.019531][T11505] __x64_sys_sendmsg+0x17c/0x200 [ 169.024488][T11505] do_syscall_64+0xfe/0x140 [ 169.028985][T11505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.034872][T11505] RIP: 0033:0x459829 [ 169.038755][T11505] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.058349][T11505] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 169.066729][T11505] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 169.074671][T11505] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 169.082613][T11505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:04:41 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8907, &(0x7f0000000180)={r0, r1}) 02:04:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0x7ffffffffffff010}, {0x6}]}, 0x10) write$binfmt_misc(r0, &(0x7f00000009c0)=ANY=[@ANYPTR64=&(0x7f0000001a40)=ANY=[]], 0xfdef) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) io_uring_setup(0x9f2, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x37a}) [ 169.090558][T11505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 169.098502][T11505] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 02:04:41 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5451, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:41 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8933, &(0x7f0000000180)={r0, r1}) 02:04:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x0, 0x0) 02:04:41 executing program 0 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000003c0)='hfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='file_umask=00000000000040000\t\x00\'\x00\x00\x00\x00\x00']) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x501000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080), 0x4) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f0000000000)=0xea4, 0x4) [ 169.311609][T11547] vivid-006: kernel_thread() failed 02:04:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:41 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5452, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:41 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8940, &(0x7f0000000180)={r0, r1}) [ 169.382739][T11565] hfs: unable to parse mount options [ 169.431478][T11579] FAULT_INJECTION: forcing a failure. [ 169.431478][T11579] name failslab, interval 1, probability 0, space 0, times 0 [ 169.444411][T11579] CPU: 1 PID: 11579 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 169.452396][T11579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.462439][T11579] Call Trace: [ 169.465714][T11579] dump_stack+0x1d8/0x2f8 [ 169.470029][T11579] should_fail+0x555/0x770 [ 169.474430][T11579] __should_failslab+0x11a/0x160 [ 169.479352][T11579] ? skb_clone+0x1cc/0x380 [ 169.483743][T11579] should_failslab+0x9/0x20 [ 169.488220][T11579] kmem_cache_alloc+0x56/0x2e0 [ 169.492968][T11579] skb_clone+0x1cc/0x380 [ 169.497192][T11579] netlink_deliver_tap+0x4bd/0x880 [ 169.502291][T11579] netlink_unicast+0x75d/0x900 [ 169.507029][T11579] netlink_sendmsg+0x993/0xc50 [ 169.511818][T11579] ? netlink_getsockopt+0x9f0/0x9f0 [ 169.517000][T11579] ___sys_sendmsg+0x60d/0x910 [ 169.521658][T11579] ? rcu_lock_release+0xd/0x30 [ 169.526396][T11579] ? rcu_lock_release+0x26/0x30 [ 169.531214][T11579] ? __fget+0x4e6/0x510 [ 169.535341][T11579] ? __fdget+0x17c/0x200 [ 169.539554][T11579] __x64_sys_sendmsg+0x17c/0x200 [ 169.544473][T11579] do_syscall_64+0xfe/0x140 [ 169.548955][T11579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.554820][T11579] RIP: 0033:0x459829 [ 169.558692][T11579] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.578311][T11579] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 169.586690][T11579] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 169.594643][T11579] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 169.602587][T11579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 169.610532][T11579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 169.618479][T11579] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 02:04:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x0, 0x0) [ 169.643810][T11576] vivid-006: kernel_thread() failed 02:04:41 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5460, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:41 executing program 0 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:41 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8941, &(0x7f0000000180)={r0, r1}) [ 169.671955][T11577] hfs: unable to parse mount options 02:04:42 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) write$input_event(r0, &(0x7f0000000040)={{}, 0x4, 0x4, 0x1f}, 0x18) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, 0x0, 0xfffffffffffffefa) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x551101, 0x0) 02:04:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 169.809438][T11592] vivid-006: kernel_thread() failed 02:04:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x0, 0x0) 02:04:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x6364, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:42 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x894c, &(0x7f0000000180)={r0, r1}) [ 169.845821][T11612] FAULT_INJECTION: forcing a failure. [ 169.845821][T11612] name failslab, interval 1, probability 0, space 0, times 0 [ 169.927486][T11612] CPU: 0 PID: 11612 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 169.935497][T11612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.945551][T11612] Call Trace: [ 169.948839][T11612] dump_stack+0x1d8/0x2f8 [ 169.953152][T11612] should_fail+0x555/0x770 [ 169.957551][T11612] __should_failslab+0x11a/0x160 [ 169.962473][T11612] should_failslab+0x9/0x20 [ 169.966954][T11612] kmem_cache_alloc_node+0x65/0x280 [ 169.972127][T11612] ? __alloc_skb+0x9f/0x500 [ 169.976606][T11612] __alloc_skb+0x9f/0x500 [ 169.981003][T11612] netlink_dump+0x249/0x11d0 [ 169.985572][T11612] ? __kasan_check_write+0x14/0x20 [ 169.990660][T11612] __netlink_dump_start+0x4f5/0x650 [ 169.995845][T11612] rtnetlink_rcv_msg+0xacb/0xd40 [ 170.000761][T11612] ? rcu_lock_release+0xd/0x30 [ 170.005497][T11612] ? rtnl_dellink+0xa50/0xa50 [ 170.010146][T11612] ? rtnl_dellink+0xa50/0xa50 [ 170.014793][T11612] ? interval_tree_remove+0x5b0/0xa10 [ 170.020132][T11612] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 170.025746][T11612] ? local_bh_enable+0x9/0x30 [ 170.030402][T11612] ? trace_hardirqs_on+0x74/0x80 [ 170.035330][T11612] ? __local_bh_enable_ip+0x13a/0x240 [ 170.040672][T11612] ? local_bh_enable+0x1f/0x30 [ 170.045404][T11612] ? rcu_lock_release+0x9/0x30 [ 170.050143][T11612] ? trace_lock_release+0x135/0x1a0 [ 170.055310][T11612] ? rcu_lock_release+0x9/0x30 [ 170.060052][T11612] netlink_rcv_skb+0x19e/0x3d0 [ 170.064789][T11612] ? rtnetlink_bind+0x80/0x80 [ 170.069439][T11612] rtnetlink_rcv+0x1c/0x20 [ 170.073832][T11612] netlink_unicast+0x787/0x900 [ 170.078572][T11612] netlink_sendmsg+0x993/0xc50 [ 170.083308][T11612] ? netlink_getsockopt+0x9f0/0x9f0 [ 170.088479][T11612] ___sys_sendmsg+0x60d/0x910 [ 170.093129][T11612] ? rcu_lock_release+0xd/0x30 [ 170.097869][T11612] ? rcu_lock_release+0x26/0x30 [ 170.102689][T11612] ? __fget+0x4e6/0x510 [ 170.106817][T11612] ? __fdget+0x17c/0x200 [ 170.111032][T11612] __x64_sys_sendmsg+0x17c/0x200 [ 170.115943][T11612] do_syscall_64+0xfe/0x140 [ 170.120420][T11612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.126280][T11612] RIP: 0033:0x459829 [ 170.130148][T11612] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.149719][T11612] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 170.158105][T11612] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 170.166049][T11612] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 02:04:42 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x2, 0x6) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41, 0x2}}}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d8aff076103849b7828d291b15be8239a7a37fab8b3a6567c47fb6a0ce1629cd248991aba0b659d668c4dd10205bc721ebe6bf096feaaa76016869e75fc11cbff2fa8432caec32daaf7264881b1ef7c989d944fb8c7a57e1de7f04cac0f1a8dc0c9b19ce8f41e11994851d5ca04091ae333b4aa0f65bed9f4cdf0169938102f9da574a785412793e05048f34eb02553fa59fe4a71dd6999d4a629d82682bf4aa399fdc76eec22ce64777dc30fe42a8def48001a220d775a7e1ac65decc85e22b174ac1f7a9e0e5504a09583c84fafe7ecb", 0xd1}], 0x1, &(0x7f0000000200)="4bd900019e2e6979b8ab6283f19ba480a2a0f1b8f2e5bf207c7f3f6e9c256c7ba1f968915c0997c8871063fb0c1e272b79953eaab5f9cc5750f9f23374d52ba2c1f60f9085c49de3d86e363141384eb53c9295b8c65eff30fcd517def4251f623e3323747d5ef10931335f4d688dde19db1e9c25fec4255eb8fe9772952c48b1fc16ac6536b96cdf9b78f2ecb58cf1a549e1ef65f3faf1c9117dc46ca9dc71196b976639c7ce57259038d720bc9d483d64a7fb9f8877eb738e1b9b66e2c4253524b9104d9a44efe17661c377705ed1858f15f2ca3563aa07d52b1f30d83349940c32e7afa1", 0xe5, 0x20000000}, 0x4080) unshare(0x22000400) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) accept4$tipc(r1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 02:04:42 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8980, &(0x7f0000000180)={r0, r1}) [ 170.173991][T11612] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 170.181944][T11612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 170.189885][T11612] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 02:04:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x7004, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:42 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0x25c) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000280)=""/4096, &(0x7f0000000200)=0x1000) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2011, 0x0) socketpair$unix(0x1, 0x16c1d3bb8ffc523d, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000140)={{0x1ff, 0x2, 0x5, 0x7, 0x800, 0x3}, 0x4, 0x2, 0x1ff, 0x0, 0xcf2d, "22600dd940eb9dbb6beb4cdc71f471cf00239cb0b237ba49a7c38b7625c76dccfda38a28015debc0f64e0415bdb397d1ffba90ec663f9e9a5dbe57690cc3e40725b8eba88cbc50c08750ab4dd0e6cb7ba31530df54e7c33cfaff5750b4f57f9c41c39145b5fba53a8b0ea7a2d13275f8558f7895f80d99d3b39a405cfeea93d6"}) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x0) 02:04:42 executing program 0 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:42 executing program 4 (fault-call:8 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() r3 = getuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() r6 = getegid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010003000000000002000200", @ANYRES32=r2, @ANYBLOB="02009e8c", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="040004000000000008000100", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB='\x00'/16], 0x6c, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r11 = semget$private(0x0, 0x0, 0x40) semctl$IPC_SET(r11, 0x0, 0x1, &(0x7f0000000500)={{0x3, r3, r9, r4, r9, 0xa4, 0x2}, 0x8, 0x6, 0x101}) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r12, 0x0, 0x0) 02:04:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x8904, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:42 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8981, &(0x7f0000000180)={r0, r1}) [ 170.377911][T11657] FAULT_INJECTION: forcing a failure. [ 170.377911][T11657] name failslab, interval 1, probability 0, space 0, times 0 [ 170.434606][T11657] CPU: 1 PID: 11657 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 170.442617][T11657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.452673][T11657] Call Trace: [ 170.455973][T11657] dump_stack+0x1d8/0x2f8 [ 170.460307][T11657] should_fail+0x555/0x770 [ 170.464703][T11657] __should_failslab+0x11a/0x160 [ 170.469626][T11657] should_failslab+0x9/0x20 [ 170.474109][T11657] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 170.479805][T11657] ? __kmalloc_node_track_caller+0x3c/0x60 [ 170.485585][T11657] __kmalloc_node_track_caller+0x3c/0x60 [ 170.491190][T11657] ? netlink_dump+0x249/0x11d0 [ 170.495932][T11657] __alloc_skb+0xe8/0x500 [ 170.500240][T11657] netlink_dump+0x249/0x11d0 [ 170.504804][T11657] ? __kasan_check_write+0x14/0x20 [ 170.509889][T11657] __netlink_dump_start+0x4f5/0x650 [ 170.515061][T11657] rtnetlink_rcv_msg+0xacb/0xd40 [ 170.519991][T11657] ? rcu_lock_release+0xd/0x30 [ 170.524725][T11657] ? rtnl_dellink+0xa50/0xa50 [ 170.529374][T11657] ? rtnl_dellink+0xa50/0xa50 [ 170.534024][T11657] ? interval_tree_remove+0x5b0/0xa10 [ 170.539367][T11657] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 170.544972][T11657] ? local_bh_enable+0x9/0x30 [ 170.549620][T11657] ? trace_hardirqs_on+0x74/0x80 [ 170.554527][T11657] ? __local_bh_enable_ip+0x13a/0x240 [ 170.559870][T11657] ? local_bh_enable+0x1f/0x30 [ 170.564606][T11657] ? rcu_lock_release+0x9/0x30 [ 170.569342][T11657] ? trace_lock_release+0x135/0x1a0 [ 170.574512][T11657] ? rcu_lock_release+0x9/0x30 [ 170.579252][T11657] netlink_rcv_skb+0x19e/0x3d0 [ 170.584075][T11657] ? rtnetlink_bind+0x80/0x80 [ 170.588727][T11657] rtnetlink_rcv+0x1c/0x20 [ 170.593115][T11657] netlink_unicast+0x787/0x900 [ 170.597855][T11657] netlink_sendmsg+0x993/0xc50 [ 170.602591][T11657] ? netlink_getsockopt+0x9f0/0x9f0 [ 170.607764][T11657] ___sys_sendmsg+0x60d/0x910 [ 170.612418][T11657] ? rcu_lock_release+0xd/0x30 [ 170.617155][T11657] ? rcu_lock_release+0x26/0x30 [ 170.621979][T11657] ? __fget+0x4e6/0x510 [ 170.626108][T11657] ? __fdget+0x17c/0x200 [ 170.630322][T11657] __x64_sys_sendmsg+0x17c/0x200 [ 170.635236][T11657] do_syscall_64+0xfe/0x140 [ 170.639713][T11657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.645579][T11657] RIP: 0033:0x459829 [ 170.649454][T11657] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.669028][T11657] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 170.677408][T11657] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 170.685354][T11657] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 170.693299][T11657] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 170.705411][T11657] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 170.713360][T11657] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 [ 170.729895][T11683] FAULT_INJECTION: forcing a failure. 02:04:43 executing program 1: r0 = socket$kcm(0x10, 0x26, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e000000160081aee4050cecce4cb90402485e510befccdf7f3e9cf0758ef900e1cf38ebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000004ec0)={0x0, 0x18b, 0x0}, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x2}, 0x28, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000001c0)=0x1c, 0x4) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000200)="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") 02:04:43 executing program 0 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 170.729895][T11683] name failslab, interval 1, probability 0, space 0, times 0 02:04:43 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x8912, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:43 executing program 1: r0 = socket$inet6(0xa, 0x806, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x6, @remote}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="62cf8fb7f513b58222cb4a6286d5d627d0b5319f775a8976bfa3615bb2d4146bf5db09c4c97dcf53b4ad3c810a5fbc5d3ee48c4afc214530ed5ba74e9d61c16dd5aac54d8cf074ed7e186fc6972896223a", 0x51}], 0x1, &(0x7f0000000140)=[@assoc={0x18, 0x117, 0x4, 0x80}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x2}], 0x48, 0x4000040}, 0xd33e923d6c7ffe01) [ 170.820952][T11683] CPU: 1 PID: 11683 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 170.829427][T11683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.839475][T11683] Call Trace: [ 170.842764][T11683] dump_stack+0x1d8/0x2f8 [ 170.847095][T11683] should_fail+0x555/0x770 [ 170.851509][T11683] __should_failslab+0x11a/0x160 [ 170.856452][T11683] ? ksys_mount+0x6a/0x100 [ 170.860866][T11683] should_failslab+0x9/0x20 [ 170.865363][T11683] __kmalloc_track_caller+0x79/0x340 [ 170.870642][T11683] strndup_user+0x76/0x130 [ 170.875050][T11683] ksys_mount+0x6a/0x100 [ 170.875060][T11683] __x64_sys_mount+0xbf/0xd0 [ 170.875074][T11683] do_syscall_64+0xfe/0x140 [ 170.888362][T11683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.892553][T11702] FAULT_INJECTION: forcing a failure. [ 170.892553][T11702] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.894242][T11683] RIP: 0033:0x459829 [ 170.911276][T11683] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.930857][T11683] RSP: 002b:00007ffafaf04c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 170.939247][T11683] RAX: ffffffffffffffda RBX: 00007ffafaf04c90 RCX: 0000000000459829 [ 170.947195][T11683] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 170.955147][T11683] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 170.963100][T11683] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf056d4 [ 170.971046][T11683] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 170.979010][T11702] CPU: 0 PID: 11702 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 170.986977][T11702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.997026][T11702] Call Trace: [ 171.000308][T11702] dump_stack+0x1d8/0x2f8 [ 171.000321][T11702] should_fail+0x555/0x770 [ 171.000334][T11702] should_fail_alloc_page+0x55/0x60 [ 171.014221][T11702] prepare_alloc_pages+0x283/0x470 [ 171.019330][T11702] __alloc_pages_nodemask+0xb2/0x5d0 [ 171.024620][T11702] kmem_getpages+0x56/0xa20 [ 171.029118][T11702] ? trace_lock_release+0x135/0x1a0 [ 171.034308][T11702] cache_grow_begin+0x7e/0x2c0 [ 171.039080][T11702] cache_alloc_refill+0x311/0x3f0 [ 171.044097][T11702] ? check_preemption_disabled+0xb7/0x2a0 [ 171.049801][T11702] kmem_cache_alloc_node_trace+0x2a3/0x2d0 [ 171.049809][T11702] ? __kmalloc_node_track_caller+0x3c/0x60 [ 171.049819][T11702] __kmalloc_node_track_caller+0x3c/0x60 [ 171.049831][T11702] ? netlink_dump+0x249/0x11d0 [ 171.067009][T11702] __alloc_skb+0xe8/0x500 [ 171.067024][T11702] netlink_dump+0x249/0x11d0 [ 171.080690][T11702] ? __kasan_check_write+0x14/0x20 [ 171.085811][T11702] __netlink_dump_start+0x4f5/0x650 [ 171.091020][T11702] rtnetlink_rcv_msg+0xacb/0xd40 [ 171.095964][T11702] ? rcu_lock_release+0xd/0x30 [ 171.100720][T11702] ? rtnl_dellink+0xa50/0xa50 [ 171.105386][T11702] ? rtnl_dellink+0xa50/0xa50 [ 171.110055][T11702] ? interval_tree_remove+0x5b0/0xa10 [ 171.115415][T11702] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 171.121029][T11702] ? local_bh_enable+0x9/0x30 [ 171.121035][T11702] ? trace_hardirqs_on+0x74/0x80 [ 171.121044][T11702] ? __local_bh_enable_ip+0x13a/0x240 [ 171.121052][T11702] ? local_bh_enable+0x1f/0x30 [ 171.121061][T11702] ? rcu_lock_release+0x9/0x30 [ 171.121075][T11702] ? trace_lock_release+0x135/0x1a0 [ 171.150720][T11702] ? rcu_lock_release+0x9/0x30 [ 171.155498][T11702] netlink_rcv_skb+0x19e/0x3d0 [ 171.160244][T11702] ? rtnetlink_bind+0x80/0x80 [ 171.164901][T11702] rtnetlink_rcv+0x1c/0x20 [ 171.169296][T11702] netlink_unicast+0x787/0x900 [ 171.174035][T11702] netlink_sendmsg+0x993/0xc50 [ 171.178776][T11702] ? netlink_getsockopt+0x9f0/0x9f0 [ 171.183947][T11702] ___sys_sendmsg+0x60d/0x910 [ 171.188598][T11702] ? rcu_lock_release+0xd/0x30 [ 171.193340][T11702] ? rcu_lock_release+0x26/0x30 [ 171.198160][T11702] ? __fget+0x4e6/0x510 [ 171.202289][T11702] ? __fdget+0x17c/0x200 [ 171.206502][T11702] __x64_sys_sendmsg+0x17c/0x200 [ 171.211416][T11702] do_syscall_64+0xfe/0x140 [ 171.215895][T11702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.221756][T11702] RIP: 0033:0x459829 [ 171.225624][T11702] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.245207][T11702] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 171.253592][T11702] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 171.261535][T11702] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 02:04:43 executing program 4 (fault-call:8 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000006400), 0x400000000000159, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x90) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) write$UHID_INPUT2(r1, &(0x7f0000000100)={0xc, 0x52, "692a2f93f69e624d4af7424e3da7757d7faf9a20fd3f615dd00a18359266896434c7db0cd81128795958b3c33d571f5b24cfa2e40f4b878b2a6baabc3d449491065cb606c9190d39c53703d8c886939cd62b"}, 0x58) 02:04:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, r0, &(0x7f0000000080), 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_adjtime(0x0, &(0x7f0000000140)={0x8001}) 02:04:43 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8982, &(0x7f0000000180)={r0, r1}) [ 171.269480][T11702] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 171.277425][T11702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 171.285371][T11702] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 02:04:43 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8983, &(0x7f0000000180)={r0, r1}) 02:04:43 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x8933, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:43 executing program 0 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:43 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xfffffffffffffffe, 0x0, 0x40, 0x7fff}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e22, 0x3, @mcast1, 0x3}}}, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000240)={0x1, 0x0, {0x1f, 0x0, 0x2020, 0x2, 0x3, 0x4, 0x3, 0x3}}) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r1, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r1, 0x2}, &(0x7f0000000340)=0x8) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000380)=""/5, &(0x7f00000003c0)=0x5) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000400)=@dstopts={0xc, 0x202, [], [@hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x10000}, @generic={0x1f, 0x1000, "4a3ae3ed2c9aa6fb0e6b85ca849fb6300e33d6856f9df256c16bbe7f6a710855fb012f09d2ed8ecd83809903e5a84f8141f63be1f3d074d913c33de114223f09b08ef07ee5c256ca82aede4240bdeda6b99144e5fbc0bb1cc6b5f72140b061031656aa74952e04551935fd1883276532d18136f5027393078ac0b5278dee70e0755694819ec97e05addddc8b405f631103d16421c01024cb01f4e52867944b1949c7493d1efc93bbeff2c9e8f8d1e6e4fe01e45dbe6883949356d8bcbd2e8c2606d064d77fd869dc1c774b1a3a8b0f38812b5a31ab90a0914c69b08832cd3bdf048e8ca86bbe260bf424d44704f21309527537fb5a53130ddaa2b6cfe970d85308d0322263101c00db03404f7d3a0c032b23f1aa2103e5e0463c9d7fb7d609e15fa12a75e8bce7ea990fa866f4e8f1b7ef1bff6f6a30be98e6b912ff8c49dd175d4ece4d0a6c29cc8cd600950070470eab959d3b0570edc1743feb23d6d1c4495cc05b5ef23586f3209f7d7eb4dd868d189942e50a73630a57cc155256c9028763044bdf24d3bda18e68b9ec2d939907f90fc7794db9314059672b66d99fa453c27e04f5c4a6e6886152a5de9457f51ea1f21215bb9e3ea1e7514450d5d119f15b4fa2fc3ef1dfd853dfda026320d48f06da32ac4b25c9e97ac22b60822b49b1af46441cb916cf28a1c90bf7465ca215aa2a3dc2a4ff16f79a677c97daf1ccdc4e02a261e2c61c1bc232d45e3e17dd5336c94049fd6eef67750499e380ef6421f3fa091b38d04e6e352d3ed664c43cb7ec2192815c6886f80229d5ae8efc9fe286caf4411ad28b7a536d1097453cab45b81eb918fb7ffcba779dee903923c992488e82cad6ac6bfc2cfa096fc28d02d27c3345cafbe58b475ede1ee8efbd33828f48a315d29841e78bf0cffbfaa64b447d9fe63eaf99acd064cb4acd0f6d9c4995ea8dad3ca383b4ee37a96b24c6455de5076300b57fc3ad3d5973e68ef55b0b754c67a744bff357d6e46ac8773a03ea739245a46fd1f86998090768f0d40149e59b5bd076c92a76c6574e6bc0e53c4d821368042ddee1d01d87f1728b9175ecddf3685bbe38bb06ea644f7569c0d6cade325f60ca655ab0729bee918dca3ee4249ba1bf21664b0bdec11fd36f9027e64c4e2cb5abd9629ad7e5b571a39fa3414579cafe3f83737a1cd770d9a0a106f258bdc54f942ddf661c0a3cfa081e90b315ea401c291880d7beb8ed6bcb4526f4b53939a3cdbb8cb238ca7ac146cb6e6174a7a82d86e3cf2557064412d0e075239d8eb70e45913128a09df05c44d7bda8924cecf0aad96638a664604b3e567b48de3325931d2965f8f3da5a803de80fa11e406656353b72e34dbbd728c4158273a5b731711ba8c94b23ec37c0917ac267efbe726a782c7386d251f634fb8adbfb59ad14a889a70983ddf2be270a6439ffcc87082caa14664323c36685ca80b017dff00923fafdd9a3572eb5254682b2311a802f9d52a93dae8f4d9d52b2625944be5748ece5ea50c5ce0a22a1feb941d62d916be5cc7a010464e3dcfbcd46b54d6c823b6ffe567a0ee1986e4acb6d7e54f4fa1fa715b049a298f1697a12e572c67d56333d8b197ff6dc579b6d5a30671aefbf5471741c2ac1e076a0df8583835b83062804960ddbd24e2cb4d30f70c3fbed92cfd2e0d10b8595b1353699ef1d76c74c65e86fa694ded695f5996e07e8c3d760fdfc3f892592f3fd491d0d3fbb8cd4640b613bc182d0c26ca3c7e6f79712bc48cd030a5d8f543cf3e73167dcbf4006d5fc220324fdd7521c1f05a298d371e5e75a504b0d5bf8ba865ee2ed50c21e062f88beab6ec2a49c97aaf47b258b256446984de2ed55b088c2f72c5f4a6c26c460259e6f4a13d6b896b58e26b3ac3ee01928beb60f60171d1d76e2873b06c4e9959598c3ae4a1e8c5555688d43329341d4defaa7b95c6473310ed70ba1375c87535bea0d7060bc3d8782f64450c997621e1654a4d6245eb7fc2b0bfd8116b4691c75004bd7b701a795e7447e29c4c8d44e0568880987f8aabe06557515621bb9b3e26300c038288fd2ac3d5429a3326007688f00f07d5296c300c1df95fc9efd1004cbb8cb3b5e5d6dbe90e97ca12f337d9191450be6d9d7077f74a85b1a35a0735613953c8530f22c502c092485518cf2c5a6fb6a5da43cb2685e5c1de1b2a40a7a777ab1064fd215079bcbfdf1e15f6c86bdf91d510f5f74bf6e0afe9930dd95b7b4f6ac39789dbf8288a722b25ce536ca9dcbe2d1e528aecbb11802ae05ecf5c1b266bf923e09db448147c03ad24bf2c140ad2af16ee2f2db20e83d5a11844af7d8f8815cb4932856545abed352ddb6f0ad934b1ef009dbd934599e9587eeaa0bfb3ff49cf368da9d2ac43f574345d402417a4cdc1be48491b58a3477304b10bd03bf021869901909d2c2f3695616d85bf7144a63d019f84dbe23c6f021899445f4a880e65aaa32305af246afec5d528279e7e28d1bd4fd4c43136cd825365c82279f21de34068cda8ee56b5608c76f4637e5a0c11be22863e91c269b4c9df2da354c90483339314cd66545e0b813a107ba00a043f94c1c3314db8689c6456acec27f7cee137c033ca666a1105579aa99c2118601766c85f0ea646662b831e158cec2c8ba240248b36d49eb7394ed46450dc0c2b84dc467bd32d10adf4002d3b06cae6fce8e058ce756457462be571c98dac64d31e4768a54b69fc7e497b2035460f8a721d686be69ffe805dd75a01668c10aa00bb910dfbd2565ca0341d9db6cc6efc56b68713aec1ef8bcc8b805290b65bc1c668b9a9ef01473fa50f1aa71c269687406a0579bef910eed5d523f9fe9e9cbccde9d56d53d2edc08fb1808d352cd519fe335b1bc42cb6dd835ad733bc40a31261988f30de24fa4478710bca9d346f71dc950ed8e66b713bf59fb530681db25cae3dff63af32b6b61e3dec9176cbf863cfea0670bac1c917db6bc43d7fc14cd6556c61bfb77e40180d7b0c9cfbe2efe96b6f3a3bcb1fa0feab8efabf68854381f6df6d66aa60f8a2a9e179e68bec0bec6118b63cc02892fc2eb3ead8891aa8a007f2d03c4faf155dfa440540fd18e87ffc6cfa3f912fcd85123c9ce7ca12042ca8c4a84526f8102970bc96a62c9cf819cde1495556005e69f9d4f349a1b1af0e1334d5b4c5bd55c53ce4c03fc0203e619d0fab3f0f34bd2464c2ea79b1f56b486640f7b30d0482fa4754cfc4b9a28de67c04778f400016e344c40ec0a14cd1a2dbac8b94271cc00e40981be313e840c4a90aaa1fcdfa4430e9e9de817a1e7905aede2483a4c8a7e03e0e29099fb295b0b258d112795e5721b4d41304b9154a11358d39eb34fbf8969a2ec19c5ff9b35ac9a5c53f58a5c5058899e200f06a3cfbfb1981c06a6cd20aa3656e1862cd5e58053a72823410b556be3b1b8a622be6002bf5ea797e0de10b88830a97c4b10277914fb313f6b609365341deaedd1e2148875325494e477633a0a54ab274a63e9fdee8f9238bfb96d752bf90fb06f899139eaa37c5288310fc5e0a023e507ca89be7038d942a3a149bf1225689bd7c85018fd478408a69212b7defe32fcfb17fdd65debcee530b84e0d1a1663650ca4c9ea21d126351965cc7175251b59d0049285962c03a6616a89c89c0eabc997fba073d62a499211529f93ff480faa80095c96fb457e38cc5b77dc5620817982c6f63aa97b634f5671ee6d3356148218e2f485480990e07fbc98bf161627ded031c24f358e6a35442ea4d7684548f356fec098109f2682bdb98d7aa68a5d6261529fc86049e11b4ead6d3849acc92565a8fb5fa3266954b4725bc675cc07a59019767d3f2ff7a8246ce16a16feeda81cd079cb7c19ee058ef3611c29b64b347c838356f4c5fa38484ae40b8dca61ce712e4fa3c54e6f7fdcb7f3fa048e29b58f91cb08ec73fdd434f880eeff66343a295ec816e8a14197057ee33581ad7bd31c3de28920e13d3d66324f5ad685782c358d41a8ffb626873aff056ac1aac03773c1e6c6d3f1785e7bbebd57149f0badcd7e14716d8a1b3cdde399ecc2a6e32e013590c0a677764e80fcffec28536b1ba2612db68122706351c4a53aae2060294f3210af4d024c02ad7fa0a140d5486662dc7b52f9d78a49da883c4274515ceadbe659ae7a59d9730c3cbc6e5d3623588cbd5ec55671717601c1c9ba7a79f75a7a06bc533341dab8143ddcfeb28e910640c6c511da9225810574c56a09370ef44ceb8f2b63981f95d3af9d98720a3c78096104d6fd1ce83b449db6c7bc4570838dd2300f016ce5505dec707c2bad0a74c6b60bdf041db36835c75db50bea54061c3ee73e493c35250f69b9ee8a2dd5c637053bd019b21afdf6d3a87b53e636e8b5c6c72b4b7b09afb84ac5e60be58fc701fd7f56ffad341cffc57dcf7d7d3be2751e9712b8f293c1cff09b78eaf4a3de46fe0cedac745ca707cf091a038bb978bf6c4b4f87a85789c91e361b60c97a312ee2b8a7db51a9ae6c36473dafeb9edf620250527c43699b9c791b3b8b83fbddf4377d55f4f891a6cf8418138fdeb0a61e82f70740bac1c7e8ef2ffd118ffc103d6f8c055dc3225974acfdf315da6c62370215fa9f44c86ab0aa4c2daf512b64f30c83a0ca8a1bdc4e612a4323d06d9ecaa92a6420df3836e9b1d5ff73856bd52c8831d3356bc199c3b9b3e64832529b8d3c334a0ffcc6d7d5163174b4f89270d6950963573842c4187185e2a4d6615149bb5c2f9513eb6247dadf3545b4b4a717046a8c79bbfae667ac44c975349a1e59cc066cc9fd81691480b37d35b1b764413d357fb3fa899940b3251d2566c7bf1c28882ccfeab1c3da5729df9f7bb7ee0501144a06ae2f9289cf88f8c52101eef214a98c9854b0256c298e5cdcba996c5d7773bedd9880477f3665dde26fb2fc1385f823cc6a4712a2cf714066fbfa52074c397929b11e128b8e2add1d72b84b434d1eda08a9c6cfd9154d3dc85e41ce3fb3540fd12a8ea2f2ecedc07f0c3c064b4cbbfef9a4fe28180bcf877a4628f95c286e80d591563af8b26c50796be0e6dce9db65151024d5d79fb86575da399261534d0ddd347dcc4b9a803aabc2eddf5b65c06dfc76cd1573b609f8ede14e6ab34d915a4b7d4f2ffffda29c7bb538417947136bf95f0c57d2d72870767fa960d564ac0b8a7c66b6307236bf6789b7d3a3287c7ebbe9209802f9a1b04afa2cffc557f9a1dfe9e7a89782d27cc5d5646db5cd2c5fc50f5de8dc4eb594dd54e802eb726aa839cd70b0eaeaf80bd9189c0e8af4892cb070594f381bae50d1854ef8fb1f72a49829124ee1abe974cc1f73babe529bc121813be731c2a98ba797a3e62efbf4f92bb15732062152fc29673da3d18f06d1533bc62a1c0d2879447aea313dc8a2aff68a4acdac311e5f652aec477c5330ae3a97593e2927af7ddf757b1d5568ef3828376a9981d492ce40e23c7195774eed52a69e2e7697c8308cd626e0ecdf068bf817531b779dfa2cc85b7f1813ddb1b23984b438e0d4fd1522e78b64c9ab1b49d7baf8cf1186be71a3c91b369d09afbb0751543bcd61e6eab8fafa8d69ac8cd3b6fead390987dc4686ab4b75ba21878eb4cb4b2e8376b817307a7c7b721f59a61bbff5c49421182ac8787342cff1df34a5bb3684309e672ebc907dde4cbf743c263a099a035d38d3b699456b21834c428e4aececa60a8b88f0840e79bbd29da26f5113c4b6baba6faca88695fbd7888d4ddbd6c45b947d2fb6c2d39b1a444ee369d383466081eb0be8f6"}]}, 0x1020) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000001440)={0x31, 0x3, 0x0, {0x3, 0x10, 0x0, '/dev/input/mice\x00'}}, 0x31) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001480)={0xaea3, 0x1ff, 0x200, 0xff, 0x0, 0x5, 0xfffffffffffffff9, 0x2, r1}, &(0x7f00000014c0)=0x20) fstat(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000001600)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) r4 = getuid() mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', &(0x7f0000001540)='fuse\x00', 0x1000000, &(0x7f0000001640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@obj_type={'obj_type'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@obj_type={'obj_type', 0x3d, 'vboxnet1*'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/input/mice\x00'}}, {@uid_eq={'uid', 0x3d, r4}}]}}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000001780)={0xd66, 0x0, 0x81, 0x8, [], [], [], 0x0, 0xa6c5, 0x7, 0x7, "46e83262b1cd39f0136c4e97c395ab71"}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000018c0)=""/159, &(0x7f0000001980)=0x9f) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000019c0)=""/4096, &(0x7f00000029c0)=0x1000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000002a00)=0x6, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000002a40)=0x3, 0x8) ioctl$KDSETMODE(r0, 0x4b3a, 0x6) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000002a80)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000002ac0)=r5) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002b80)=@nat={'nat\x00', 0x1b, 0x5, 0x4e8, 0x330, 0x450, 0x200, 0x200, 0x200, 0x450, 0x450, 0x450, 0x450, 0x450, 0x5, &(0x7f0000002b00), {[{{@ip={@multicast2, @loopback, 0x0, 0xff, 'bpq0\x00', 'ip6erspan0\x00', {0xff}, {0xff}, 0x84, 0x1, 0x1}, 0x0, 0x98, 0xd8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x1, 0x1}}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0xa0, 0x2, 0x1}}, @common=@inet=@dscp={0x28, 'dscp\x00', 0x0, {0x7}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0xf, @broadcast, @rand_addr=0x9, @gre_key=0x10001, @gre_key=0xb2f}}}}, {{@uncond, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x4, 0x8, 0x1, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x4, @ipv4=@broadcast, @ipv4=@local, @icmp_id=0x64, @gre_key=0x80000001}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@inet=@l2tp={0x30, 'l2tp\x00', 0x0, {0x1, 0x0, 0x2, 0x0, 0x3}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x8, @broadcast, @multicast2, @gre_key, @icmp_id=0x68}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) accept(r0, &(0x7f00000031c0)=@can={0x1d, 0x0}, &(0x7f0000003240)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003280)={r6, @broadcast, @local}, 0xc) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f00000032c0)) write$uinput_user_dev(r0, &(0x7f0000003300)={'syz0\x00', {0x1, 0x1, 0x3, 0x5}, 0x35, [0xd, 0x7, 0x8, 0xfffffffffffffffd, 0x88, 0x3, 0x2, 0x1, 0x482f, 0x7, 0xfffffffffffffff9, 0x8, 0x5, 0x0, 0x0, 0x8, 0x9, 0xf58, 0xa80, 0x0, 0xea89, 0x1, 0xc, 0x1, 0x1, 0x2, 0x5, 0xff, 0x5, 0xb67, 0x9, 0xf9c0000000000000, 0x1, 0x2, 0xffffffff, 0x9, 0x40, 0x46b1d1be, 0x9, 0x9, 0x0, 0x0, 0x2, 0x2, 0xfff, 0x7, 0x4f710d8b, 0x8, 0x8, 0x5, 0x6, 0x7fffffff, 0x5, 0x9, 0xffffffff, 0xbe, 0x800, 0x1, 0x1, 0x6, 0x3958, 0xfffffffffffffffb, 0x7, 0x3ff], [0x81, 0xffff, 0x5, 0x2, 0xfffffffffffffffc, 0x100000000, 0x81, 0x8be5, 0x3, 0x9, 0x2, 0x4, 0x9f8, 0x81, 0x6, 0x7fff, 0x8000, 0x0, 0x4, 0x200, 0x1, 0x1, 0x8, 0x9, 0x494, 0x7, 0x4, 0x9, 0x36ea, 0x8, 0x2, 0x2, 0x6, 0x6, 0xff, 0x6, 0x3f, 0xe9, 0xfff, 0xd0, 0x1, 0x8001, 0x7, 0x4b1a, 0x7, 0x7, 0x2, 0xfff, 0x0, 0x2e91, 0x6, 0x5, 0xf9, 0x0, 0x4, 0x2, 0x4, 0x2, 0x24, 0x3, 0x20, 0x2, 0xde, 0xffffffff], [0x34, 0xfffffffffffffc01, 0x6, 0x4, 0x1ff, 0xffffffff, 0xb2e5, 0x54, 0x5, 0x0, 0x6f, 0x3f, 0x81, 0x0, 0x1, 0x1, 0x8, 0x20, 0x10001, 0x4, 0x6, 0xffffffffffffff01, 0x0, 0x0, 0x2, 0x2, 0x81, 0x5, 0x26524d87, 0x101, 0x2, 0x1f, 0x100000001, 0x3, 0x6, 0x18000000, 0x4, 0x6, 0x7, 0x1, 0x9, 0x9, 0x80, 0x1f, 0x728, 0x1, 0xa55b, 0x287, 0x9, 0x0, 0x1, 0x8, 0x2, 0x7, 0xf2f, 0x6f655fb7, 0xffffffffffffffff, 0x9, 0xe719, 0x0, 0x2b4c, 0x2, 0x0, 0x3], [0x0, 0x7, 0x1, 0x5, 0x6, 0x1, 0x7, 0x6, 0x8, 0x37, 0x7, 0x471, 0x2, 0x3f, 0x401, 0x8, 0xfff, 0x6, 0x1, 0x0, 0x8001, 0x1, 0x1, 0x3, 0x247, 0x1, 0x4, 0x3, 0x3, 0x1, 0x6459, 0x3f, 0x2, 0x1000, 0x3ff, 0x80000001, 0x100000000, 0x5, 0x5, 0xe9b, 0x5, 0x4, 0x81, 0x8, 0x3, 0x32, 0x3, 0x3f, 0x0, 0x80, 0x1, 0xbbac, 0x5, 0x4, 0x10001, 0x80000001, 0x200, 0x3, 0x5, 0x8, 0x1f, 0x773, 0xe45a, 0x3]}, 0x45c) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000037c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000003940)={&(0x7f0000003780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000003900)={&(0x7f0000003800)={0xe4, r7, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa16e}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xcc8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40}, 0x40) 02:04:43 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x89e0, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 171.408863][T11727] FAULT_INJECTION: forcing a failure. [ 171.408863][T11727] name failslab, interval 1, probability 0, space 0, times 0 [ 171.445602][T11740] FAULT_INJECTION: forcing a failure. [ 171.445602][T11740] name failslab, interval 1, probability 0, space 0, times 0 [ 171.464666][T11727] CPU: 1 PID: 11727 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 171.472662][T11727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.482715][T11727] Call Trace: [ 171.486005][T11727] dump_stack+0x1d8/0x2f8 [ 171.490337][T11727] should_fail+0x555/0x770 [ 171.494751][T11727] __should_failslab+0x11a/0x160 [ 171.499682][T11727] ? getname_flags+0xba/0x640 [ 171.504346][T11727] should_failslab+0x9/0x20 [ 171.508830][T11727] kmem_cache_alloc+0x56/0x2e0 [ 171.513576][T11727] getname_flags+0xba/0x640 [ 171.518063][T11727] user_path_at_empty+0x2d/0x50 [ 171.522920][T11727] do_mount+0xd4/0x2490 [ 171.527051][T11727] ? __kasan_check_write+0x14/0x20 [ 171.532132][T11727] ? copy_mount_options+0xdc/0x3c0 [ 171.537217][T11727] ksys_mount+0xcc/0x100 [ 171.541438][T11727] __x64_sys_mount+0xbf/0xd0 [ 171.546003][T11727] do_syscall_64+0xfe/0x140 [ 171.550480][T11727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.556340][T11727] RIP: 0033:0x459829 [ 171.560205][T11727] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.579779][T11727] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 171.588164][T11727] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 171.596109][T11727] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 171.604051][T11727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 171.611994][T11727] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 171.619937][T11727] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 171.633712][T11740] CPU: 0 PID: 11740 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #84 [ 171.641711][T11740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.651751][T11740] Call Trace: [ 171.655017][T11740] dump_stack+0x1d8/0x2f8 [ 171.659321][T11740] should_fail+0x555/0x770 [ 171.665190][T11740] __should_failslab+0x11a/0x160 [ 171.670106][T11740] ? skb_clone+0x1cc/0x380 [ 171.674496][T11740] should_failslab+0x9/0x20 [ 171.678970][T11740] kmem_cache_alloc+0x56/0x2e0 [ 171.683709][T11740] skb_clone+0x1cc/0x380 [ 171.687929][T11740] netlink_deliver_tap+0x4bd/0x880 [ 171.693017][T11740] netlink_dump+0x706/0x11d0 [ 171.697583][T11740] __netlink_dump_start+0x4f5/0x650 [ 171.702758][T11740] rtnetlink_rcv_msg+0xacb/0xd40 [ 171.707665][T11740] ? rcu_lock_release+0xd/0x30 [ 171.712400][T11740] ? rtnl_dellink+0xa50/0xa50 [ 171.717055][T11740] ? rtnl_dellink+0xa50/0xa50 [ 171.721714][T11740] ? interval_tree_remove+0x5b0/0xa10 [ 171.727058][T11740] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 171.735437][T11740] ? local_bh_enable+0x9/0x30 [ 171.740087][T11740] ? trace_hardirqs_on+0x74/0x80 [ 171.744995][T11740] ? __local_bh_enable_ip+0x13a/0x240 [ 171.750339][T11740] ? local_bh_enable+0x1f/0x30 [ 171.755084][T11740] ? rcu_lock_release+0x9/0x30 [ 171.759820][T11740] ? trace_lock_release+0x135/0x1a0 [ 171.765011][T11740] ? rcu_lock_release+0x9/0x30 [ 171.769757][T11740] netlink_rcv_skb+0x19e/0x3d0 [ 171.774494][T11740] ? rtnetlink_bind+0x80/0x80 [ 171.779145][T11740] rtnetlink_rcv+0x1c/0x20 [ 171.783532][T11740] netlink_unicast+0x787/0x900 [ 171.788271][T11740] netlink_sendmsg+0x993/0xc50 [ 171.793026][T11740] ? netlink_getsockopt+0x9f0/0x9f0 [ 171.798196][T11740] ___sys_sendmsg+0x60d/0x910 [ 171.802851][T11740] ? rcu_lock_release+0xd/0x30 [ 171.807594][T11740] ? rcu_lock_release+0x26/0x30 [ 171.812415][T11740] ? __fget+0x4e6/0x510 [ 171.816544][T11740] ? __fdget+0x17c/0x200 [ 171.820755][T11740] __x64_sys_sendmsg+0x17c/0x200 [ 171.825668][T11740] do_syscall_64+0xfe/0x140 [ 171.830144][T11740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.836007][T11740] RIP: 0033:0x459829 [ 171.839880][T11740] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:04:44 executing program 4 (fault-call:8 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 171.859454][T11740] RSP: 002b:00007fef2e4abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 171.867849][T11740] RAX: ffffffffffffffda RBX: 00007fef2e4abc90 RCX: 0000000000459829 [ 171.875793][T11740] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 171.883736][T11740] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 171.891687][T11740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef2e4ac6d4 [ 171.899637][T11740] R13: 00000000004c7082 R14: 00000000004dc708 R15: 0000000000000006 02:04:44 executing program 0 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:44 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89a0, &(0x7f0000000180)={r0, r1}) 02:04:44 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x89e2, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 172.087713][T11767] FAULT_INJECTION: forcing a failure. [ 172.087713][T11767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.100936][T11767] CPU: 0 PID: 11767 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 172.108891][T11767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.118920][T11767] Call Trace: [ 172.122190][T11767] dump_stack+0x1d8/0x2f8 [ 172.126494][T11767] should_fail+0x555/0x770 [ 172.130889][T11767] should_fail_alloc_page+0x55/0x60 [ 172.136058][T11767] prepare_alloc_pages+0x283/0x470 [ 172.141146][T11767] __alloc_pages_nodemask+0xb2/0x5d0 [ 172.146415][T11767] ? __kasan_kmalloc+0x178/0x1b0 [ 172.151328][T11767] kmem_getpages+0x56/0xa20 [ 172.155805][T11767] ? trace_lock_release+0x135/0x1a0 [ 172.160973][T11767] cache_grow_begin+0x7e/0x2c0 [ 172.165718][T11767] cache_alloc_refill+0x311/0x3f0 [ 172.170713][T11767] ? check_preemption_disabled+0xb7/0x2a0 [ 172.176407][T11767] kmem_cache_alloc+0x2b9/0x2e0 [ 172.181232][T11767] ? getname_flags+0xba/0x640 [ 172.185879][T11767] getname_flags+0xba/0x640 [ 172.190362][T11767] user_path_at_empty+0x2d/0x50 [ 172.195199][T11767] do_mount+0xd4/0x2490 [ 172.199329][T11767] ? __kasan_check_write+0x14/0x20 [ 172.204414][T11767] ? copy_mount_options+0xdc/0x3c0 [ 172.209496][T11767] ksys_mount+0xcc/0x100 [ 172.213710][T11767] __x64_sys_mount+0xbf/0xd0 [ 172.218281][T11767] do_syscall_64+0xfe/0x140 [ 172.222760][T11767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.228623][T11767] RIP: 0033:0x459829 [ 172.232493][T11767] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.252070][T11767] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 172.260454][T11767] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 172.268398][T11767] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 172.276339][T11767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:04:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x2, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:44 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89a1, &(0x7f0000000180)={r0, r1}) 02:04:44 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(0x0, 0xfffffdfc) fsetxattr$security_evm(r0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000000200)=@v1={0x2, "446d620d54d411"}, 0x8, 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x101000, 0x0) write$P9_RWRITE(r1, 0x0, 0xfffffffffffffed5) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x1) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video2\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x7, 0x40000) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000540)={{0x1cc, 0xce07, 0x116, 0x28b, 0x2c5, 0x1000, 0x261, 0xffffffff}, "", [[], [], [], [], [], []]}, 0x620) [ 172.284285][T11767] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 172.292229][T11767] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x4, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:44 executing program 4 (fault-call:8 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:44 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x89e8, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x5, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:44 executing program 1: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) connect(r0, &(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x7fffffff, 0x4, "0ee9747bf35e13ddd5cbd1195be9fdec865b3227bb278ba1dae1c281256c67539ccba9e35856f9cf0749d6d04579faac252d64fbf02a0855e0926fbb7e5b43", 0x37}, 0x80) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockname(r1, 0x0, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000000)) 02:04:44 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_mr_cache\x00') r2 = accept4$llc(r1, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x10, 0xb7e4b7b273b6bba9) timerfd_create(0x0, 0x800) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="24000000070607031dfffd942fa2010020200a002a001000061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x4e03, @remote}, 0xffffffffffffff62) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000001c0)={{0x8, @multicast1, 0x4e23, 0x3, 'lblc\x00', 0x10, 0x3, 0x7}, {@multicast2, 0x4e23, 0x2, 0x8, 0x9, 0x3}}, 0x44) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000380)=0x6, 0x4) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000300)=0x1, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0x27}, 0x1b, r3}) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000340)=0x937, 0x4) 02:04:44 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x89e9, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x6, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:44 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e1, &(0x7f0000000180)={r0, r1}) [ 172.582896][T11810] FAULT_INJECTION: forcing a failure. [ 172.582896][T11810] name failslab, interval 1, probability 0, space 0, times 0 [ 172.636507][T11828] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 172.657466][T11810] CPU: 1 PID: 11810 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 172.665486][T11810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.675544][T11810] Call Trace: [ 172.678817][T11810] dump_stack+0x1d8/0x2f8 [ 172.683130][T11810] should_fail+0x555/0x770 [ 172.687530][T11810] __should_failslab+0x11a/0x160 [ 172.692451][T11810] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 172.698168][T11810] should_failslab+0x9/0x20 [ 172.702648][T11810] __kmalloc+0x7a/0x340 [ 172.706777][T11810] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 172.712465][T11810] tomoyo_realpath_from_path+0xdc/0x7c0 [ 172.717989][T11810] tomoyo_mount_permission+0x294/0xa30 [ 172.723423][T11810] ? path_lookupat+0x474/0xb30 [ 172.728165][T11810] ? kmem_cache_free+0xd8/0xf0 [ 172.732908][T11810] tomoyo_sb_mount+0x35/0x40 [ 172.737473][T11810] security_sb_mount+0x84/0xe0 [ 172.742213][T11810] do_mount+0x107/0x2490 [ 172.746428][T11810] ? __kasan_check_write+0x14/0x20 [ 172.751512][T11810] ? copy_mount_options+0xdc/0x3c0 [ 172.756597][T11810] ksys_mount+0xcc/0x100 [ 172.760814][T11810] __x64_sys_mount+0xbf/0xd0 [ 172.765393][T11810] do_syscall_64+0xfe/0x140 [ 172.769869][T11810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.775730][T11810] RIP: 0033:0x459829 [ 172.779601][T11810] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.799192][T11810] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 172.807573][T11810] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 172.815516][T11810] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 172.823460][T11810] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:04:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xa, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:45 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xae01, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:45 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000180)='./file1\x00', 0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0xffffffff990f1a32}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2, 0x6, 0x6, 0x8000, 0xb71d}, 0x14) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000, 0x130) accept4$unix(r4, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0x6e, 0x800) sendmsg(r3, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) close(r3) [ 172.832339][T11810] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 172.840284][T11810] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 172.864104][T11846] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 02:04:45 executing program 4 (fault-call:8 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 172.961750][T11810] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:45 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e2, &(0x7f0000000180)={r0, r1}) 02:04:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000140)={{r2, r3+10000000}, {r4, r5+10000000}}, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061104000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:04:45 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xae41, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xf, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:45 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89f0, &(0x7f0000000180)={r0, r1}) [ 173.115630][T11875] FAULT_INJECTION: forcing a failure. [ 173.115630][T11875] name failslab, interval 1, probability 0, space 0, times 0 [ 173.157586][T11875] CPU: 0 PID: 11875 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 173.165593][T11875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.175643][T11875] Call Trace: [ 173.178937][T11875] dump_stack+0x1d8/0x2f8 [ 173.183271][T11875] should_fail+0x555/0x770 [ 173.187691][T11875] __should_failslab+0x11a/0x160 [ 173.192628][T11875] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.198372][T11875] should_failslab+0x9/0x20 [ 173.202872][T11875] __kmalloc+0x7a/0x340 [ 173.207025][T11875] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 173.212738][T11875] tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.218277][T11875] tomoyo_mount_permission+0x294/0xa30 [ 173.223715][T11875] ? kmem_cache_free+0xd8/0xf0 [ 173.228464][T11875] tomoyo_sb_mount+0x35/0x40 [ 173.233028][T11875] security_sb_mount+0x84/0xe0 [ 173.237766][T11875] do_mount+0x107/0x2490 [ 173.241983][T11875] ? __kasan_check_write+0x14/0x20 [ 173.247066][T11875] ? copy_mount_options+0xdc/0x3c0 [ 173.252149][T11875] ksys_mount+0xcc/0x100 [ 173.256377][T11875] __x64_sys_mount+0xbf/0xd0 [ 173.260939][T11875] do_syscall_64+0xfe/0x140 [ 173.265415][T11875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.271278][T11875] RIP: 0033:0x459829 [ 173.275145][T11875] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.294721][T11875] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 173.303101][T11875] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 173.311046][T11875] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 173.318988][T11875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 173.326933][T11875] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 173.334878][T11875] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x10, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:45 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xae80, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 173.354231][T11875] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:45 executing program 4 (fault-call:8 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:45 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xae9a, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x60, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:45 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x400454ca, &(0x7f0000000180)={r0, r1}) [ 173.595972][T11932] FAULT_INJECTION: forcing a failure. [ 173.595972][T11932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 173.609194][T11932] CPU: 0 PID: 11932 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 173.617165][T11932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.627211][T11932] Call Trace: [ 173.630502][T11932] dump_stack+0x1d8/0x2f8 [ 173.634832][T11932] should_fail+0x555/0x770 [ 173.639231][T11932] should_fail_alloc_page+0x55/0x60 [ 173.644408][T11932] prepare_alloc_pages+0x283/0x470 [ 173.649506][T11932] __alloc_pages_nodemask+0xb2/0x5d0 [ 173.654776][T11932] kmem_getpages+0x56/0xa20 [ 173.659257][T11932] ? quarantine_put+0xb7/0x1f0 [ 173.665530][T11932] cache_grow_begin+0x7e/0x2c0 [ 173.670274][T11932] cache_alloc_refill+0x311/0x3f0 [ 173.675273][T11932] ? check_preemption_disabled+0xb7/0x2a0 [ 173.680976][T11932] __kmalloc+0x318/0x340 [ 173.685199][T11932] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.690899][T11932] tomoyo_realpath_from_path+0xdc/0x7c0 [ 173.699208][T11932] tomoyo_mount_permission+0x294/0xa30 [ 173.704645][T11932] ? path_lookupat+0x474/0xb30 [ 173.709388][T11932] ? kmem_cache_free+0xd8/0xf0 [ 173.714143][T11932] tomoyo_sb_mount+0x35/0x40 [ 173.718711][T11932] security_sb_mount+0x84/0xe0 [ 173.723456][T11932] do_mount+0x107/0x2490 [ 173.727687][T11932] ? __kasan_check_write+0x14/0x20 [ 173.732777][T11932] ? copy_mount_options+0xdc/0x3c0 [ 173.737870][T11932] ksys_mount+0xcc/0x100 [ 173.742094][T11932] __x64_sys_mount+0xbf/0xd0 [ 173.746663][T11932] do_syscall_64+0xfe/0x140 [ 173.751178][T11932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.757046][T11932] RIP: 0033:0x459829 [ 173.760918][T11932] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.780512][T11932] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 173.788903][T11932] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 02:04:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000a80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @rand_addr="3b92d3553ca24a146477ff85152fc3e9"}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000290000003700000000000000000000002400000000000000290000003200000000000000000000000000000000000001", @ANYRES32=0x0, @ANYBLOB="eba21bf0c3b799f261515be7f57870db671134c000b50a9c727a99cdebc09ccac4fc924647373d5be8703a03649e20e9d001730675bf79e7c237a291234474d2646c10c8b95889904fdd5164073efebcaa014443d783e5b590d07341f686ef1c3612fea2033a5bbafefe8f57d923d0ae053865634646adc77cdc1c8d3a867f880d5a19515cd5292e207df9b5fcce3cd86cd3f68e3e1826d006f114a36b486b26fe78a85beed2478325044afad77bf9eea77a949c4dbc3fab81b31438e56157eff44906957b2813082a254309bce3896d09384cc5abaa616b41ad2911a2"], 0x5000}}], 0x2, 0x0) 02:04:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x121, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:46 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x40049409, &(0x7f0000000180)={r0, r1}) [ 173.796854][T11932] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 173.804805][T11932] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 173.812756][T11932] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 173.820702][T11932] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 173.844182][T11921] vivid-006: kernel_thread() failed 02:04:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x40000000, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xc0, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x2}}}}}, 0x0) 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x500, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:46 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x4020940d, &(0x7f0000000180)={r0, r1}) 02:04:46 executing program 4 (fault-call:8 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x400454ca, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x600, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:46 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x800454d2, &(0x7f0000000180)={r0, r1}) 02:04:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000055781309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x20, 0x0, 0x5, {0xcbb, 0x4, 0x5, 0x40}}, 0x20) 02:04:46 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x80086301, &(0x7f0000000180)={r0, r1}) 02:04:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x40045542, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 174.122894][T11982] FAULT_INJECTION: forcing a failure. [ 174.122894][T11982] name failslab, interval 1, probability 0, space 0, times 0 [ 174.157596][T11982] CPU: 1 PID: 11982 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 02:04:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xa00, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 174.165602][T11982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.175654][T11982] Call Trace: [ 174.178942][T11982] dump_stack+0x1d8/0x2f8 [ 174.183279][T11982] should_fail+0x555/0x770 [ 174.187700][T11982] __should_failslab+0x11a/0x160 [ 174.192640][T11982] ? tomoyo_encode2+0x273/0x5a0 [ 174.197485][T11982] should_failslab+0x9/0x20 [ 174.201986][T11982] __kmalloc+0x7a/0x340 [ 174.206140][T11982] tomoyo_encode2+0x273/0x5a0 [ 174.210813][T11982] tomoyo_realpath_from_path+0x769/0x7c0 [ 174.216460][T11982] tomoyo_mount_permission+0x294/0xa30 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc00, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 174.221913][T11982] ? path_lookupat+0x474/0xb30 [ 174.226664][T11982] ? kmem_cache_free+0xd8/0xf0 [ 174.226686][T11982] tomoyo_sb_mount+0x35/0x40 [ 174.226699][T11982] security_sb_mount+0x84/0xe0 [ 174.240764][T11982] do_mount+0x107/0x2490 [ 174.245025][T11982] ? __kasan_check_write+0x14/0x20 [ 174.250116][T11982] ? copy_mount_options+0xdc/0x3c0 [ 174.255206][T11982] ksys_mount+0xcc/0x100 [ 174.259423][T11982] __x64_sys_mount+0xbf/0xd0 [ 174.263985][T11982] do_syscall_64+0xfe/0x140 [ 174.268463][T11982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.274328][T11982] RIP: 0033:0x459829 [ 174.278196][T11982] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.297775][T11982] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 174.306157][T11982] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 174.314102][T11982] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 02:04:46 executing program 1: timer_create(0x493dcacb82bd45cb, &(0x7f0000000040)={0x0, 0x27, 0x2, @thr={&(0x7f00000000c0)="98f8c932dc36364762d6c4290c0b4b4b9a5d0b637475dc5c7712184cc9e432ce8b50be4f9d7b49f8ff29bb1607c3913e9599f0e0bed8ea5b248be40eaed70ec30a42587f04261af9285110f8b33b01662f50da2c1c200b158e73", &(0x7f0000000140)="51e762a1979014b9acad58fcbcaa068847dd5b4cd079d6e7ce3d6afcb3d32f11d6c8dd68400281f1d2c31968fcd3ea08dd05a8a8eced757a3c2ce56058583df18ca55737865d01821789fe7374744c87ed2e5995e5106376edf1195cef8f48a6f97cca4304940a8aa375fe962d17fba3decf34bd32f5b0b7cd48d3634b86188830c08ead668c77002f2eaf3c7879a772774318c994b10e2a35e35d4aaedac9a08c1685cc7f166a748742c5b4f09170787af56d7588bb81"}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x1, &(0x7f0000000240)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000280)) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="18000000100007031dfffd946f20200a0007000003061d85", 0x18}], 0x1}, 0x0) [ 174.322049][T11982] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 174.329993][T11982] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 174.337937][T11982] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 174.350291][T11996] vivid-006: kernel_thread() failed 02:04:46 executing program 4 (fault-call:8 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x40049409, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xec0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:46 executing program 1: r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') poll(&(0x7f0000000300)=[{r0, 0x1000}, {r0, 0x20}, {r0, 0x2021}, {r0, 0x80}, {r0, 0x1000}, {r0}], 0x6, 0x9) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x8) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f0000000000)=ANY=[@ANYBLOB="b93f6d631f3485dbab5b380a086a458f3ce67ea348d90296e2eb3cd081d14d6203ed238675148301608eff3596096ffa944c62f7d610cc03cab269162b6561e1e06da7e6eb8b2cddb6588472b2a98d", @ANYRES16=r1, @ANYBLOB="04002bbd7000ffdbdf25130000001400070008000100ff000000080002000400000048000400440007000800030007000000080001000e0000000800040016ee0000080001001b000000080001001800000008000200018000000800030000000000080001000f00000010000200080002001234000004000400"], 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0xa, 0x3, 0xcd, 0x4, 'syz1\x00', 0x9}, 0x3, 0x8, 0x6, r2, 0x2, 0x3, 'syz1\x00', &(0x7f0000000180)=['!\x04\x00', '/dev/cec#\x00'], 0xd, [], [0x3, 0x3ff, 0x7, 0x1]}) unshare(0xbe368e064ee62a62) inotify_rm_watch(0xffffffffffffffff, 0x0) 02:04:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 174.427236][T11982] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:46 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x80108906, &(0x7f0000000180)={r0, r1}) [ 174.524661][T12024] vivid-006: kernel_thread() failed 02:04:46 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x101002, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x9) ioctl$CAPI_GET_PROFILE(r0, 0x80044324, &(0x7f0000000080)) 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xf00, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:46 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00002b0000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000040)=0x3, 0x8, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) [ 174.626472][T12040] FAULT_INJECTION: forcing a failure. [ 174.626472][T12040] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 174.639779][T12040] CPU: 1 PID: 12040 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 174.647747][T12040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.657799][T12040] Call Trace: [ 174.661092][T12040] dump_stack+0x1d8/0x2f8 [ 174.661119][T12040] should_fail+0x555/0x770 [ 174.669820][T12040] should_fail_alloc_page+0x55/0x60 02:04:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x2101, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 174.669836][T12040] prepare_alloc_pages+0x283/0x470 [ 174.669850][T12040] __alloc_pages_nodemask+0xb2/0x5d0 [ 174.669859][T12040] ? debug_check_no_obj_freed+0x505/0x5b0 [ 174.669871][T12040] kmem_getpages+0x56/0xa20 [ 174.669883][T12040] ? trace_lock_release+0x135/0x1a0 [ 174.700892][T12040] cache_grow_begin+0x7e/0x2c0 [ 174.705659][T12040] cache_alloc_refill+0x311/0x3f0 [ 174.710677][T12040] ? check_preemption_disabled+0xb7/0x2a0 [ 174.716396][T12040] kmem_cache_alloc+0x2b9/0x2e0 [ 174.721237][T12040] ? getname_kernel+0x59/0x2f0 02:04:47 executing program 1: socket$packet(0x11, 0x3, 0x300) [ 174.725991][T12040] getname_kernel+0x59/0x2f0 [ 174.730559][T12040] kern_path+0x1f/0x40 [ 174.730571][T12040] tomoyo_mount_permission+0x7f1/0xa30 [ 174.730587][T12040] ? kmem_cache_free+0xd8/0xf0 [ 174.730605][T12040] tomoyo_sb_mount+0x35/0x40 [ 174.730617][T12040] security_sb_mount+0x84/0xe0 [ 174.754154][T12040] do_mount+0x107/0x2490 [ 174.758397][T12040] ? __kasan_check_write+0x14/0x20 [ 174.763505][T12040] ? copy_mount_options+0xdc/0x3c0 [ 174.768613][T12040] ksys_mount+0xcc/0x100 [ 174.772857][T12040] __x64_sys_mount+0xbf/0xd0 [ 174.777437][T12040] do_syscall_64+0xfe/0x140 [ 174.777449][T12040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.777461][T12040] RIP: 0033:0x459829 [ 174.787803][T12040] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.787808][T12040] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:47 executing program 4 (fault-call:8 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 02:04:47 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x80108907, &(0x7f0000000180)={r0, r1}) 02:04:47 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4020ae46, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x4000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 174.787821][T12040] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 174.787826][T12040] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 174.787830][T12040] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 174.787835][T12040] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 174.787839][T12040] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:47 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x40286608, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:47 executing program 1: fanotify_mark(0xffffffffffffffff, 0x84, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 02:04:47 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0xc0045878, &(0x7f0000000180)={r0, r1}) 02:04:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x4788, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 174.995840][T12085] FAULT_INJECTION: forcing a failure. [ 174.995840][T12085] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.009069][T12085] CPU: 1 PID: 12085 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 175.017043][T12085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.027097][T12085] Call Trace: [ 175.030384][T12085] dump_stack+0x1d8/0x2f8 [ 175.034719][T12085] should_fail+0x555/0x770 [ 175.039149][T12085] should_fail_alloc_page+0x55/0x60 [ 175.044357][T12085] prepare_alloc_pages+0x283/0x470 [ 175.049465][T12085] __alloc_pages_nodemask+0xb2/0x5d0 [ 175.054744][T12085] ? debug_check_no_obj_freed+0x505/0x5b0 [ 175.060462][T12085] kmem_getpages+0x56/0xa20 [ 175.064955][T12085] ? trace_lock_release+0x135/0x1a0 [ 175.070151][T12085] cache_grow_begin+0x7e/0x2c0 [ 175.074911][T12085] cache_alloc_refill+0x311/0x3f0 [ 175.079922][T12085] ? check_preemption_disabled+0xb7/0x2a0 [ 175.085620][T12085] kmem_cache_alloc+0x2b9/0x2e0 [ 175.090445][T12085] ? getname_kernel+0x59/0x2f0 [ 175.095181][T12085] getname_kernel+0x59/0x2f0 [ 175.099755][T12085] kern_path+0x1f/0x40 [ 175.103803][T12085] tomoyo_mount_permission+0x7f1/0xa30 [ 175.109241][T12085] ? kmem_cache_free+0xd8/0xf0 [ 175.113985][T12085] tomoyo_sb_mount+0x35/0x40 [ 175.118548][T12085] security_sb_mount+0x84/0xe0 [ 175.123286][T12085] do_mount+0x107/0x2490 [ 175.127501][T12085] ? __kasan_check_write+0x14/0x20 [ 175.132583][T12085] ? copy_mount_options+0xdc/0x3c0 [ 175.137671][T12085] ksys_mount+0xcc/0x100 [ 175.141884][T12085] __x64_sys_mount+0xbf/0xd0 [ 175.146445][T12085] do_syscall_64+0xfe/0x140 [ 175.150920][T12085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.156785][T12085] RIP: 0033:0x459829 [ 175.160655][T12085] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.180230][T12085] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 175.188609][T12085] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 02:04:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x3f) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000100)={0x2, 0x1000004e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x54, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000280)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000240)=""/42, 0x2a}) r2 = memfd_create(&(0x7f0000000080)='selinux/.bdev,\x00', 0x0) ftruncate(r2, 0x4000b) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000019c0)=0x7, 0x4) sendfile(r0, r2, 0x0, 0x2000000020011) sendto$inet(r0, &(0x7f0000000200)='t', 0x1, 0x0, 0x0, 0x0) 02:04:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 175.196553][T12085] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 175.204496][T12085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.212442][T12085] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 175.220385][T12085] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x4888, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:47 executing program 4 (fault-call:8 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:47 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4038564f, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:47 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0xc0045878, &(0x7f0000000180)={r0, r1}) 02:04:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 175.378133][T12110] syz-executor.1 (12110) used greatest stack depth: 24440 bytes left [ 175.423814][T12124] FAULT_INJECTION: forcing a failure. [ 175.423814][T12124] name failslab, interval 1, probability 0, space 0, times 0 [ 175.436561][T12124] CPU: 1 PID: 12124 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 175.444541][T12124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.454582][T12124] Call Trace: [ 175.454598][T12124] dump_stack+0x1d8/0x2f8 [ 175.454612][T12124] should_fail+0x555/0x770 [ 175.454624][T12124] __should_failslab+0x11a/0x160 [ 175.454633][T12124] ? alloc_vfsmnt+0x27/0x470 [ 175.454648][T12124] should_failslab+0x9/0x20 [ 175.480586][T12124] kmem_cache_alloc+0x56/0x2e0 [ 175.480599][T12124] alloc_vfsmnt+0x27/0x470 [ 175.480610][T12124] clone_mnt+0x6b/0xbc0 [ 175.489743][T12124] ? trace_lock_release+0x135/0x1a0 [ 175.489760][T12124] copy_tree+0x128/0xd60 [ 175.489769][T12124] ? trace_kfree+0xa0/0x110 [ 175.489776][T12124] ? get_mountpoint+0x1dd/0x420 [ 175.489783][T12124] ? kfree+0x1d/0x200 [ 175.489792][T12124] __do_loopback+0x1a3/0x370 [ 175.489802][T12124] do_mount+0xe0d/0x2490 [ 175.489816][T12124] ksys_mount+0xcc/0x100 [ 175.499128][T12124] __x64_sys_mount+0xbf/0xd0 [ 175.499139][T12124] do_syscall_64+0xfe/0x140 [ 175.499150][T12124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.499158][T12124] RIP: 0033:0x459829 [ 175.499170][T12124] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:04:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x5865, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:47 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0x0) msgget(0x1, 0x580) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x1) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000040)) 02:04:47 executing program 4 (fault-call:8 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x6000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 175.507875][T12124] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 175.507884][T12124] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 175.507890][T12124] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 175.507895][T12124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.507899][T12124] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 175.507904][T12124] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 175.570928][T12122] vivid-006: kernel_thread() failed 02:04:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4900, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000040)={{0x2000, 0x1000, 0x3, 0x7, 0x8, 0x5, 0x9, 0x8, 0x0, 0x800, 0xfffffffffffffffd, 0x1}, {0x5000, 0x4, 0xb, 0x54647040, 0x238d8365, 0x2, 0x2, 0x5, 0x6, 0x5b, 0x2, 0x80000001}, {0x4, 0x101000, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfa, 0x4, 0xd3, 0xfffffffffffeffff, 0x3}, {0xd000, 0x2000, 0xe, 0x401, 0x80000001, 0x59df, 0xbef, 0x100000001, 0x0, 0x100000000, 0x7, 0x7f}, {0x10000, 0xd000, 0x67b06dc1c2a2dd02, 0x5c5, 0x8f, 0x100000001, 0x985, 0x4, 0x5, 0x59, 0x7fffffff, 0x7fffffff00}, {0x3000, 0x2, 0x10, 0x800, 0x2, 0x8, 0xe4c5, 0x6, 0xf800000000000000, 0x3, 0xffffffffffffffff, 0x3}, {0x4000, 0x10d000, 0x3, 0x0, 0xff, 0x2, 0x4f3, 0x0, 0x4, 0x1abe0802, 0x5, 0x262}, {0x0, 0x4, 0xe, 0x8, 0x100000000, 0x9, 0x7, 0x9142, 0xf415, 0x10001, 0x9, 0x5}, {0x100000, 0xf000}, {0x1000, 0xf000}, 0x6, 0x0, 0x0, 0x40002, 0x4, 0x800, 0x2000, [0x0, 0xc76, 0x8000, 0x6]}) migrate_pages(0x0, 0x4, &(0x7f00000003c0)=0xb, &(0x7f0000000380)=0x800000000000) 02:04:47 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0xc0189436, &(0x7f0000000180)={r0, r1}) [ 175.689356][T12151] FAULT_INJECTION: forcing a failure. [ 175.689356][T12151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.704873][T12151] CPU: 1 PID: 12151 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 175.712843][T12151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.722892][T12151] Call Trace: [ 175.726182][T12151] dump_stack+0x1d8/0x2f8 [ 175.730521][T12151] should_fail+0x555/0x770 [ 175.734939][T12151] should_fail_alloc_page+0x55/0x60 [ 175.740133][T12151] prepare_alloc_pages+0x283/0x470 [ 175.745223][T12151] __alloc_pages_nodemask+0xb2/0x5d0 [ 175.750612][T12151] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 175.756510][T12151] kmem_getpages+0x56/0xa20 [ 175.760989][T12151] cache_grow_begin+0x7e/0x2c0 [ 175.765731][T12151] cache_alloc_refill+0x311/0x3f0 [ 175.770732][T12151] ? check_preemption_disabled+0xb7/0x2a0 [ 175.776424][T12151] __kmalloc+0x318/0x340 [ 175.780640][T12151] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 175.786330][T12151] tomoyo_realpath_from_path+0xdc/0x7c0 [ 175.791850][T12151] tomoyo_mount_permission+0x923/0xa30 [ 175.797287][T12151] ? kmem_cache_free+0xd8/0xf0 [ 175.802035][T12151] tomoyo_sb_mount+0x35/0x40 [ 175.806598][T12151] security_sb_mount+0x84/0xe0 [ 175.811340][T12151] do_mount+0x107/0x2490 [ 175.815557][T12151] ? __kasan_check_write+0x14/0x20 [ 175.820640][T12151] ? copy_mount_options+0xdc/0x3c0 [ 175.825727][T12151] ksys_mount+0xcc/0x100 [ 175.829942][T12151] __x64_sys_mount+0xbf/0xd0 [ 175.834505][T12151] do_syscall_64+0xfe/0x140 [ 175.838986][T12151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.844851][T12151] RIP: 0033:0x459829 [ 175.848723][T12151] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.868299][T12151] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 175.876682][T12151] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 02:04:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, 0x0, 0x0, 0x0) 02:04:48 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4040aea0, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 175.884625][T12151] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 175.892577][T12151] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 175.900518][T12151] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 175.908462][T12151] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x6558, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, 0x0, 0x0, 0x0) 02:04:48 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0xc020660b, &(0x7f0000000180)={r0, r1}) 02:04:48 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000de06836edb1b46ad18f627bdc3571f08c1adda047a23c9a89bd2c7a2d742ee07f341eb27a62f0d6990b4b3f5ecd4c000bcf6b29264da851550b2a5d8bf9568ac6d2ff0ecd3afbfd7ab2899ee2f66593d5519dab9546e60fc5a9d47891de625c49183cfc299b80893e35bb25ee650f3"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x6, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x9) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) write$P9_RLINK(r3, &(0x7f00000001c0)={0x7, 0x47, 0x2}, 0x7) 02:04:48 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4090ae82, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:48 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) 02:04:48 executing program 4 (fault-call:8 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8100, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, 0x0, 0x0, 0x0) 02:04:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000100)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) r2 = getpid() tgkill(r2, r2, 0x0) listen(r1, 0x9) listen(r1, 0x4000000000000000) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x100) sendfile(r1, r0, &(0x7f0000000080), 0x3a9) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000040)) 02:04:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8847, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:48 executing program 5: r0 = socket$kcm(0x2, 0x27, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl(r1, 0x0, &(0x7f00000004c0)="4a70d4c84191f9693c4a45") fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="00fbd801018abd2a98dd09871e9ed32398f71eb756a82fb2362497b9588bb7e04ec1d17b2bb436da2200000497232f8a41c89e9f5dd66c5a0ca9223061a39064e1ff80fff0e0cbed524724d94585beebd203c7c4d9197c75c9a7c32f53a4f8747de57c3f2a590a45604766d491515ab0b3c5a835f56e8f8146ed87e4900e58b068df106271d4466e01b596ebc5d3d074be097a3b65159c94faaeed4c8eb170baffbba300fb76fa961d7d85f413d58a795bdaf39f1a32973c5aacbafdcd369127934bfcb6938795d15f327331336f8453fc52a56e025a6fa0"], 0xd8, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000680)) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0x76656f) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000007c0)=""/242) bind$alg(r3, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) fsetxattr$trusted_overlay_opaque(r3, 0x0, &(0x7f0000000480)='y\x00', 0x2, 0x3) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000000200)) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000980)={0x3, &(0x7f00000008c0)=""/25, &(0x7f0000000ac0)=[{0x3, 0x21, 0x8679, &(0x7f0000000900)=""/33}, {0x3, 0x99, 0xfffffffffffffff9, &(0x7f0000000a00)=""/153}, {0x7fff, 0x3f, 0x3, &(0x7f0000000940)=""/63}]}) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000500)={0x2, 0xa, 0x4, 0x6, 0x5}) write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000280)={r0, r4}) 02:04:48 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x80044942, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 176.226521][T12200] FAULT_INJECTION: forcing a failure. [ 176.226521][T12200] name failslab, interval 1, probability 0, space 0, times 0 [ 176.280022][T12200] CPU: 0 PID: 12200 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 176.288033][T12200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.298084][T12200] Call Trace: [ 176.301360][T12200] dump_stack+0x1d8/0x2f8 [ 176.305671][T12200] should_fail+0x555/0x770 [ 176.310114][T12200] __should_failslab+0x11a/0x160 [ 176.315051][T12200] ? tomoyo_encode2+0x273/0x5a0 [ 176.319900][T12200] should_failslab+0x9/0x20 [ 176.324396][T12200] __kmalloc+0x7a/0x340 [ 176.328552][T12200] tomoyo_encode2+0x273/0x5a0 [ 176.333234][T12200] tomoyo_realpath_from_path+0x769/0x7c0 [ 176.333248][T12200] tomoyo_mount_permission+0x923/0xa30 [ 176.344298][T12200] ? kmem_cache_free+0xd8/0xf0 [ 176.349064][T12200] tomoyo_sb_mount+0x35/0x40 [ 176.353637][T12200] security_sb_mount+0x84/0xe0 [ 176.358388][T12200] do_mount+0x107/0x2490 [ 176.362624][T12200] ? __kasan_check_write+0x14/0x20 [ 176.367728][T12200] ? copy_mount_options+0xdc/0x3c0 [ 176.372834][T12200] ksys_mount+0xcc/0x100 02:04:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2286, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYBLOB="e068b53aa7b5790824271e43f567577ea26534899a5276f75ff2098867fede54281df157c7203058fb97ddbea7e104dbc6aea91544eff8469abc87", @ANYRESOCT=r0], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB="347a8e811f0eda6c9616f395057f0b3de7d7914e1338676e43caaa986e379dc0e683aa1a54455c65fe6f4d206aec17c3b29b573dc95eae50eec3e4502eac272e784f334b2c5655cc08c7c0ac824d82a36cd80062bb23600295f629fd5ee77655d6eee6d38f91754d4d23e4355648fcc1f536a1d3a76fd5fc9f4e3f276b4225cb05e052e1e208996cb15b4b3c798eec666b3f62615f920d5930942d96a2871d2723639a115c23fb233c4568afb3234aafc92bd7db15c0eb84c541b8e60bbfb003c23772d1fffbd93d76b81d413049071e7d6401b9a18057ac9b89baaaf9800b3131bad3d4906e22f06d3f5c90bede536d147abebb2f60", @ANYBLOB="7144bfb5379214bf4f23458b1efc143df68eca74b338d992a443c543a6ee05368bd0175ff235c027150a34e3e83d01971da9acbd45fc74104ce26eb85f6786957f778c6f220b0ec8d7b9833945f8eb333169a4d72957656450ac8025988817b569ac0f7dc14a0da2bb918257d4749c008d300d80dfced2b761ca98e386d13bd2eccaa1f811c95d434bc9448840976a3a71addabf1fc2191794eb2967bc9d38e4aac398915015b0f710cda09e001dfa1518aded3f52c3bfaa926fd1f31335c10bd560e090bc171646560e3224d1fbccec7b7b609c84c7d42be17b6739567a7ca2ab42b794a640671187ec69b87fd480c98de182ca2ad806c8", @ANYRES16=r0, @ANYRESHEX=r0, @ANYRES64=r0, @ANYBLOB="2a9b13bb12d444c92fff7293c12c2efde3aa6c394410fb6e465d9e0bc90d33262c88b7c0206ab47c624e9dfba9c4c5de19ee6f4b340afc5a6bb235785e7fd107462327ada98720af380ac27d987abafe3870e48b002276362bf1036b2a481f8ce0f3d2cc8f00051e2da9ffb28f88fe32e43409a4bbbe42b867aa259f451da0b555617c1edd40eccfab1f0c348d0fd47bf99a8993a33791852e1ec1dc87e64e3b694adf1880bc88a600a55746e614f48289f77289c4fe02b2f03e150cd4b6a89aae9166ff62696083e5f00ab6298c7d0d4ce829b6a2f9cd9a1a2ca3e7a3c250ccb57dc25d70d2c22cd7eee8bb4581", @ANYRES32=r0, @ANYRES32=r0, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYPTR]], @ANYRES32=r0, @ANYRESOCT=r0, @ANYRES32=r0]) 02:04:48 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000280)='dns_resolver\x00\xb4+\x8fyN\\\xb5o\xa9\xfc6\xb3-\xba\xbcx\x1eb!\xb21#\xb8\x16s~\x05;\xaa\xfe\xc1^\xa4\xc5I%H\xefh\xed\x8d\xf8\xc0\xda\xd6\x10V\xe3\xe4A\x91\xb0\x027\xd04~E\xc6\x81O\"\xac|W\x98\x1d\x9dS\xb2\x1e\xc2\xd8\x9b\"\xc4\xb7\x98\xc3\x99\x06\xdeL\xb2\x8b\x15\xcb\x05\xb0\b\xd4>\x10\xad\xb5\xd4\a1\"\x96=\x1ay\xca]9\x9b\x02@!L\x96\xec\xa3\x88_\xfbx)I\x853\xa52o\xaf\x91\x02\xc8\xf2\xea\xc1X\x16,\xb2\xf69d\a\f\xc8\x06b\x06e\xdcga\xa1\xa7)\x1a\x0e\v\xa7\xd6\x9a\x87', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000001c0), 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$negate(0xd, r2, 0x8000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) fsconfig$FSCONFIG_SET_FLAG(r3, 0x0, &(0x7f0000000100)='ro\x00', 0x0, 0x0) 02:04:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8848, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 176.377089][T12200] __x64_sys_mount+0xbf/0xd0 [ 176.381679][T12200] do_syscall_64+0xfe/0x140 [ 176.386189][T12200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.392066][T12200] RIP: 0033:0x459829 [ 176.395963][T12200] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.415557][T12200] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) [ 176.415567][T12200] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 176.415572][T12200] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 176.415583][T12200] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 176.432004][T12200] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 176.432009][T12200] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 176.433219][T12200] ERROR: Out of memory at tomoyo_realpath_from_path. 02:04:48 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x800454d2, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:48 executing program 4 (fault-call:8 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc00e, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000280)={0x0, 0x0, @ioapic={0x10002, 0xf7, 0x8, 0x2, 0x0, [{0x3e, 0x3, 0xfffffffffffffffa, [], 0x80000001}, {0x8, 0x6, 0xff, [], 0x1f}, {0x9, 0x3f, 0x7, [], 0x1}, {0x3, 0x6, 0x94, [], 0x67911033}, {0x6, 0x5, 0x7fff, [], 0x84}, {0x6, 0x4, 0x3f, [], 0x5}, {0x10000, 0x5, 0x2, [], 0x1ff}, {0x0, 0x0, 0x8, [], 0x240}, {0x2c, 0x8, 0x8}, {0xf6, 0x56, 0x81, [], 0x1}, {0x1, 0x5, 0xa5, [], 0x1000}, {0x40, 0xffffffffffffffff, 0x20, [], 0x1}, {0x3, 0x3, 0x1, [], 0x7d49}, {0x716, 0x4, 0xff, [], 0x9}, {0x6, 0x9, 0x2, [], 0x1}, {0xffffffffffffffac, 0x9, 0x8000, [], 0x7}, {0xd806, 0x0, 0xff, [], 0x5}, {0x1f, 0xffffffffffff73a8, 0x3}, {0xffffffffffffffe0, 0x3adb, 0x9, [], 0x80000000}, {0x3f, 0x9, 0x8}, {0x0, 0x0, 0x9, [], 0x10001}, {0x6, 0xd128, 0x8001, [], 0x1}, {0x0, 0x1, 0x7b, [], 0xa2a}, {0x7f, 0xf59, 0x8, [], 0x1}]}}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f0000000000)="baa000b0e8eef33e0f320f3066b9800000c00f326635010000000f3067f3f33e0f01376766c7442400006000006766c7442402000000006766c744240600000000670f011c2466b80500000066b9120000000f01c10fa90f20dc0f01d1", 0x5d}], 0x1, 0x68, &(0x7f0000000180)=[@efer={0x2, 0x800}], 0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:04:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 02:04:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x34000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 176.679208][T12267] FAULT_INJECTION: forcing a failure. [ 176.679208][T12267] name failslab, interval 1, probability 0, space 0, times 0 [ 176.701730][T12267] CPU: 0 PID: 12267 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 176.709729][T12267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.719775][T12267] Call Trace: [ 176.723054][T12267] dump_stack+0x1d8/0x2f8 [ 176.727373][T12267] should_fail+0x555/0x770 [ 176.731776][T12267] __should_failslab+0x11a/0x160 [ 176.736703][T12267] ? getname_kernel+0x59/0x2f0 [ 176.741585][T12267] should_failslab+0x9/0x20 [ 176.746077][T12267] kmem_cache_alloc+0x56/0x2e0 [ 176.750826][T12267] getname_kernel+0x59/0x2f0 [ 176.755409][T12267] kern_path+0x1f/0x40 [ 176.759471][T12267] do_mount+0x61c/0x2490 [ 176.763696][T12267] ? copy_mount_options+0xdc/0x3c0 [ 176.768792][T12267] ksys_mount+0xcc/0x100 [ 176.773016][T12267] __x64_sys_mount+0xbf/0xd0 [ 176.777593][T12267] do_syscall_64+0xfe/0x140 [ 176.782083][T12267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.787958][T12267] RIP: 0033:0x459829 [ 176.791840][T12267] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.811427][T12267] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 176.819821][T12267] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 [ 176.827777][T12267] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 176.836318][T12267] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 176.844278][T12267] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 176.852236][T12267] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 177.077444][ T26] audit: type=1804 audit(1566353089.335:32): pid=12242 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir265725631/syzkaller.Lo28cI/131/file0" dev="sda1" ino=16660 res=1 02:04:49 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xa911, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x40000000000000}, 0xffffffc1}, 0x70) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r0, r3}) 02:04:49 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x80086301, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 02:04:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x400300, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:49 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000080)=""/71, &(0x7f0000000100)=0x47) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x9c, r1, 0x220, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000140)=0x7ff, 0x4) ioctl(r2, 0xc0000000000, &(0x7f0000000040)="11dca5055e0bcfe47bf070") 02:04:49 executing program 4 (fault-call:8 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8000000000001, 0x0) write$binfmt_aout(r0, &(0x7f0000000600)=ANY=[], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f0000000140)=""/164, 0xa4}, {&(0x7f00000002c0)=""/215, 0xd7}, {&(0x7f00000003c0)=""/190, 0xbe}], 0x4, 0x22) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0xff}) 02:04:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 02:04:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x1000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 177.309805][T12294] FAULT_INJECTION: forcing a failure. [ 177.309805][T12294] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.323032][T12294] CPU: 1 PID: 12294 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 177.331001][T12294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.341049][T12294] Call Trace: 02:04:49 executing program 4 (fault-call:8 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 177.344350][T12294] dump_stack+0x1d8/0x2f8 02:04:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x2000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:49 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x810c5701, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 177.344367][T12294] should_fail+0x555/0x770 [ 177.344382][T12294] should_fail_alloc_page+0x55/0x60 [ 177.344392][T12294] prepare_alloc_pages+0x283/0x470 [ 177.344406][T12294] __alloc_pages_nodemask+0xb2/0x5d0 [ 177.344423][T12294] kmem_getpages+0x56/0xa20 [ 177.344432][T12294] ? trace_lock_release+0x135/0x1a0 [ 177.344442][T12294] cache_grow_begin+0x7e/0x2c0 [ 177.344452][T12294] cache_alloc_refill+0x311/0x3f0 [ 177.344461][T12294] ? check_preemption_disabled+0xb7/0x2a0 [ 177.344472][T12294] kmem_cache_alloc+0x2b9/0x2e0 [ 177.344481][T12294] ? getname_kernel+0x59/0x2f0 [ 177.344492][T12294] getname_kernel+0x59/0x2f0 [ 177.344504][T12294] kern_path+0x1f/0x40 [ 177.344515][T12294] do_mount+0x61c/0x2490 [ 177.344527][T12294] ? copy_mount_options+0xdc/0x3c0 [ 177.344538][T12294] ksys_mount+0xcc/0x100 [ 177.344548][T12294] __x64_sys_mount+0xbf/0xd0 [ 177.344559][T12294] do_syscall_64+0xfe/0x140 [ 177.344571][T12294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.344579][T12294] RIP: 0033:0x459829 [ 177.344595][T12294] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.344601][T12294] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 177.344612][T12294] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 177.344617][T12294] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 177.344624][T12294] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 177.344629][T12294] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 177.344636][T12294] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 177.396518][T12291] vivid-006: kernel_thread() failed [ 177.528444][T12329] FAULT_INJECTION: forcing a failure. [ 177.528444][T12329] name failslab, interval 1, probability 0, space 0, times 0 [ 177.572213][T12329] CPU: 1 PID: 12329 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 177.579535][T12329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.579538][T12329] Call Trace: [ 177.579553][T12329] dump_stack+0x1d8/0x2f8 [ 177.579571][T12329] should_fail+0x555/0x770 [ 177.579587][T12329] __should_failslab+0x11a/0x160 [ 177.579598][T12329] ? alloc_vfsmnt+0x27/0x470 [ 177.579609][T12329] should_failslab+0x9/0x20 [ 177.579620][T12329] kmem_cache_alloc+0x56/0x2e0 [ 177.579629][T12329] alloc_vfsmnt+0x27/0x470 [ 177.579639][T12329] clone_mnt+0x6b/0xbc0 [ 177.579647][T12329] ? trace_lock_release+0x135/0x1a0 [ 177.579659][T12329] copy_tree+0x128/0xd60 [ 177.579667][T12329] ? trace_kfree+0xa0/0x110 [ 177.579679][T12329] ? get_mountpoint+0x1dd/0x420 [ 177.772430][T12329] ? kfree+0x1d/0x200 02:04:50 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000030000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x400000) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x1909, 0x2000000000, 0x3b, 0x10001}}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:50 executing program 1: r0 = getpgid(0xffffffffffffffff) ptrace$getsig(0x4202, r0, 0xffffffff, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffc0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) 02:04:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x4000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 177.772442][T12329] __do_loopback+0x1a3/0x370 [ 177.772460][T12329] do_mount+0xe0d/0x2490 [ 177.785219][T12329] ksys_mount+0xcc/0x100 [ 177.789456][T12329] __x64_sys_mount+0xbf/0xd0 [ 177.794046][T12329] do_syscall_64+0xfe/0x140 [ 177.798554][T12329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.804431][T12329] RIP: 0033:0x459829 02:04:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0xc00c55ca, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 02:04:50 executing program 4 (fault-call:8 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:50 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x9000aea4, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x5000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 177.808305][T12329] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.808309][T12329] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 177.808317][T12329] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 177.808321][T12329] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 177.808326][T12329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 177.808330][T12329] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 177.808335][T12329] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:50 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:50 executing program 1: r0 = socket$inet(0x10, 0x80003, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f6105000a00000a1f000003002008000800030004000000", 0x24}], 0x1}, 0x0) [ 177.923226][T12351] FAULT_INJECTION: forcing a failure. [ 177.923226][T12351] name failslab, interval 1, probability 0, space 0, times 0 02:04:50 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x6000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xa000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 178.017535][T12351] CPU: 0 PID: 12351 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 178.025540][T12351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.035590][T12351] Call Trace: [ 178.038882][T12351] dump_stack+0x1d8/0x2f8 [ 178.043215][T12351] should_fail+0x555/0x770 [ 178.047632][T12351] __should_failslab+0x11a/0x160 [ 178.052567][T12351] ? alloc_vfsmnt+0xaa/0x470 [ 178.057155][T12351] should_failslab+0x9/0x20 [ 178.061654][T12351] __kmalloc_track_caller+0x79/0x340 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 178.066932][T12351] kstrdup_const+0x55/0x90 [ 178.071330][T12351] alloc_vfsmnt+0xaa/0x470 [ 178.071340][T12351] clone_mnt+0x6b/0xbc0 [ 178.071350][T12351] ? trace_lock_release+0x135/0x1a0 [ 178.071364][T12351] copy_tree+0x128/0xd60 [ 178.089300][T12351] ? trace_kfree+0xa0/0x110 [ 178.093801][T12351] ? get_mountpoint+0x1dd/0x420 [ 178.098647][T12351] ? kfree+0x1d/0x200 [ 178.102625][T12351] __do_loopback+0x1a3/0x370 [ 178.107205][T12351] do_mount+0xe0d/0x2490 [ 178.111457][T12351] ksys_mount+0xcc/0x100 [ 178.115689][T12351] __x64_sys_mount+0xbf/0xd0 [ 178.120271][T12351] do_syscall_64+0xfe/0x140 [ 178.124770][T12351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.130650][T12351] RIP: 0033:0x459829 [ 178.134525][T12351] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.154117][T12351] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 178.162521][T12351] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 178.170488][T12351] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 178.178448][T12351] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.178453][T12351] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 178.178458][T12351] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xf000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$inet(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000002, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17}) open(0x0, 0x80000, 0x0) add_key(&(0x7f0000000140)='asymmetric\x00', 0x0, &(0x7f00000001c0)='l', 0xfffff, 0xfffffffffffffffc) 02:04:50 executing program 4 (fault-call:8 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:50 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:50 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000ede00c26a4c22fb1e184e4b45c0f13c2e902e6e33e69cc8d4befc298bf5fb13cc799ad4daf4682dd6ffd5884e281b7e5585fcfdff664eeb67217c472b67a5a"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 178.323094][T12403] FAULT_INJECTION: forcing a failure. [ 178.323094][T12403] name failslab, interval 1, probability 0, space 0, times 0 [ 178.341122][T12403] CPU: 1 PID: 12403 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 178.349118][T12403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.359269][T12403] Call Trace: [ 178.359286][T12403] dump_stack+0x1d8/0x2f8 [ 178.359300][T12403] should_fail+0x555/0x770 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x10000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:50 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xbd3ede083dd75f8f, 0x0) fcntl$getflags(r0, 0x40b) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3, 0xffffffffffffefff}, 0x4) ppoll(&(0x7f0000000080)=[{r1, 0x40}, {r0, 0x1000}, {r0, 0x4002}, {r1, 0x4000}, {r1, 0x80}, {r0, 0x8000}, {r0, 0x20}, {r1, 0x1}, {r0, 0x8}], 0x9, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={0x1}, 0x8) [ 178.359311][T12403] __should_failslab+0x11a/0x160 [ 178.359325][T12403] ? alloc_vfsmnt+0x27/0x470 [ 178.371292][T12403] should_failslab+0x9/0x20 [ 178.371304][T12403] kmem_cache_alloc+0x56/0x2e0 [ 178.371313][T12403] ? rcu_lock_release+0x9/0x30 [ 178.371325][T12403] alloc_vfsmnt+0x27/0x470 [ 178.371340][T12403] clone_mnt+0x6b/0xbc0 [ 178.403457][T12403] ? rcu_lock_release+0x26/0x30 [ 178.408301][T12403] copy_tree+0x4fc/0xd60 [ 178.412531][T12403] ? trace_kfree+0xa0/0x110 [ 178.417031][T12403] __do_loopback+0x1a3/0x370 [ 178.421617][T12403] do_mount+0xe0d/0x2490 [ 178.425854][T12403] ksys_mount+0xcc/0x100 [ 178.430080][T12403] __x64_sys_mount+0xbf/0xd0 [ 178.434652][T12403] do_syscall_64+0xfe/0x140 [ 178.434665][T12403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.434672][T12403] RIP: 0033:0x459829 [ 178.434683][T12403] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:04:50 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000d9dfb53a5564f658919c55cbd703881aeb92b2f5ecc55c754c776eb8cf86fef43332b8984df753f53eae42"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x1, 0x1) socket$kcm(0x29, 0x7, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000200)=""/179) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r1}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x5, 0xff, 0xdcb5fb8fea21a369, 0xffffffff, 0x3f71, 0x101, 0x1c, 0x6, r2}, 0x20) [ 178.468632][T12403] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 178.468641][T12403] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 178.468646][T12403] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 178.468652][T12403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.468657][T12403] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 178.468662][T12403] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x21010000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 178.524305][T12407] vivid-006: kernel_thread() failed 02:04:50 executing program 4 (fault-call:8 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:50 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v2={0x5, 0x1, 0x0, 0x9, 0x25, "f581c64f262c5571ada136b1935757d49c91d1f207ceeca87b820a09fa1b9895c352b18a09"}, 0x2f, 0x1) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000ea327153d21e31b7e110872b75acd5000000000000000000000000007900020b2e4821da8687b1"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x141200, 0x0) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000200)={'bond_slave_1\x00', 0x7}) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f00000003c0)={0x7fe0, 0x7, 0x4, 0x20000000, {0x77359400}, {0x5, 0xc, 0x0, 0x80, 0xe9, 0x0, "c4ac8cc1"}, 0x53, 0x4, @userptr=0x20, 0x4}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r1, r2}) 02:04:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x40000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:50 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x5, @raw_data="ba1f4597390b833934136a661df7ae3b4cc6657ddd2760104b9b69b33000f83f0355b61d9f506d85d382c5c9473b40e707336e1fc3049ebdfa4841f41086ca8942b786d68cfc125b11df63c1b758437d9fd5b96591fddf96958e39f2314e694183f9122a7567312c2e1a73543f3b71ab79e6ba9bcd4c2a7da8ffc31ddf2f1a778c6fc244c6727527130ca1ada9b774a9f39552b2a2869d391fde13dd05844f6138f26b2dff15fa6759cbac49f205b249cc99bd631c86508a36342e9913e10815e821d5c981af2499"}) r1 = semget$private(0x0, 0x1, 0x121) semctl$SEM_STAT(r1, 0x4, 0x12, &(0x7f0000000100)=""/35) [ 178.681089][T12448] vivid-006: kernel_thread() failed 02:04:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 02:04:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x60000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 178.718362][T12446] FAULT_INJECTION: forcing a failure. [ 178.718362][T12446] name failslab, interval 1, probability 0, space 0, times 0 [ 178.740667][T12446] CPU: 1 PID: 12446 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 178.748675][T12446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.758727][T12446] Call Trace: [ 178.762015][T12446] dump_stack+0x1d8/0x2f8 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x65580000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 178.766344][T12446] should_fail+0x555/0x770 [ 178.770758][T12446] __should_failslab+0x11a/0x160 [ 178.775693][T12446] ? alloc_vfsmnt+0x27/0x470 [ 178.780274][T12446] should_failslab+0x9/0x20 [ 178.784767][T12446] kmem_cache_alloc+0x56/0x2e0 [ 178.789511][T12446] alloc_vfsmnt+0x27/0x470 [ 178.789521][T12446] clone_mnt+0x6b/0xbc0 [ 178.789532][T12446] ? do_raw_spin_unlock+0x49/0x260 [ 178.789542][T12446] copy_tree+0x4fc/0xd60 [ 178.789547][T12446] ? __do_loopback+0x1a3/0x370 [ 178.789559][T12446] __do_loopback+0x1a3/0x370 [ 178.789569][T12446] do_mount+0xe0d/0x2490 [ 178.789581][T12446] ksys_mount+0xcc/0x100 [ 178.789590][T12446] __x64_sys_mount+0xbf/0xd0 [ 178.789601][T12446] do_syscall_64+0xfe/0x140 [ 178.789615][T12446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.807444][T12446] RIP: 0033:0x459829 [ 178.807454][T12446] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:04:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x0, 0x1000, 0x5, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0xfffffffffffffff9, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, r0, 0x8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') fgetxattr(r1, &(0x7f00000003c0)=@random={'security.', '\\\x00'}, &(0x7f0000000400)=""/208, 0xd0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) r2 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x3f, 0x80000001, 0x6, 0x5, 0x0, 0x2, 0x2081, 0xa, 0x1, 0x0, 0x100, 0x3, 0x599, 0x9, 0xffffffffffffff35, 0x800, 0x0, 0x1ff, 0x1f, 0x6, 0x40, 0x88, 0x9, 0x8, 0x7f, 0x7a22414a, 0x7, 0x2, 0x2, 0x8, 0x1, 0x705494b6, 0x5, 0x4, 0x8, 0x100, 0x0, 0x10001, 0x2, @perf_config_ext={0x9, 0x1}, 0x1, 0x3, 0x81, 0x2, 0x5, 0x8, 0x2}, r2, 0x9, 0xffffffffffffffff, 0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) openat$cgroup_int(r3, &(0x7f0000000380)='cp\xe4E\xa0\xebK\xf1,\xd8_e8clusive\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) write$cgroup_type(r3, &(0x7f00000009c0)='threaded\x00', 0x9) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x81000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 178.807463][T12446] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 178.807471][T12446] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 178.807476][T12446] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 178.807481][T12446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.807485][T12446] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 178.807490][T12446] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 178.885835][T12471] vivid-006: kernel_thread() failed 02:04:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0205648, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:51 executing program 4 (fault-call:8 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:51 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x88470000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000040)=""/239, &(0x7f0000000140)=0xef) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 179.105184][T12502] FAULT_INJECTION: forcing a failure. [ 179.105184][T12502] name failslab, interval 1, probability 0, space 0, times 0 [ 179.131153][T12495] vivid-006: kernel_thread() failed [ 179.141246][T12502] CPU: 0 PID: 12502 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 179.149331][T12502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.159385][T12502] Call Trace: [ 179.162684][T12502] dump_stack+0x1d8/0x2f8 [ 179.167017][T12502] should_fail+0x555/0x770 [ 179.171442][T12502] __should_failslab+0x11a/0x160 [ 179.176390][T12502] ? alloc_vfsmnt+0xaa/0x470 [ 179.180979][T12502] should_failslab+0x9/0x20 [ 179.185483][T12502] __kmalloc_track_caller+0x79/0x340 [ 179.190773][T12502] kstrdup_const+0x55/0x90 [ 179.195189][T12502] alloc_vfsmnt+0xaa/0x470 [ 179.199607][T12502] clone_mnt+0x6b/0xbc0 [ 179.203763][T12502] ? do_raw_spin_unlock+0x49/0x260 [ 179.208871][T12502] copy_tree+0x4fc/0xd60 [ 179.213101][T12502] ? __do_loopback+0x1a3/0x370 [ 179.217864][T12502] __do_loopback+0x1a3/0x370 [ 179.222456][T12502] do_mount+0xe0d/0x2490 [ 179.226703][T12502] ksys_mount+0xcc/0x100 [ 179.230947][T12502] __x64_sys_mount+0xbf/0xd0 [ 179.235532][T12502] do_syscall_64+0xfe/0x140 [ 179.240023][T12502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.245898][T12502] RIP: 0033:0x459829 [ 179.249774][T12502] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.269358][T12502] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 179.277748][T12502] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 179.285693][T12502] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 179.293644][T12502] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:04:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0205649, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x88480000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x88a8ffff, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x9effffff, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="79b20cf614de8d3f14130716cc9d21ed", 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xfffffffffffffffa, 0x800) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000001c0)={{0x2c, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e20, 0x1, 'lc\x00', 0x24, 0x8000, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x3, 0x1000000000000000, 0xfffffffffffffffe, 0x4}}, 0x44) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000080)) shutdown(r0, 0x1) 02:04:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 179.301590][T12502] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 179.309539][T12502] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 179.331289][T12518] vivid-006: kernel_thread() failed 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc00e0000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 4 (fault-call:8 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 179.404420][T12539] IPVS: set_ctl: invalid protocol: 44 172.20.20.33:20000 02:04:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:51 executing program 5: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 179.449432][T12542] vivid-006: kernel_thread() failed [ 179.462191][T12539] IPVS: set_ctl: invalid protocol: 44 172.20.20.33:20000 02:04:51 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) 02:04:51 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0285628, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xefffffff, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:51 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x81, 0x400200) bind$rose(r0, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @default, @default, @bcast]}, 0x40) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="185e00000000e3ffffffffff5dc700009500020000000002"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) mq_timedsend(r4, &(0x7f0000000080)="1b79b47e9b95b7fc67f44011b3560a82621137850b14263c5d293e6b63dfbd9ea8b945f618e1e49c8c8a53995e644e34364797fb5d53d12f7b34d4a64bf7724384d4ed94dc524be9c144ef4805ecdc4c11ff7d0b8f9653bfea28f6c5e4cf7e9a1a95879e9110250e961e38686286fd4e141e8772f1", 0x75, 0x200, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) 02:04:51 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xf0ffffff, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:51 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400400, 0x0) getpeername$netrom(r2, &(0x7f0000000080)={{}, [@null, @bcast, @rose, @null, @remote, @bcast, @bcast, @default]}, &(0x7f0000000100)=0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 179.674579][T12569] vivid-006: kernel_thread() failed 02:04:51 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 179.834845][T12600] FAULT_INJECTION: forcing a failure. [ 179.834845][T12600] name failslab, interval 1, probability 0, space 0, times 0 [ 179.848608][T12600] CPU: 0 PID: 12600 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 179.856593][T12600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.866628][T12600] Call Trace: [ 179.869894][T12600] dump_stack+0x1d8/0x2f8 [ 179.874201][T12600] should_fail+0x555/0x770 [ 179.878595][T12600] __should_failslab+0x11a/0x160 [ 179.883505][T12600] ? alloc_vfsmnt+0x27/0x470 [ 179.888066][T12600] should_failslab+0x9/0x20 [ 179.892551][T12600] kmem_cache_alloc+0x56/0x2e0 [ 179.897288][T12600] alloc_vfsmnt+0x27/0x470 [ 179.901678][T12600] clone_mnt+0x6b/0xbc0 [ 179.905805][T12600] ? do_raw_spin_unlock+0x49/0x260 [ 179.910888][T12600] copy_tree+0x4fc/0xd60 [ 179.915101][T12600] ? __do_loopback+0x1a3/0x370 [ 179.919833][T12600] __do_loopback+0x1a3/0x370 [ 179.924392][T12600] do_mount+0xe0d/0x2490 [ 179.928606][T12600] ksys_mount+0xcc/0x100 [ 179.932822][T12600] __x64_sys_mount+0xbf/0xd0 [ 179.937389][T12600] do_syscall_64+0xfe/0x140 [ 179.941869][T12600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.947729][T12600] RIP: 0033:0x459829 [ 179.951594][T12600] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.971170][T12600] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:52 executing program 4 (fault-call:8 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0285629, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xffffa888, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:52 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:52 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000a8c0a78e1e96ceeab8371ad9eded534a9222759d0000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 179.979596][T12600] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 179.987545][T12600] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 179.995485][T12600] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.003425][T12600] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 180.011372][T12600] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xffffff7f, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:52 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) 02:04:52 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000080)={0x7, @vbi={0x7fff, 0x7, 0x400, 0x7f7f7f5f, [0x1f, 0x175], [0x80000000000000, 0x8], 0x108}}) 02:04:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 180.105991][T12620] FAULT_INJECTION: forcing a failure. [ 180.105991][T12620] name failslab, interval 1, probability 0, space 0, times 0 02:04:52 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) [ 180.156831][T12620] CPU: 1 PID: 12620 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 180.164844][T12620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.174896][T12620] Call Trace: [ 180.178191][T12620] dump_stack+0x1d8/0x2f8 [ 180.182521][T12620] should_fail+0x555/0x770 [ 180.186937][T12620] __should_failslab+0x11a/0x160 [ 180.191874][T12620] ? alloc_vfsmnt+0x27/0x470 [ 180.196452][T12620] should_failslab+0x9/0x20 [ 180.200938][T12620] kmem_cache_alloc+0x56/0x2e0 [ 180.205682][T12620] alloc_vfsmnt+0x27/0x470 [ 180.210075][T12620] clone_mnt+0x6b/0xbc0 [ 180.214209][T12620] ? do_raw_spin_unlock+0x49/0x260 [ 180.219296][T12620] copy_tree+0x4fc/0xd60 [ 180.223610][T12620] ? __do_loopback+0x1a3/0x370 [ 180.228352][T12620] __do_loopback+0x1a3/0x370 [ 180.232918][T12620] do_mount+0xe0d/0x2490 [ 180.237137][T12620] ksys_mount+0xcc/0x100 [ 180.241352][T12620] __x64_sys_mount+0xbf/0xd0 [ 180.245919][T12620] do_syscall_64+0xfe/0x140 [ 180.250400][T12620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.256262][T12620] RIP: 0033:0x459829 [ 180.260131][T12620] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.279708][T12620] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 180.288089][T12620] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 180.296035][T12620] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 02:04:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585602, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 180.303979][T12620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.311922][T12620] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 180.319867][T12620] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:52 executing program 4 (fault-call:8 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:52 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000027f2d79c199ff300000af365000000000000000095ae020080000000b640f90700005ffe9ff2b1a5b5f7fdf162fc7ae23715b24c7e3f2718837b110000000000cb9504ac4a67fb1a6f630ed7e88850b74060cddbdb06dda5e9a89b28136ea240bc4719ba0f"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:52 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) 02:04:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xffffff9e, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585603, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xffffffef, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:52 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000fadadf51dfbd89bc15f38a5700950002000000040008da6954a77a69a86cf2e03e96dbe2fae561891e1a3f244a09d28a0284079ae178c3dc200bb54deca2baf86829d4536f3a838aaf0e34277fac0dc36b61f0b2fd58b331403afc7ccd99d6a780990b730e24a7d8cd0aa3d4d558560057809c74ecb844472b6ee0b8277edb10a1695b92bfaa8478c00da2c24ea6cbbbe09f0990a6ae067108ac5e55245307e9cdd298d16e4550ee51ee705a15f54391d4959b2fc0114fa506e2ea3400adc4d417"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r0, r1}) r2 = fcntl$dupfd(r1, 0x0, r1) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) mq_timedsend(r2, &(0x7f0000000040)="06b846bbe947789294d5f3f905613b4b45b4b6ab6e40c1efdb078bd384b470230ba6c9e1b3d2", 0x26, 0xad2, &(0x7f0000000200)={r3, r4+10000000}) 02:04:52 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) 02:04:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 180.568397][T12675] FAULT_INJECTION: forcing a failure. [ 180.568397][T12675] name failslab, interval 1, probability 0, space 0, times 0 02:04:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xfffffff0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:52 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) [ 180.609850][T12675] CPU: 1 PID: 12675 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 180.617861][T12675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.627912][T12675] Call Trace: [ 180.631201][T12675] dump_stack+0x1d8/0x2f8 [ 180.635532][T12675] should_fail+0x555/0x770 [ 180.639943][T12675] __should_failslab+0x11a/0x160 [ 180.639954][T12675] ? alloc_vfsmnt+0x27/0x470 [ 180.639964][T12675] should_failslab+0x9/0x20 [ 180.639974][T12675] kmem_cache_alloc+0x56/0x2e0 [ 180.639985][T12675] alloc_vfsmnt+0x27/0x470 [ 180.639995][T12675] clone_mnt+0x6b/0xbc0 [ 180.640006][T12675] ? do_raw_spin_unlock+0x49/0x260 [ 180.640017][T12675] copy_tree+0x4fc/0xd60 [ 180.649497][T12675] ? __do_loopback+0x1a3/0x370 [ 180.649509][T12675] __do_loopback+0x1a3/0x370 [ 180.649519][T12675] do_mount+0xe0d/0x2490 [ 180.649531][T12675] ksys_mount+0xcc/0x100 [ 180.649541][T12675] __x64_sys_mount+0xbf/0xd0 [ 180.649551][T12675] do_syscall_64+0xfe/0x140 [ 180.649561][T12675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.649569][T12675] RIP: 0033:0x459829 [ 180.649578][T12675] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.649582][T12675] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 180.649591][T12675] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 02:04:53 executing program 4 (fault-call:8 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:53 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585605, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x80002) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000080)={{0xc, @remote, 0x4e20, 0x2, 'lblcr\x00', 0xeb62a2a5e1a9a3f8, 0x4, 0x4c}, {@local, 0x4e23, 0x1, 0x3, 0x8, 0x3}}, 0x44) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x1000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:53 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) [ 180.649599][T12675] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 180.663217][T12675] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 180.681396][T12675] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 180.681402][T12675] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x40030000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2}}, 0x0, 0x101}, &(0x7f0000000540)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000580)={r2, 0x80000000, 0x4, 0xa4, 0x8001, 0x200}, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r0, r3}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'eql\x00', 0x80000000}) r6 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xb0, 0x200000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r6, 0x0, 0x83, &(0x7f0000000100)={'nat\x00', 0x0, 0x3, 0xb8, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f00000001c0)=""/184}, &(0x7f0000000280)=0x78) 02:04:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 02:04:53 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585606, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 180.949162][T12709] FAULT_INJECTION: forcing a failure. [ 180.949162][T12709] name failslab, interval 1, probability 0, space 0, times 0 [ 180.995843][T12709] CPU: 0 PID: 12709 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 181.003860][T12709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.013908][T12709] Call Trace: [ 181.017185][T12709] dump_stack+0x1d8/0x2f8 [ 181.021501][T12709] should_fail+0x555/0x770 [ 181.025899][T12709] __should_failslab+0x11a/0x160 [ 181.030814][T12709] ? alloc_vfsmnt+0x27/0x470 [ 181.035385][T12709] should_failslab+0x9/0x20 [ 181.039860][T12709] kmem_cache_alloc+0x56/0x2e0 [ 181.044597][T12709] alloc_vfsmnt+0x27/0x470 [ 181.048986][T12709] clone_mnt+0x6b/0xbc0 [ 181.053117][T12709] ? do_raw_spin_unlock+0x49/0x260 [ 181.058201][T12709] copy_tree+0x4fc/0xd60 [ 181.062416][T12709] ? __do_loopback+0x1a3/0x370 [ 181.067153][T12709] __do_loopback+0x1a3/0x370 [ 181.071717][T12709] do_mount+0xe0d/0x2490 [ 181.075935][T12709] ksys_mount+0xcc/0x100 [ 181.080152][T12709] __x64_sys_mount+0xbf/0xd0 [ 181.084714][T12709] do_syscall_64+0xfe/0x140 [ 181.089191][T12709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.095054][T12709] RIP: 0033:0x459829 [ 181.098920][T12709] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.118499][T12709] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 181.126878][T12709] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 181.134823][T12709] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 02:04:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:53 executing program 4 (fault-call:8 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x82000, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 181.142769][T12709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.150714][T12709] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 181.158659][T12709] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x100000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:53 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585607, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 181.324133][T12744] FAULT_INJECTION: forcing a failure. [ 181.324133][T12744] name failslab, interval 1, probability 0, space 0, times 0 [ 181.367454][T12744] CPU: 1 PID: 12744 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 181.375471][T12744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.385515][T12744] Call Trace: [ 181.388790][T12744] dump_stack+0x1d8/0x2f8 [ 181.393103][T12744] should_fail+0x555/0x770 [ 181.397504][T12744] __should_failslab+0x11a/0x160 [ 181.402417][T12744] ? alloc_vfsmnt+0xaa/0x470 [ 181.406982][T12744] should_failslab+0x9/0x20 [ 181.411463][T12744] __kmalloc_track_caller+0x79/0x340 [ 181.416720][T12744] kstrdup_const+0x55/0x90 [ 181.421110][T12744] alloc_vfsmnt+0xaa/0x470 [ 181.425499][T12744] clone_mnt+0x6b/0xbc0 [ 181.429633][T12744] ? do_raw_spin_unlock+0x49/0x260 [ 181.434717][T12744] copy_tree+0x4fc/0xd60 [ 181.438933][T12744] ? __do_loopback+0x1a3/0x370 [ 181.443674][T12744] __do_loopback+0x1a3/0x370 [ 181.448240][T12744] do_mount+0xe0d/0x2490 [ 181.452458][T12744] ksys_mount+0xcc/0x100 [ 181.456671][T12744] __x64_sys_mount+0xbf/0xd0 [ 181.461239][T12744] do_syscall_64+0xfe/0x140 [ 181.465715][T12744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.471579][T12744] RIP: 0033:0x459829 [ 181.475450][T12744] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.495027][T12744] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 181.503407][T12744] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 02:04:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x200000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 181.511350][T12744] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 181.519291][T12744] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.527238][T12744] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 181.535194][T12744] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:53 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585608, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:53 executing program 4 (fault-call:8 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x400000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="0000c66b0300000f00"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:54 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560a, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x500000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f00000000c0)={{0xa7d81ee8447e1357, @name="39f00448ad3d55a9d5f935d307ea3d3245d8062b0da4eaaedb5b904866bccdbc"}, 0x8, 0x5, 0x200}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) [ 181.758375][T12787] FAULT_INJECTION: forcing a failure. [ 181.758375][T12787] name failslab, interval 1, probability 0, space 0, times 0 [ 181.832399][T12787] CPU: 0 PID: 12787 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 181.840412][T12787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.850471][T12787] Call Trace: [ 181.853763][T12787] dump_stack+0x1d8/0x2f8 [ 181.858101][T12787] should_fail+0x555/0x770 [ 181.862524][T12787] __should_failslab+0x11a/0x160 [ 181.867464][T12787] ? alloc_vfsmnt+0x27/0x470 [ 181.872044][T12787] should_failslab+0x9/0x20 [ 181.876529][T12787] kmem_cache_alloc+0x56/0x2e0 [ 181.881290][T12787] alloc_vfsmnt+0x27/0x470 [ 181.885707][T12787] clone_mnt+0x6b/0xbc0 [ 181.889847][T12787] ? do_raw_spin_unlock+0x49/0x260 [ 181.894940][T12787] copy_tree+0x4fc/0xd60 [ 181.899157][T12787] ? __do_loopback+0x1a3/0x370 [ 181.903898][T12787] __do_loopback+0x1a3/0x370 [ 181.908464][T12787] do_mount+0xe0d/0x2490 [ 181.912686][T12787] ksys_mount+0xcc/0x100 [ 181.916901][T12787] __x64_sys_mount+0xbf/0xd0 [ 181.921472][T12787] do_syscall_64+0xfe/0x140 [ 181.925947][T12787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.931810][T12787] RIP: 0033:0x459829 [ 181.935679][T12787] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.955258][T12787] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 181.963640][T12787] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 181.971584][T12787] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 02:04:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 181.979527][T12787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.987470][T12787] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 181.995413][T12787] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:54 executing program 4 (fault-call:8 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x600000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:54 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560b, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:54 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0xb, 0xff, 0xa, 0xd, 0x0, 0x70bd29, 0x25dfdbfb, [@sadb_spirange={0x2, 0x10, 0x4d3, 0x4d6}, @sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@ipv4={[], [], @rand_addr=0x3}, 0x10, 0x10, 0x4}, @sadb_sa={0x2, 0x1, 0x4d4, 0x8, 0x5, 0x5e, 0x3}, @sadb_ident={0x2, 0xa, 0x5, 0x0, 0xfffffffffffff800}]}, 0x68}}, 0x44000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) getpgrp(r2) r3 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x75d2e2c229502fdb, &(0x7f0000000200)={0x2, 0x2, 0x4, 0x6, r3}) r4 = socket$kcm(0x2, 0x3924678135ab424f, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000070000000000fa02006ed9001355f5bd00"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r6 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r6, r5}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)) timerfd_create(0x6, 0x800) 02:04:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xa00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 182.183259][T12828] FAULT_INJECTION: forcing a failure. [ 182.183259][T12828] name failslab, interval 1, probability 0, space 0, times 0 [ 182.210220][T12828] CPU: 0 PID: 12828 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 182.218230][T12828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.228289][T12828] Call Trace: [ 182.231586][T12828] dump_stack+0x1d8/0x2f8 [ 182.235925][T12828] should_fail+0x555/0x770 [ 182.240349][T12828] __should_failslab+0x11a/0x160 [ 182.245288][T12828] ? alloc_vfsmnt+0x27/0x470 [ 182.249885][T12828] should_failslab+0x9/0x20 [ 182.254390][T12828] kmem_cache_alloc+0x56/0x2e0 [ 182.259162][T12828] alloc_vfsmnt+0x27/0x470 [ 182.263581][T12828] clone_mnt+0x6b/0xbc0 [ 182.267747][T12828] ? do_raw_spin_unlock+0x49/0x260 [ 182.272854][T12828] copy_tree+0x4fc/0xd60 [ 182.277085][T12828] ? __do_loopback+0x1a3/0x370 [ 182.281846][T12828] __do_loopback+0x1a3/0x370 [ 182.286438][T12828] do_mount+0xe0d/0x2490 [ 182.290684][T12828] ksys_mount+0xcc/0x100 [ 182.294925][T12828] __x64_sys_mount+0xbf/0xd0 [ 182.299513][T12828] do_syscall_64+0xfe/0x140 [ 182.304015][T12828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.309898][T12828] RIP: 0033:0x459829 [ 182.313788][T12828] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xf00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x1000000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x2101000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x4000000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 182.333392][T12828] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 182.341801][T12828] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 182.349772][T12828] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 182.357764][T12828] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.365713][T12828] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 182.373795][T12828] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:54 executing program 4 (fault-call:8 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x6000000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:54 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560c, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:54 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00007d9fc8)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0x50, 0x21, 0x411, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1}}}, 0x50}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x401, @local}, {0xa, 0x4e24, 0xd6, @local, 0x3}, 0x6, [0x2, 0x100000000, 0xffffffff, 0x3, 0x4, 0x26c2, 0xff5, 0x1]}, 0x5c) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) 02:04:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 02:04:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x6558000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:54 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x34d, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x4, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 182.531011][T12891] FAULT_INJECTION: forcing a failure. [ 182.531011][T12891] name failslab, interval 1, probability 0, space 0, times 0 [ 182.587530][T12891] CPU: 1 PID: 12891 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 182.595544][T12891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.605596][T12891] Call Trace: [ 182.608884][T12891] dump_stack+0x1d8/0x2f8 [ 182.613213][T12891] should_fail+0x555/0x770 [ 182.617627][T12891] __should_failslab+0x11a/0x160 [ 182.622561][T12891] ? alloc_vfsmnt+0x27/0x470 [ 182.627169][T12891] should_failslab+0x9/0x20 [ 182.631679][T12891] kmem_cache_alloc+0x56/0x2e0 [ 182.636454][T12891] alloc_vfsmnt+0x27/0x470 [ 182.640867][T12891] clone_mnt+0x6b/0xbc0 [ 182.645017][T12891] ? trace_lock_release+0x135/0x1a0 [ 182.650203][T12891] ? ida_alloc_range+0x7a4/0x960 [ 182.650214][T12891] copy_tree+0x128/0xd60 [ 182.650221][T12891] ? ida_alloc_range+0x88f/0x960 [ 182.650229][T12891] ? trace_kfree+0xa0/0x110 [ 182.650236][T12891] ? ida_alloc_range+0x88f/0x960 [ 182.650246][T12891] propagate_one+0x2d5/0x620 [ 182.650253][T12891] ? get_mountpoint+0x1dd/0x420 [ 182.650261][T12891] propagate_mnt+0xcd/0x8d0 02:04:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:54 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560d, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 182.650272][T12891] attach_recursive_mnt+0x7ef/0x1e50 [ 182.650286][T12891] do_mount+0x188f/0x2490 [ 182.650297][T12891] ksys_mount+0xcc/0x100 [ 182.650306][T12891] __x64_sys_mount+0xbf/0xd0 [ 182.650316][T12891] do_syscall_64+0xfe/0x140 [ 182.650326][T12891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.650337][T12891] RIP: 0033:0x459829 [ 182.673769][T12891] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.673774][T12891] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 182.748722][T12891] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 182.756686][T12891] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 182.764651][T12891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.772602][T12891] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 182.772607][T12891] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:55 executing program 4 (fault-call:8 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:55 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560e, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:55 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) 02:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8000000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 02:04:55 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560f, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8100000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:55 executing program 5: r0 = socket$kcm(0x2, 0x26, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8847000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 182.998543][T12953] FAULT_INJECTION: forcing a failure. [ 182.998543][T12953] name failslab, interval 1, probability 0, space 0, times 0 [ 183.025572][T12953] CPU: 1 PID: 12953 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 183.033572][T12953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.043609][T12953] Call Trace: [ 183.043625][T12953] dump_stack+0x1d8/0x2f8 [ 183.043638][T12953] should_fail+0x555/0x770 [ 183.043650][T12953] __should_failslab+0x11a/0x160 [ 183.043660][T12953] ? alloc_vfsmnt+0xaa/0x470 [ 183.043670][T12953] should_failslab+0x9/0x20 [ 183.043679][T12953] __kmalloc_track_caller+0x79/0x340 [ 183.043694][T12953] kstrdup_const+0x55/0x90 [ 183.043706][T12953] alloc_vfsmnt+0xaa/0x470 [ 183.083644][T12953] clone_mnt+0x6b/0xbc0 [ 183.087781][T12953] ? trace_lock_release+0x135/0x1a0 [ 183.092952][T12953] ? ida_alloc_range+0x7a4/0x960 [ 183.097863][T12953] copy_tree+0x128/0xd60 [ 183.102083][T12953] ? ida_alloc_range+0x88f/0x960 [ 183.106990][T12953] ? trace_kfree+0xa0/0x110 [ 183.111463][T12953] ? ida_alloc_range+0x88f/0x960 [ 183.116375][T12953] propagate_one+0x2d5/0x620 [ 183.120937][T12953] ? get_mountpoint+0x1dd/0x420 [ 183.125760][T12953] propagate_mnt+0xcd/0x8d0 [ 183.130235][T12953] attach_recursive_mnt+0x7ef/0x1e50 [ 183.135495][T12953] do_mount+0x188f/0x2490 [ 183.139814][T12953] ksys_mount+0xcc/0x100 [ 183.144031][T12953] __x64_sys_mount+0xbf/0xd0 [ 183.148596][T12953] do_syscall_64+0xfe/0x140 [ 183.153070][T12953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.158939][T12953] RIP: 0033:0x459829 [ 183.162807][T12953] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.182384][T12953] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 183.190768][T12953] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 02:04:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 183.198714][T12953] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 183.206659][T12953] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 183.214606][T12953] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 183.222551][T12953] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 183.232881][T12940] vivid-006: kernel_thread() failed 02:04:55 executing program 4 (fault-call:8 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:55 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585610, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x8848000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:55 executing program 5: syz_init_net_socket$llc(0x1a, 0x3, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000595000200000000008633db09eb576f36759f6620763af690f7b3a000080000e34a3c56fe7b3cbcd3a10cdcb038d8b075d3eff42d085216a789c014aa82416a00ed0e7e5ca063f0f1066837aaac86df5221edaff3929458ac31bb67226ba7082d0efc9bfde55f816de9169d7e36aa84213d738d64a7fb84e0aed4a49d8f29431b4225f5243cf601d590e5a42e6477d23ecf4a9e0c24c331d716f02b8206d7aeaed621598cb8f414ae64d3dc469ce709a84dd135814d3e91340b60323d3e367f0175cda348b026619715cf521d2c9d462f6c751ad3e06018ba5c918d5b6ea3be2a6c234fbf89348b6261b5731ccfe08452f21d9e16f7c9d10eca29ac1ab3fca224f83a9c6408f5bd4e0843efb502729fe6a15f9cbd4c94521c7933fb1b3f98fa3aa821bfee461dee20c9433bfe428ea5d7f428767ffc2f7442cc48088da8a17d2aa5ebbe323a45ce8a40"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100000000, 0x20000) ioctl$TIOCSIG(r3, 0x40045436, 0x1b) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000200)=0x776e) sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc0000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r4, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 02:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x88a8ffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:55 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 183.391262][T12974] FAULT_INJECTION: forcing a failure. [ 183.391262][T12974] name failslab, interval 1, probability 0, space 0, times 0 02:04:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 183.483682][T12974] CPU: 0 PID: 12974 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 183.491812][T12974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.501867][T12974] Call Trace: [ 183.505163][T12974] dump_stack+0x1d8/0x2f8 [ 183.509500][T12974] should_fail+0x555/0x770 [ 183.513921][T12974] __should_failslab+0x11a/0x160 [ 183.518863][T12974] ? alloc_vfsmnt+0x27/0x470 [ 183.523457][T12974] should_failslab+0x9/0x20 [ 183.527961][T12974] kmem_cache_alloc+0x56/0x2e0 [ 183.532721][T12974] ? rcu_lock_release+0x9/0x30 [ 183.537466][T12974] alloc_vfsmnt+0x27/0x470 [ 183.541862][T12974] clone_mnt+0x6b/0xbc0 [ 183.545990][T12974] ? rcu_lock_release+0x26/0x30 [ 183.550815][T12974] copy_tree+0x4fc/0xd60 [ 183.555045][T12974] ? ida_alloc_range+0x88f/0x960 [ 183.559956][T12974] propagate_one+0x2d5/0x620 [ 183.564515][T12974] ? get_mountpoint+0x1dd/0x420 [ 183.569337][T12974] propagate_mnt+0xcd/0x8d0 [ 183.573816][T12974] attach_recursive_mnt+0x7ef/0x1e50 [ 183.579084][T12974] do_mount+0x188f/0x2490 [ 183.583387][T12974] ksys_mount+0xcc/0x100 [ 183.587601][T12974] __x64_sys_mount+0xbf/0xd0 [ 183.592167][T12974] do_syscall_64+0xfe/0x140 [ 183.596643][T12974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.602506][T12974] RIP: 0033:0x459829 [ 183.606377][T12974] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.625953][T12974] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:55 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585612, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x9effffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 183.634335][T12974] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 183.642280][T12974] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 183.650222][T12974] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 183.658165][T12974] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 183.667581][T12974] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:56 executing program 4 (fault-call:8 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:56 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc058565d, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:56 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x22002) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xac, r4, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20004040}, 0x1) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000280)={'team_slave_1\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xc00e000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xefffffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:56 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585667, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 183.886440][T13030] FAULT_INJECTION: forcing a failure. [ 183.886440][T13030] name failslab, interval 1, probability 0, space 0, times 0 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 183.957521][T13030] CPU: 0 PID: 13030 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 183.965525][T13030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.975563][T13030] Call Trace: [ 183.975582][T13030] dump_stack+0x1d8/0x2f8 [ 183.975598][T13030] should_fail+0x555/0x770 [ 183.975610][T13030] __should_failslab+0x11a/0x160 [ 183.975621][T13030] ? alloc_vfsmnt+0x27/0x470 [ 183.975636][T13030] should_failslab+0x9/0x20 [ 184.001592][T13030] kmem_cache_alloc+0x56/0x2e0 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xf0ffffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 184.006351][T13030] alloc_vfsmnt+0x27/0x470 [ 184.010761][T13030] clone_mnt+0x6b/0xbc0 [ 184.014909][T13030] ? do_raw_spin_unlock+0x49/0x260 [ 184.020015][T13030] copy_tree+0x4fc/0xd60 [ 184.024248][T13030] ? propagate_one+0x2d5/0x620 [ 184.029005][T13030] propagate_one+0x2d5/0x620 [ 184.033587][T13030] ? get_mountpoint+0x1dd/0x420 [ 184.038426][T13030] propagate_mnt+0xcd/0x8d0 [ 184.042921][T13030] attach_recursive_mnt+0x7ef/0x1e50 [ 184.048202][T13030] do_mount+0x188f/0x2490 [ 184.048216][T13030] ksys_mount+0xcc/0x100 [ 184.048225][T13030] __x64_sys_mount+0xbf/0xd0 [ 184.048238][T13030] do_syscall_64+0xfe/0x140 [ 184.056765][T13030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.056773][T13030] RIP: 0033:0x459829 [ 184.056781][T13030] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.056789][T13030] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 184.103571][T13030] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 184.111541][T13030] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 184.119515][T13030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.127500][T13030] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 184.127505][T13030] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:56 executing program 4 (fault-call:8 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xffffff7f00000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:56 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f00000001c0)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2000000}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x10}, 0x70) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) 02:04:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:04:56 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0xffffffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:56 executing program 5: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/dsp\x00', 0x800, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x9, 0x4) open(&(0x7f0000000040)='./file0\x00', 0x80, 0x1) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000001600)=0xfaf8) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r1, r0}) 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 184.313282][T13096] FAULT_INJECTION: forcing a failure. [ 184.313282][T13096] name failslab, interval 1, probability 0, space 0, times 0 [ 184.348381][T13096] CPU: 1 PID: 13096 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 184.356386][T13096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.366433][T13096] Call Trace: [ 184.369719][T13096] dump_stack+0x1d8/0x2f8 [ 184.374035][T13096] should_fail+0x555/0x770 [ 184.378436][T13096] __should_failslab+0x11a/0x160 [ 184.383351][T13096] ? alloc_vfsmnt+0xaa/0x470 [ 184.387920][T13096] should_failslab+0x9/0x20 [ 184.392399][T13096] __kmalloc_track_caller+0x79/0x340 [ 184.397669][T13096] kstrdup_const+0x55/0x90 [ 184.402057][T13096] alloc_vfsmnt+0xaa/0x470 [ 184.406446][T13096] clone_mnt+0x6b/0xbc0 [ 184.410576][T13096] ? do_raw_spin_unlock+0x49/0x260 [ 184.415660][T13096] copy_tree+0x4fc/0xd60 [ 184.419873][T13096] ? propagate_one+0x2d5/0x620 [ 184.424608][T13096] propagate_one+0x2d5/0x620 [ 184.429181][T13096] ? get_mountpoint+0x1dd/0x420 [ 184.434007][T13096] propagate_mnt+0xcd/0x8d0 [ 184.438488][T13096] attach_recursive_mnt+0x7ef/0x1e50 [ 184.443752][T13096] do_mount+0x188f/0x2490 [ 184.448057][T13096] ksys_mount+0xcc/0x100 [ 184.452272][T13096] __x64_sys_mount+0xbf/0xd0 [ 184.456849][T13096] do_syscall_64+0xfe/0x140 [ 184.461328][T13096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.467192][T13096] RIP: 0033:0x459829 [ 184.471059][T13096] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.490637][T13096] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 184.499020][T13096] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 02:04:56 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 184.506967][T13096] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 184.514914][T13096] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 184.522860][T13096] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 184.530802][T13096] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:56 executing program 4 (fault-call:8 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:56 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:56 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1809000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:56 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:57 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x14, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x4514864db031ea00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) listen(r2, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) openat$cgroup_type(r3, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) [ 184.758071][T13132] FAULT_INJECTION: forcing a failure. [ 184.758071][T13132] name failslab, interval 1, probability 0, space 0, times 0 [ 184.792947][T13132] CPU: 1 PID: 13132 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 184.800945][T13132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.800948][T13132] Call Trace: [ 184.800965][T13132] dump_stack+0x1d8/0x2f8 [ 184.800980][T13132] should_fail+0x555/0x770 [ 184.800993][T13132] __should_failslab+0x11a/0x160 [ 184.801006][T13132] ? alloc_vfsmnt+0x27/0x470 [ 184.801019][T13132] should_failslab+0x9/0x20 [ 184.801030][T13132] kmem_cache_alloc+0x56/0x2e0 [ 184.801041][T13132] alloc_vfsmnt+0x27/0x470 [ 184.801051][T13132] clone_mnt+0x6b/0xbc0 [ 184.801064][T13132] ? do_raw_spin_unlock+0x49/0x260 02:04:57 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000950002feff0000001f1bd2cd66cc437ad2347ec51a8535b27a5656b7b5949c747a"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000240), 0x10}, 0x70) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x80) ioctl$KDDISABIO(r0, 0x4b37) r3 = inotify_add_watch(r2, &(0x7f00000001c0)='./file0\x00', 0x10000400) inotify_rm_watch(r0, r3) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4c326032374ee3c5, 0x0) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000100)={0x3, 0x100, 0x2, {0x7, 0x1ff, 0x5, 0x5}}) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r0, r1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x11, r5, 0x8000000) 02:04:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:57 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 184.801074][T13132] copy_tree+0x4fc/0xd60 [ 184.801086][T13132] ? propagate_one+0x2d5/0x620 [ 184.837555][T13132] propagate_one+0x2d5/0x620 [ 184.837564][T13132] ? get_mountpoint+0x1dd/0x420 [ 184.837572][T13132] propagate_mnt+0xcd/0x8d0 [ 184.837584][T13132] attach_recursive_mnt+0x7ef/0x1e50 [ 184.846723][T13132] do_mount+0x188f/0x2490 [ 184.860163][T13132] ksys_mount+0xcc/0x100 [ 184.869460][T13132] __x64_sys_mount+0xbf/0xd0 [ 184.869471][T13132] do_syscall_64+0xfe/0x140 [ 184.869483][T13132] entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 184.869491][T13132] RIP: 0033:0x459829 [ 184.869500][T13132] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.869505][T13132] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 184.869513][T13132] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 184.869518][T13132] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 02:04:57 executing program 4 (fault-call:8 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 184.869522][T13132] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.869527][T13132] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 184.869531][T13132] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 184.931500][T13146] vivid-006: kernel_thread() failed 02:04:57 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:57 executing program 5: r0 = socket$kcm(0x2, 0x26, 0x0) unshare(0x2000c00) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x29fd, 0x40) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x10000008}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) socket$kcm(0x29, 0x5, 0x0) 02:04:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x3, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 185.098447][T13174] FAULT_INJECTION: forcing a failure. [ 185.098447][T13174] name failslab, interval 1, probability 0, space 0, times 0 [ 185.159932][T13174] CPU: 1 PID: 13174 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 185.167939][T13174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.177985][T13174] Call Trace: [ 185.181269][T13174] dump_stack+0x1d8/0x2f8 [ 185.185594][T13174] should_fail+0x555/0x770 [ 185.190005][T13174] __should_failslab+0x11a/0x160 [ 185.194937][T13174] ? alloc_vfsmnt+0x27/0x470 [ 185.199524][T13174] should_failslab+0x9/0x20 [ 185.204027][T13174] kmem_cache_alloc+0x56/0x2e0 [ 185.208791][T13174] alloc_vfsmnt+0x27/0x470 [ 185.213198][T13174] clone_mnt+0x6b/0xbc0 [ 185.217344][T13174] ? do_raw_spin_unlock+0x49/0x260 [ 185.222455][T13174] copy_tree+0x4fc/0xd60 [ 185.226680][T13174] ? propagate_one+0x2d5/0x620 [ 185.231419][T13174] propagate_one+0x2d5/0x620 [ 185.235982][T13174] ? get_mountpoint+0x1dd/0x420 [ 185.240801][T13174] propagate_mnt+0xcd/0x8d0 [ 185.245285][T13174] attach_recursive_mnt+0x7ef/0x1e50 [ 185.250546][T13174] do_mount+0x188f/0x2490 [ 185.254850][T13174] ksys_mount+0xcc/0x100 02:04:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x4, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 185.259066][T13174] __x64_sys_mount+0xbf/0xd0 [ 185.263627][T13174] do_syscall_64+0xfe/0x140 [ 185.268112][T13174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.273981][T13174] RIP: 0033:0x459829 [ 185.277852][T13174] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.297438][T13174] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:57 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x2, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 185.297446][T13174] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 185.297451][T13174] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 185.297456][T13174] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.297460][T13174] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 185.297465][T13174] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:57 executing program 4 (fault-call:8 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:57 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x5, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:57 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4000000}, 0x10}, 0x70) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) finit_module(r1, &(0x7f0000000040)='GPL\x00', 0x2) 02:04:57 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:57 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000e8e8b3302330157cad1352c2941a492947dfe41b706bb91749e95b8669d0015bf91d980f215c5530c46dad9fb10498320a28957c2673d96a93fd65282277cb99db60c69582848b396a64b37b0c50809ef4a96da8f404a731eadd3c9ce0d44269985b9f619c67dd41b1abaa7421d56dd27e3a9b82d537cb24b213f4522ecccc8246275056b918c1772c661ff7"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x6, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 185.555201][T13225] FAULT_INJECTION: forcing a failure. [ 185.555201][T13225] name failslab, interval 1, probability 0, space 0, times 0 02:04:57 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 185.636373][T13225] CPU: 0 PID: 13225 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 185.644470][T13225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.654505][T13225] Call Trace: [ 185.654521][T13225] dump_stack+0x1d8/0x2f8 [ 185.654537][T13225] should_fail+0x555/0x770 [ 185.654548][T13225] __should_failslab+0x11a/0x160 [ 185.654562][T13225] ? alloc_vfsmnt+0x27/0x470 [ 185.677463][T13225] should_failslab+0x9/0x20 [ 185.681942][T13225] kmem_cache_alloc+0x56/0x2e0 [ 185.686680][T13225] alloc_vfsmnt+0x27/0x470 [ 185.691068][T13225] clone_mnt+0x6b/0xbc0 [ 185.697976][T13225] ? do_raw_spin_unlock+0x49/0x260 [ 185.703058][T13225] copy_tree+0x4fc/0xd60 [ 185.707311][T13225] ? propagate_one+0x2d5/0x620 [ 185.712055][T13225] propagate_one+0x2d5/0x620 [ 185.716614][T13225] ? get_mountpoint+0x1dd/0x420 [ 185.721444][T13225] propagate_mnt+0xcd/0x8d0 [ 185.725920][T13225] attach_recursive_mnt+0x7ef/0x1e50 [ 185.731181][T13225] do_mount+0x188f/0x2490 [ 185.735487][T13225] ksys_mount+0xcc/0x100 [ 185.739703][T13225] __x64_sys_mount+0xbf/0xd0 [ 185.744276][T13225] do_syscall_64+0xfe/0x140 [ 185.748753][T13225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.754639][T13225] RIP: 0033:0x459829 [ 185.758509][T13225] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.778084][T13225] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 185.786492][T13225] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 185.794445][T13225] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 185.802391][T13225] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.810345][T13225] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 185.818289][T13225] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:58 executing program 4 (fault-call:8 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:58 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x7, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 5: r0 = socket$kcm(0x2, 0x7, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0xdcddf279f68243a9, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r4 = dup(r1) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x9, 0x8425, 0x7f, 0x6, 0x0, 0xa69d, 0x32, 0x4fc467e8d99f2a7f, 0x400, 0xff, 0x3f, 0x8001, 0x202000000000, 0x100000000, 0x4, 0x40, 0x81, 0x1, 0x1, 0x3, 0xfd0, 0x7f, 0x1, 0x3, 0x3, 0x2, 0x6, 0x8, 0x6, 0x609d, 0x2213, 0x1, 0x81, 0x1, 0x9, 0x81, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000140), 0xd}, 0x800, 0x7, 0xfffffffffffffffd, 0x8, 0x6, 0x1, 0x2}, r3, 0x9, r4, 0xdbfd01fa793b704b) 02:04:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:58 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x8, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 186.056679][T13277] FAULT_INJECTION: forcing a failure. [ 186.056679][T13277] name failslab, interval 1, probability 0, space 0, times 0 [ 186.109556][T13277] CPU: 1 PID: 13277 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 186.117562][T13277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.127611][T13277] Call Trace: [ 186.130899][T13277] dump_stack+0x1d8/0x2f8 [ 186.135243][T13277] should_fail+0x555/0x770 [ 186.139670][T13277] __should_failslab+0x11a/0x160 [ 186.144606][T13277] ? alloc_vfsmnt+0x27/0x470 [ 186.149190][T13277] should_failslab+0x9/0x20 [ 186.153691][T13277] kmem_cache_alloc+0x56/0x2e0 02:04:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 186.158469][T13277] alloc_vfsmnt+0x27/0x470 [ 186.162886][T13277] clone_mnt+0x6b/0xbc0 [ 186.167040][T13277] ? do_raw_spin_unlock+0x49/0x260 [ 186.172144][T13277] copy_tree+0x4fc/0xd60 [ 186.176378][T13277] ? propagate_one+0x2d5/0x620 [ 186.181139][T13277] propagate_one+0x2d5/0x620 [ 186.185718][T13277] ? get_mountpoint+0x1dd/0x420 [ 186.190559][T13277] propagate_mnt+0xcd/0x8d0 [ 186.195045][T13277] attach_recursive_mnt+0x7ef/0x1e50 [ 186.200315][T13277] do_mount+0x188f/0x2490 [ 186.200328][T13277] ksys_mount+0xcc/0x100 [ 186.200336][T13277] __x64_sys_mount+0xbf/0xd0 [ 186.200347][T13277] do_syscall_64+0xfe/0x140 [ 186.200358][T13277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.200365][T13277] RIP: 0033:0x459829 [ 186.200373][T13277] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.200382][T13277] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:58 executing program 4 (fault-call:8 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:58 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x9, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) r9 = getgid() getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000600)={{}, {0x1, 0x1}, [{0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}], {0x4, 0x2}, [{0x8, 0x7, r6}, {0x8, 0x4, r7}, {0x8, 0x4, r8}, {0x8, 0x2, r9}, {0x8, 0x6, r10}], {0x10, 0x5}, {0x20, 0x4}}, 0x64, 0x1) [ 186.208899][T13277] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 186.208906][T13277] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 186.208911][T13277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.208916][T13277] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 186.208921][T13277] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:58 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:58 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:58 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r3, 0x80045301, &(0x7f0000000080)) 02:04:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xa, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 186.443914][T13329] FAULT_INJECTION: forcing a failure. [ 186.443914][T13329] name failslab, interval 1, probability 0, space 0, times 0 [ 186.528941][T13329] CPU: 1 PID: 13329 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 186.536946][T13329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.546995][T13329] Call Trace: [ 186.550283][T13329] dump_stack+0x1d8/0x2f8 [ 186.554615][T13329] should_fail+0x555/0x770 [ 186.559029][T13329] __should_failslab+0x11a/0x160 [ 186.563964][T13329] ? alloc_vfsmnt+0xaa/0x470 [ 186.568551][T13329] should_failslab+0x9/0x20 [ 186.573049][T13329] __kmalloc_track_caller+0x79/0x340 [ 186.578355][T13329] kstrdup_const+0x55/0x90 [ 186.582762][T13329] alloc_vfsmnt+0xaa/0x470 [ 186.587180][T13329] clone_mnt+0x6b/0xbc0 [ 186.591315][T13329] ? do_raw_spin_unlock+0x49/0x260 [ 186.596404][T13329] copy_tree+0x4fc/0xd60 [ 186.600619][T13329] ? propagate_one+0x2d5/0x620 [ 186.605359][T13329] propagate_one+0x2d5/0x620 [ 186.609917][T13329] ? get_mountpoint+0x1dd/0x420 [ 186.614738][T13329] propagate_mnt+0xcd/0x8d0 [ 186.619215][T13329] attach_recursive_mnt+0x7ef/0x1e50 [ 186.624476][T13329] do_mount+0x188f/0x2490 [ 186.628784][T13329] ksys_mount+0xcc/0x100 [ 186.632999][T13329] __x64_sys_mount+0xbf/0xd0 [ 186.637567][T13329] do_syscall_64+0xfe/0x140 [ 186.642044][T13329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.647909][T13329] RIP: 0033:0x459829 [ 186.651789][T13329] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.671371][T13329] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:59 executing program 4 (fault-call:8 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 186.679754][T13329] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 186.687701][T13329] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 186.695730][T13329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.703676][T13329] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 186.711621][T13329] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:59 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x101000) write$binfmt_aout(r3, &(0x7f00000003c0)={{0x10b, 0x100000001, 0xfffffffffffffffe, 0x361, 0x2e0, 0x4, 0x398, 0x8}, "87521dbf3d71e8bc109110b87ffa97b70fa5afbb851269251d8c9da6d5ee11dbf4418057bd3f4cea6c604a8355f1d73b93565c09bf33e056508274c2f911de79aa8b012a2dabd04a31a5c062523584d84e4373ea22d9963a501d483ecbceae120eef9042ca0580eae03998f4fb211c8127dd84c2d7322cee87e1b75ef0a7ea7eec12eb9cf6ad2c8d99d5cad11baae30104fe7985ce0eb75d4d2c0f150457896b9b8442c0580b2d99907f", [[], [], []]}, 0x3ca) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000080)) write$cgroup_int(r3, &(0x7f00000000c0)=0x4, 0x12) 02:04:59 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xb, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800001da3dfce44542f66c35e293eb70e2b0000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 186.878935][T13370] FAULT_INJECTION: forcing a failure. [ 186.878935][T13370] name failslab, interval 1, probability 0, space 0, times 0 02:04:59 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xc, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 186.955753][T13370] CPU: 1 PID: 13370 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 186.963765][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.973800][T13370] Call Trace: [ 186.973816][T13370] dump_stack+0x1d8/0x2f8 [ 186.973830][T13370] should_fail+0x555/0x770 [ 186.973844][T13370] __should_failslab+0x11a/0x160 [ 186.973855][T13370] ? alloc_vfsmnt+0x27/0x470 [ 186.973864][T13370] should_failslab+0x9/0x20 [ 186.973872][T13370] kmem_cache_alloc+0x56/0x2e0 [ 186.973885][T13370] alloc_vfsmnt+0x27/0x470 [ 186.999813][T13370] clone_mnt+0x6b/0xbc0 [ 186.999827][T13370] ? do_raw_spin_unlock+0x49/0x260 [ 186.999838][T13370] copy_tree+0x4fc/0xd60 [ 187.008966][T13370] ? propagate_one+0x2d5/0x620 [ 187.008980][T13370] propagate_one+0x2d5/0x620 [ 187.008986][T13370] ? get_mountpoint+0x1dd/0x420 [ 187.008994][T13370] propagate_mnt+0xcd/0x8d0 [ 187.009005][T13370] attach_recursive_mnt+0x7ef/0x1e50 [ 187.009019][T13370] do_mount+0x188f/0x2490 [ 187.009031][T13370] ksys_mount+0xcc/0x100 [ 187.009039][T13370] __x64_sys_mount+0xbf/0xd0 [ 187.009049][T13370] do_syscall_64+0xfe/0x140 [ 187.009061][T13370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.009072][T13370] RIP: 0033:0x459829 [ 187.073656][T13370] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.093242][T13370] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:04:59 executing program 4 (fault-call:8 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:59 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xd, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000000, 0x4, 0x800) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000080)={0x100000000000000, 0x3000, 0x8000, 0x0, 0x1d}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000009f3d06b20562829000000000a675b9748b3b6f0168d3459ff7e527f07c379112e7a197e8556ee70268a1c7fcafbb639b591a34"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) 02:04:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 187.101634][T13370] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 187.109592][T13370] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 187.117550][T13370] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.125514][T13370] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 187.133475][T13370] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 187.217213][T13417] mmap: syz-executor.5 (13417) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:04:59 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x10000) getsockname$netrom(r3, &(0x7f0000000080)={{0x3, @netrom}, [@default, @default, @null, @remote, @bcast, @netrom, @null, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xe, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 187.301893][T13433] FAULT_INJECTION: forcing a failure. [ 187.301893][T13433] name failslab, interval 1, probability 0, space 0, times 0 02:04:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 187.380876][T13433] CPU: 0 PID: 13433 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 187.388877][T13433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.398917][T13433] Call Trace: [ 187.402190][T13433] dump_stack+0x1d8/0x2f8 [ 187.406503][T13433] should_fail+0x555/0x770 [ 187.410898][T13433] __should_failslab+0x11a/0x160 [ 187.415811][T13433] ? alloc_vfsmnt+0x27/0x470 [ 187.420376][T13433] should_failslab+0x9/0x20 [ 187.424851][T13433] kmem_cache_alloc+0x56/0x2e0 [ 187.429587][T13433] alloc_vfsmnt+0x27/0x470 [ 187.433974][T13433] clone_mnt+0x6b/0xbc0 [ 187.438104][T13433] ? do_raw_spin_unlock+0x49/0x260 [ 187.443185][T13433] copy_tree+0x4fc/0xd60 [ 187.447401][T13433] ? propagate_one+0x2d5/0x620 [ 187.452148][T13433] propagate_one+0x2d5/0x620 [ 187.456706][T13433] ? get_mountpoint+0x1dd/0x420 [ 187.461528][T13433] propagate_mnt+0xcd/0x8d0 [ 187.466006][T13433] attach_recursive_mnt+0x7ef/0x1e50 [ 187.471265][T13433] do_mount+0x188f/0x2490 [ 187.475570][T13433] ksys_mount+0xcc/0x100 [ 187.479784][T13433] __x64_sys_mount+0xbf/0xd0 [ 187.484351][T13433] do_syscall_64+0xfe/0x140 [ 187.488828][T13433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.494693][T13433] RIP: 0033:0x459829 [ 187.498563][T13433] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.518139][T13433] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 187.526521][T13433] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 [ 187.534467][T13433] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 187.542422][T13433] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 187.550366][T13433] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 187.558307][T13433] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:04:59 executing program 4 (fault-call:8 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:59 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x10, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:04:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:04:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:04:59 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="000095c38b00000000010000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x11, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 187.733427][T13467] FAULT_INJECTION: forcing a failure. [ 187.733427][T13467] name failslab, interval 1, probability 0, space 0, times 0 02:05:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 187.808124][T13467] CPU: 1 PID: 13467 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 187.816132][T13467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.826183][T13467] Call Trace: [ 187.829467][T13467] dump_stack+0x1d8/0x2f8 [ 187.833794][T13467] should_fail+0x555/0x770 [ 187.838208][T13467] __should_failslab+0x11a/0x160 [ 187.843138][T13467] ? alloc_vfsmnt+0x27/0x470 [ 187.847727][T13467] should_failslab+0x9/0x20 [ 187.852236][T13467] kmem_cache_alloc+0x56/0x2e0 [ 187.856991][T13467] alloc_vfsmnt+0x27/0x470 [ 187.861390][T13467] clone_mnt+0x6b/0xbc0 [ 187.865526][T13467] ? do_raw_spin_unlock+0x49/0x260 [ 187.870615][T13467] copy_tree+0x128/0xd60 [ 187.874832][T13467] ? propagate_one+0x2d5/0x620 [ 187.879572][T13467] ? count_mounts+0x1ab/0x230 [ 187.884219][T13467] propagate_one+0x2d5/0x620 [ 187.888782][T13467] ? get_mountpoint+0x1dd/0x420 [ 187.893605][T13467] propagate_mnt+0xcd/0x8d0 [ 187.898084][T13467] attach_recursive_mnt+0x7ef/0x1e50 [ 187.903348][T13467] do_mount+0x188f/0x2490 [ 187.907654][T13467] ksys_mount+0xcc/0x100 [ 187.911868][T13467] __x64_sys_mount+0xbf/0xd0 [ 187.916430][T13467] do_syscall_64+0xfe/0x140 [ 187.920907][T13467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.926770][T13467] RIP: 0033:0x459829 [ 187.930638][T13467] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.950214][T13467] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:00 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000bc0)={0x200, 0x78f, 0xfffffffeffffffff, 0x4, 0xa0a7}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x800) r4 = dup3(r2, r1, 0x80000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000c00)=0x1) sendmsg$kcm(r0, &(0x7f0000000b80)={&(0x7f00000000c0)=@xdp={0x2c, 0x4, r3, 0x21}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)="ac5b9d85a25f85e7039e216fa245f1d5d4dae1166dce", 0x16}, {&(0x7f00000001c0)="b2cfeccd479ba3dd55c2d482ceb08ac4106529b4e6435db260686b68105bd10c3eb9d94d96e3c8bd88dea6f2be6399680e16fc6a29266f512c9be11fbceee5aec51471c5975126a2eedce2173f13ad33ecd402117f04ac3bd6ec7191e5760beacad4b70b9ee908ff02edbb51c6c7dd214de3d8a8e7eb886b8da776619243715a341ff032a6", 0x85}, {&(0x7f00000003c0)="98a654ff8ba50e06e660cb29299b51dadb1ce247463b9953b37ab4184de9460a8a2ca316120455cd12d6ff44c7f48d4271dc2e87f630704c20d94aafe53a900dcb4710dbc1d44a172937dcc6ef8676d7f0e974d1c57ca3e9384252113ad8eab3ccda555fd5cf58db8b2f233ac7db7864bc8e393208f03660b9c052b7b60c6f270353036178ec3d2e5a5bc1a855edce042e224171c5651a4ee9c80bcaf20367a049eeae311599543ce4830e09b45a41f2fb3fedd10ffad492c876c6903c89473f03708172b6aeaa28897ba026342f9b92aa", 0xd1}, {&(0x7f00000004c0)="a47a788bc8d9b6dee3ca6090757f5f08776fef7299208bdc6e1ec76053d7ece1794618e38ca8537e1ea05f14a7fda8df35d7e368405b106d693896f4732f8eaa6d72a777a8ad5c7be58c36aaf50ff99a1f50af1c884a57a5106d738a39d9c83d4863080700f95a9898aeaae5745f834e20bb2a3f1f0a4203ed08c029723a90ebe447d0caaaba6c7cf6ade06bdcb36dd837ed4197bc99314bb15ae32a44f7506208765495050525fc1c264c5094cb009b949db3c27e599088f13a6b1cb39b547fa0627ce48aaf2e87e73979d878d8eb5c326596ea1e4b38b839f0f52178300c09c625a8c442cbdf6b61cb06", 0xeb}, {&(0x7f00000005c0)="e24d57f7fe73b437180c81125e22211ade4ff1ac345df87649e7c1d80df0547eeb539c2e3f89f1f28e9d22407cc1f9e1e76f63487c2e2c726e21bf37dc4f3ffac9aa4412ae27f989127da48df28cb0881c65cd1a86a87db120a7bf8fdb84d15646cebd1ba6944caabfdc8092c80d9766a0de102b3b7af14055f68e186d7677f52b", 0x81}, {&(0x7f0000000280)="8556ead8a242832019378cebc0159191155e5f103ce887fada58d0c6391c91f24db62a76e495", 0x26}, {&(0x7f0000000680)="bb88befbb413d141f41270b27e34f7646e57e70e63665d43666b044aecf0aa68be2cc252f7cc05ead49cc90976c282483664c4761654eb79a51c66761d0d5d106ac1eca9b0d9d64fce2c705d729024a3c2fccd90e1d91e0033f46506a746d92fc22bc8b3ea3d8e57b83307efce18f1396176247b563b2fda8fb8b91e9ed590dd3b1295f0b0b8b67c", 0x88}], 0x7, &(0x7f00000007c0)=[{0x20, 0x110, 0x43, "b78460b13a7c227c01"}, {0x110, 0x11f, 0x8, "d31378430f241ed855d65b2185ed5541ea4936a76e6e0289a2a6e1223d8cf66e174e009ed49a7c1cc3155578c04e64d6a4d51d0911fe3e57c0e2e335c03535caf5ed75fa56ba6f7ea6211eef4d875e71a78f3869f66487f1c9224ff27dca81581a05c3edc93e6915c2eca8829e48202557c66f654460c69de29a9b8fdd1db01073b2f7440adedeccf77f83abba70f4af5b5d24b5236088e36dcbeec9ed1d2ec5e19e1a6d0b685dbb0ecd744fe8b94c3098572db405391a6123ce922ac38d2c644887f150d611c48fe009830eecfdcaa41cb8b814653ee74105d74f685514fdf222164fa19a748bb4f67096aa59f7bbb1d823b17cc62c91a6ddee"}, {0xb8, 0x115, 0x5, "8d5aaeb6cc9b61650eee10da81eb8047d53b866d059a2de44c7604d8a9de1988bf9861fc9fabe323a21b1f7466d260cb2eca47089edcfaf2a5b8ba180e1bb78445039a11bbfb4ed56fe549529a9810731d7808db173d35fca3c0a3ce2d2ec235cdb5a02463725bea5c89e46a606946403dde0a9360a4db591ef99473af2a7d4cc5501c02082103b4d21cc8ddc5a204c855a31b1bc754f259db7b81aa11404dabdbe099"}, {0xf0, 0x0, 0x401, "b2df0f7f7c1bdcf00631e3a7d0c8b097f69b94200a830752cd37505786e023304d72c6eda01b3a526251ba72b074e0f807325e30ccb5054f63e8b92a42bdaeccf9651ecd0ad2fe451b1458a627879c8af723e5702c3338ecb71e45ca820d5bb8b1285bc0619d85e58c9ac785138c31bd1a5bd68ef5a50bdb2b0a205f0cf488619495b111951e7c4034c4e951c231726f89e52bdf05c32b1add24ca34e586f1b4355dfbe2c4b460c2e81bcb6c174325ae1053834196e030ee9957829015e5b976646aa43bb82ac60a537e28e9805382af6ae414d85b275776fa"}, {0xd8, 0x119, 0x7ff, "8f73c3eb043875085293d3b317ff1e101399c1e873e1a763daf351a079b7a13f678b0e3f4ba8d174d40533e89ca0a94de991dec89888d02bc8f51f77065cdff4e7a765a2ed5d156e079653d528927ca5cb6c12b9d50d0c2b6760cf3e1dbd55beb8af23d03d2dd5d759079f4de66670862bc6e0cbba6bfc12f35720f3b8ab291e8a8d56077fe1e1d3f6e656e3a901fe6d85f17d8e699a87c44fb7a8ea752ec0157536abe22a9360345cfe169eb03530269c4a15edd7df1de00d730a952106ac5870aba1"}], 0x3b0}, 0x20000000) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 187.958596][T13467] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 187.966541][T13467] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 187.974484][T13467] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.982430][T13467] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 187.990373][T13467] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:00 executing program 4 (fault-call:8 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:00 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x12, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:00 executing program 5: r0 = socket$kcm(0x2, 0x7, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xd, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x47}, [@generic={0xcf95, 0xdee, 0xfff, 0x7e28, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5}, @generic={0x7ff, 0xd7, 0x3, 0x401, 0x1ff}, @alu={0x7, 0x0, 0x3, 0x9, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @alu={0x7, 0x4, 0x1, 0x7, 0x5, 0x2, 0xfffffffffffffff0}, @map={0x18, 0xa, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x1a}, @ldst={0x3, 0x0, 0x7, 0x135dff35ef3c5f9b, 0x4, 0x80, 0x10}]}, &(0x7f0000000100)='GPL\x00', 0x9, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x1, [], r3, 0x3, r4, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x7, 0x10001}, 0x10}, 0x70) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 188.214187][T13519] FAULT_INJECTION: forcing a failure. [ 188.214187][T13519] name failslab, interval 1, probability 0, space 0, times 0 [ 188.253776][T13519] CPU: 0 PID: 13519 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 188.261785][T13519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.271843][T13519] Call Trace: [ 188.275144][T13519] dump_stack+0x1d8/0x2f8 [ 188.279474][T13519] should_fail+0x555/0x770 [ 188.283889][T13519] __should_failslab+0x11a/0x160 [ 188.288827][T13519] ? alloc_vfsmnt+0xaa/0x470 [ 188.293439][T13519] should_failslab+0x9/0x20 [ 188.297965][T13519] __kmalloc_track_caller+0x79/0x340 [ 188.303246][T13519] kstrdup_const+0x55/0x90 [ 188.307654][T13519] alloc_vfsmnt+0xaa/0x470 [ 188.312063][T13519] clone_mnt+0x6b/0xbc0 [ 188.316214][T13519] ? do_raw_spin_unlock+0x49/0x260 [ 188.321325][T13519] copy_tree+0x128/0xd60 [ 188.325557][T13519] ? propagate_one+0x2d5/0x620 [ 188.330319][T13519] ? count_mounts+0x1ab/0x230 [ 188.334993][T13519] propagate_one+0x2d5/0x620 [ 188.339571][T13519] ? get_mountpoint+0x1dd/0x420 [ 188.344413][T13519] propagate_mnt+0xcd/0x8d0 [ 188.348913][T13519] attach_recursive_mnt+0x7ef/0x1e50 [ 188.354202][T13519] do_mount+0x188f/0x2490 [ 188.358534][T13519] ksys_mount+0xcc/0x100 [ 188.362768][T13519] __x64_sys_mount+0xbf/0xd0 [ 188.367351][T13519] do_syscall_64+0xfe/0x140 [ 188.371847][T13519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.377731][T13519] RIP: 0033:0x459829 [ 188.381615][T13519] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.401198][T13519] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:00 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x25, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:00 executing program 4 (fault-call:8 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x5c, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 188.401207][T13519] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 188.401211][T13519] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 188.401215][T13519] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.401220][T13519] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 188.401223][T13519] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:00 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, 0x0) [ 188.576845][T13573] FAULT_INJECTION: forcing a failure. [ 188.576845][T13573] name failslab, interval 1, probability 0, space 0, times 0 [ 188.621558][T13573] CPU: 0 PID: 13573 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 188.629557][T13573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.639593][T13573] Call Trace: [ 188.642862][T13573] dump_stack+0x1d8/0x2f8 [ 188.647168][T13573] should_fail+0x555/0x770 [ 188.651564][T13573] __should_failslab+0x11a/0x160 [ 188.656477][T13573] ? alloc_vfsmnt+0x27/0x470 [ 188.661043][T13573] should_failslab+0x9/0x20 [ 188.665522][T13573] kmem_cache_alloc+0x56/0x2e0 [ 188.670256][T13573] ? rcu_lock_release+0x9/0x30 [ 188.674994][T13573] alloc_vfsmnt+0x27/0x470 [ 188.679382][T13573] clone_mnt+0x6b/0xbc0 [ 188.683511][T13573] ? rcu_lock_release+0x26/0x30 [ 188.688333][T13573] copy_tree+0x4fc/0xd60 [ 188.692547][T13573] ? propagate_one+0x2d5/0x620 [ 188.697288][T13573] propagate_one+0x2d5/0x620 [ 188.701851][T13573] ? get_mountpoint+0x1dd/0x420 [ 188.706674][T13573] propagate_mnt+0xcd/0x8d0 [ 188.711159][T13573] attach_recursive_mnt+0x7ef/0x1e50 [ 188.716423][T13573] do_mount+0x188f/0x2490 [ 188.720724][T13573] ksys_mount+0xcc/0x100 [ 188.724937][T13573] __x64_sys_mount+0xbf/0xd0 [ 188.729497][T13573] do_syscall_64+0xfe/0x140 [ 188.733970][T13573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.739835][T13573] RIP: 0033:0x459829 [ 188.743700][T13573] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.763274][T13573] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 188.771656][T13573] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 [ 188.779597][T13573] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 188.787542][T13573] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 188.795485][T13573] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 188.803446][T13573] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:01 executing program 5: socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="188c9e46a40078ad99ed0000000000009500020000000100"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xe7, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 4 (fault-call:8 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, 0x0) 02:05:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, 0x0) 02:05:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x300, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 5: socket$kcm(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) [ 188.952225][T13608] FAULT_INJECTION: forcing a failure. [ 188.952225][T13608] name failslab, interval 1, probability 0, space 0, times 0 02:05:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 189.038718][T13608] CPU: 0 PID: 13608 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 189.046750][T13608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.056798][T13608] Call Trace: [ 189.060078][T13608] dump_stack+0x1d8/0x2f8 [ 189.060092][T13608] should_fail+0x555/0x770 [ 189.060105][T13608] __should_failslab+0x11a/0x160 [ 189.060118][T13608] ? alloc_vfsmnt+0x27/0x470 [ 189.078506][T13608] should_failslab+0x9/0x20 [ 189.083002][T13608] kmem_cache_alloc+0x56/0x2e0 02:05:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) [ 189.087769][T13608] alloc_vfsmnt+0x27/0x470 [ 189.092184][T13608] clone_mnt+0x6b/0xbc0 [ 189.096334][T13608] ? do_raw_spin_unlock+0x49/0x260 [ 189.101436][T13608] copy_tree+0x4fc/0xd60 [ 189.105656][T13608] ? propagate_one+0x2d5/0x620 [ 189.110416][T13608] propagate_one+0x2d5/0x620 [ 189.115000][T13608] ? get_mountpoint+0x1dd/0x420 [ 189.119853][T13608] propagate_mnt+0xcd/0x8d0 [ 189.124357][T13608] attach_recursive_mnt+0x7ef/0x1e50 [ 189.129632][T13608] do_mount+0x188f/0x2490 [ 189.133942][T13608] ksys_mount+0xcc/0x100 [ 189.138163][T13608] __x64_sys_mount+0xbf/0xd0 [ 189.142727][T13608] do_syscall_64+0xfe/0x140 [ 189.147216][T13608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.153080][T13608] RIP: 0033:0x459829 [ 189.156948][T13608] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.176524][T13608] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 189.184906][T13608] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 [ 189.192851][T13608] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 189.200795][T13608] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 189.208741][T13608] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 189.216685][T13608] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:01 executing program 4 (fault-call:8 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x500, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000095000200"/24], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x600, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) [ 189.418063][T13656] FAULT_INJECTION: forcing a failure. [ 189.418063][T13656] name failslab, interval 1, probability 0, space 0, times 0 [ 189.448938][T13656] CPU: 0 PID: 13656 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 189.456936][T13656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.466974][T13656] Call Trace: [ 189.466990][T13656] dump_stack+0x1d8/0x2f8 [ 189.467005][T13656] should_fail+0x555/0x770 [ 189.467023][T13656] __should_failslab+0x11a/0x160 [ 189.467034][T13656] ? alloc_vfsmnt+0xaa/0x470 [ 189.467043][T13656] should_failslab+0x9/0x20 [ 189.467053][T13656] __kmalloc_track_caller+0x79/0x340 [ 189.467064][T13656] kstrdup_const+0x55/0x90 [ 189.467073][T13656] alloc_vfsmnt+0xaa/0x470 [ 189.467081][T13656] clone_mnt+0x6b/0xbc0 [ 189.467091][T13656] ? do_raw_spin_unlock+0x49/0x260 [ 189.467101][T13656] copy_tree+0x4fc/0xd60 [ 189.467108][T13656] ? propagate_one+0x2d5/0x620 [ 189.467122][T13656] propagate_one+0x2d5/0x620 [ 189.467128][T13656] ? get_mountpoint+0x1dd/0x420 [ 189.467136][T13656] propagate_mnt+0xcd/0x8d0 [ 189.467147][T13656] attach_recursive_mnt+0x7ef/0x1e50 [ 189.467163][T13656] do_mount+0x188f/0x2490 [ 189.467176][T13656] ksys_mount+0xcc/0x100 [ 189.467186][T13656] __x64_sys_mount+0xbf/0xd0 [ 189.467202][T13656] do_syscall_64+0xfe/0x140 [ 189.502835][T13656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.502843][T13656] RIP: 0033:0x459829 [ 189.502854][T13656] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.591315][T13656] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 189.599697][T13656] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 189.607638][T13656] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 189.615582][T13656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.623613][T13656] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 189.631558][T13656] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 189.652663][T13667] vivid-006: kernel_thread() failed 02:05:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x700, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 4 (fault-call:8 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:02 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfd3, 0x8000) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) 02:05:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) 02:05:02 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x900, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0}, &(0x7f0000000800)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x4, [], r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8000fffffffffffe}, 0x6, 0x10, &(0x7f0000000840)={0x0, 0x0, 0x2000000000}, 0xffffffffffffff6c}, 0x70) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) r4 = fcntl$dupfd(r3, 0x0, r3) write$UHID_CREATE2(r4, &(0x7f00000003c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0xaa, 0x1, 0x9, 0x0, 0x6, 0xe83, "bc22ac548be385a75d61f836b7bf63e8aecc1d1c8c9f2d027a16c6944607efe873826a565e2d3c314b88abc84fa48c03841dedfd85c07e9fd74eae6542686886f86d18ada3a093a092d2cf6d7169a49f6ed161ffce851f7e2c4d8a92f7195f93a4b58b7c695f212e0000f52758d95525cc55d09f237a285e964c63e02128e4dd9af66702974d242de019a46e154b431c8edf12bef0dd0d05e9c0b9a1e7c0035ca50c6c1d6f11b40c6500"}, 0x1c2) 02:05:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) 02:05:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xa00, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 189.951356][T13716] FAULT_INJECTION: forcing a failure. [ 189.951356][T13716] name failslab, interval 1, probability 0, space 0, times 0 [ 190.022614][T13716] CPU: 1 PID: 13716 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 190.030831][T13716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.040882][T13716] Call Trace: [ 190.044183][T13716] dump_stack+0x1d8/0x2f8 [ 190.048513][T13716] should_fail+0x555/0x770 [ 190.052932][T13716] __should_failslab+0x11a/0x160 [ 190.057870][T13716] ? alloc_vfsmnt+0x27/0x470 [ 190.062455][T13716] should_failslab+0x9/0x20 [ 190.066955][T13716] kmem_cache_alloc+0x56/0x2e0 [ 190.071703][T13716] alloc_vfsmnt+0x27/0x470 [ 190.076097][T13716] clone_mnt+0x6b/0xbc0 [ 190.080241][T13716] ? do_raw_spin_unlock+0x49/0x260 [ 190.085326][T13716] copy_tree+0x4fc/0xd60 [ 190.089552][T13716] ? propagate_one+0x2d5/0x620 [ 190.094287][T13716] propagate_one+0x2d5/0x620 [ 190.098850][T13716] ? get_mountpoint+0x1dd/0x420 [ 190.103674][T13716] propagate_mnt+0xcd/0x8d0 [ 190.108150][T13716] attach_recursive_mnt+0x7ef/0x1e50 [ 190.113417][T13716] do_mount+0x188f/0x2490 [ 190.117724][T13716] ksys_mount+0xcc/0x100 [ 190.121940][T13716] __x64_sys_mount+0xbf/0xd0 [ 190.126505][T13716] do_syscall_64+0xfe/0x140 [ 190.130985][T13716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.136849][T13716] RIP: 0033:0x459829 [ 190.140719][T13716] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.160294][T13716] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 190.168673][T13716] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 190.176616][T13716] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 190.184560][T13716] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 190.192504][T13716] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 190.200452][T13716] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) 02:05:02 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_cancel(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x3f, r0, &(0x7f0000000080)="c8a6c864922f66b49d6ecffb8a0a4c645edae5472e28d1021e514abdff515bdbf27f71125657c9a3aa8e89b9494cb69c58c7028847dfdcfc", 0x38, 0x2, 0x0, 0x3}, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:02 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 4 (fault-call:8 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xb00, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) 02:05:02 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000102000000950097c987319248040000000000000000020623866b"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000100)) socket$kcm(0x29, 0x2fc2b2dc6a6e3d6, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@bcast, @remote, @remote, @remote, @bcast, @rose, @bcast, @null]}, &(0x7f00000000c0)=0x48) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip_vs\x00') getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f00000003c0)=""/178, &(0x7f0000000480)=0xb2) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@null=' \x00', 0x4, 'ip_vti0\x00'}) [ 190.395371][T13768] FAULT_INJECTION: forcing a failure. [ 190.395371][T13768] name failslab, interval 1, probability 0, space 0, times 0 [ 190.420481][T13768] CPU: 0 PID: 13768 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 190.428485][T13768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.428489][T13768] Call Trace: [ 190.428505][T13768] dump_stack+0x1d8/0x2f8 [ 190.428523][T13768] should_fail+0x555/0x770 [ 190.450565][T13768] __should_failslab+0x11a/0x160 [ 190.455498][T13768] ? alloc_vfsmnt+0x27/0x470 [ 190.460076][T13768] should_failslab+0x9/0x20 [ 190.460088][T13768] kmem_cache_alloc+0x56/0x2e0 [ 190.460100][T13768] alloc_vfsmnt+0x27/0x470 [ 190.460109][T13768] clone_mnt+0x6b/0xbc0 [ 190.460123][T13768] ? do_raw_spin_unlock+0x49/0x260 [ 190.482978][T13768] copy_tree+0x4fc/0xd60 [ 190.487198][T13768] ? propagate_one+0x2d5/0x620 [ 190.491946][T13768] propagate_one+0x2d5/0x620 [ 190.496511][T13768] ? get_mountpoint+0x1dd/0x420 [ 190.501338][T13768] propagate_mnt+0xcd/0x8d0 [ 190.505815][T13768] attach_recursive_mnt+0x7ef/0x1e50 [ 190.511076][T13768] do_mount+0x188f/0x2490 [ 190.515382][T13768] ksys_mount+0xcc/0x100 [ 190.519598][T13768] __x64_sys_mount+0xbf/0xd0 [ 190.524163][T13768] do_syscall_64+0xfe/0x140 [ 190.528642][T13768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.534506][T13768] RIP: 0033:0x459829 [ 190.538390][T13768] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.557965][T13768] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 190.566345][T13768] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 190.574291][T13768] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 190.582235][T13768] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:05:02 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xc00, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 190.590180][T13768] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 190.598124][T13768] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:02 executing program 4 (fault-call:8 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:02 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a4c3f973", @ANYRES16=r2, @ANYBLOB="00022bbd7000ffdbdf25030000004c000900080001000900000008000200060000000800020008000000080002000600000008000100010400000800010009000000080002000300000008000200050000000800020001000000440005002c0002000800020008000000080003008000000008000300fbffffff0800040001010000080002000000000014000200080001000f0000000800030009000000"], 0xa4}, 0x1, 0x0, 0x0, 0x1}, 0x40000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r4 = socket$kcm(0x29, 0x2, 0x0) fsync(r4) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r0, r3}) 02:05:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:02 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) 02:05:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xd00, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = accept(r0, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x1b, "43e6c0cf8e651792282bc20d3f9bc7d17618909bb097399ee8ef53"}, &(0x7f0000000140)=0x23) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in={{0x2, 0xe3, @local}}, 0x2, 0x100000001}, &(0x7f0000000280)=0x90) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r0, r1}) r5 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x4, 0x2000) r6 = syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x100000001, 0x40000) linkat(r5, &(0x7f0000000400)='./file0\x00', r6, &(0x7f0000000480)='./file0\x00', 0x1000) 02:05:03 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 190.787185][T13801] FAULT_INJECTION: forcing a failure. [ 190.787185][T13801] name failslab, interval 1, probability 0, space 0, times 0 02:05:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) 02:05:03 executing program 5: r0 = socket$kcm(0x2, 0x7, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = dup(r1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/13, 0xd}, {&(0x7f00000001c0)=""/31, 0x1f}], 0x2) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000040)={0x4000000, 0x100000000, 0x9}) 02:05:03 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 191.014851][T13801] CPU: 1 PID: 13801 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 191.022862][T13801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.032918][T13801] Call Trace: [ 191.036208][T13801] dump_stack+0x1d8/0x2f8 [ 191.040535][T13801] should_fail+0x555/0x770 [ 191.044937][T13801] __should_failslab+0x11a/0x160 [ 191.049856][T13801] ? alloc_vfsmnt+0x27/0x470 [ 191.054427][T13801] should_failslab+0x9/0x20 [ 191.058912][T13801] kmem_cache_alloc+0x56/0x2e0 [ 191.063738][T13801] alloc_vfsmnt+0x27/0x470 [ 191.068127][T13801] clone_mnt+0x6b/0xbc0 [ 191.072258][T13801] ? do_raw_spin_unlock+0x49/0x260 [ 191.077342][T13801] copy_tree+0x4fc/0xd60 [ 191.081556][T13801] ? propagate_one+0x2d5/0x620 [ 191.086292][T13801] propagate_one+0x2d5/0x620 [ 191.090853][T13801] ? get_mountpoint+0x1dd/0x420 [ 191.095679][T13801] propagate_mnt+0xcd/0x8d0 [ 191.100156][T13801] attach_recursive_mnt+0x7ef/0x1e50 [ 191.105417][T13801] do_mount+0x188f/0x2490 [ 191.109724][T13801] ksys_mount+0xcc/0x100 [ 191.113940][T13801] __x64_sys_mount+0xbf/0xd0 [ 191.118503][T13801] do_syscall_64+0xfe/0x140 [ 191.122983][T13801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.128847][T13801] RIP: 0033:0x459829 [ 191.132714][T13801] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.152291][T13801] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:03 executing program 4 (fault-call:8 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:03 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xe00, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = accept(r0, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x1b, "43e6c0cf8e651792282bc20d3f9bc7d17618909bb097399ee8ef53"}, &(0x7f0000000140)=0x23) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in={{0x2, 0xe3, @local}}, 0x2, 0x100000001}, &(0x7f0000000280)=0x90) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r0, r1}) r5 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x4, 0x2000) r6 = syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x100000001, 0x40000) linkat(r5, &(0x7f0000000400)='./file0\x00', r6, &(0x7f0000000480)='./file0\x00', 0x1000) 02:05:03 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000006"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000040)={@local, @broadcast, @loopback}, &(0x7f0000000080)=0xc) [ 191.160671][T13801] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 191.168617][T13801] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 191.176561][T13801] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.184506][T13801] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 191.192450][T13801] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:03 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x1100, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 02:05:03 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@generic={0x4, "f28d816999a6696b71ee23c9ebb143e9d62bdd85125828826cf7a55aa4aa149bb654cf99684f691c7ef8b0db8275d501595371d8fce85708a02145147bcc1d4277f9f521154fa5e33f7ae9d81d8c2beabc15eb8f31ec816f30ee80a44806ad469b9f7b433a8461012f2c6c01c966a6c1d8af71740ab58d5827315b680210"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/1204], 0x4b0}, 0x4040040) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 191.363209][T13863] FAULT_INJECTION: forcing a failure. [ 191.363209][T13863] name failslab, interval 1, probability 0, space 0, times 0 [ 191.392077][T13863] CPU: 1 PID: 13863 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 191.400090][T13863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.410142][T13863] Call Trace: [ 191.413428][T13863] dump_stack+0x1d8/0x2f8 [ 191.417756][T13863] should_fail+0x555/0x770 [ 191.422174][T13863] __should_failslab+0x11a/0x160 [ 191.427112][T13863] ? alloc_vfsmnt+0x27/0x470 [ 191.431699][T13863] should_failslab+0x9/0x20 [ 191.436288][T13863] kmem_cache_alloc+0x56/0x2e0 [ 191.441049][T13863] alloc_vfsmnt+0x27/0x470 [ 191.445453][T13863] clone_mnt+0x6b/0xbc0 [ 191.449591][T13863] ? do_raw_spin_unlock+0x49/0x260 [ 191.454688][T13863] copy_tree+0x4fc/0xd60 [ 191.458909][T13863] ? propagate_one+0x2d5/0x620 [ 191.463662][T13863] propagate_one+0x2d5/0x620 [ 191.468224][T13863] ? get_mountpoint+0x1dd/0x420 [ 191.473046][T13863] propagate_mnt+0xcd/0x8d0 [ 191.477525][T13863] attach_recursive_mnt+0x7ef/0x1e50 [ 191.482790][T13863] do_mount+0x188f/0x2490 [ 191.487097][T13863] ksys_mount+0xcc/0x100 [ 191.491321][T13863] __x64_sys_mount+0xbf/0xd0 [ 191.495891][T13863] do_syscall_64+0xfe/0x140 [ 191.500366][T13863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.506230][T13863] RIP: 0033:0x459829 [ 191.510102][T13863] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.529680][T13863] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.538165][T13863] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 191.546113][T13863] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 191.554058][T13863] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:05:03 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 191.562003][T13863] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 191.569947][T13863] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:03 executing program 4 (fault-call:8 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:03 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x1200, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:03 executing program 1 (fault-call:2 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:04 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:04 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000001e0000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 191.709759][T13913] FAULT_INJECTION: forcing a failure. [ 191.709759][T13913] name failslab, interval 1, probability 0, space 0, times 0 [ 191.736615][T13912] FAULT_INJECTION: forcing a failure. [ 191.736615][T13912] name failslab, interval 1, probability 0, space 0, times 0 02:05:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2500, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 191.791398][T13913] CPU: 0 PID: 13913 Comm: syz-executor.1 Not tainted 5.3.0-rc5+ #84 [ 191.799407][T13913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.809458][T13913] Call Trace: [ 191.812755][T13913] dump_stack+0x1d8/0x2f8 [ 191.817083][T13913] should_fail+0x555/0x770 [ 191.821507][T13913] __should_failslab+0x11a/0x160 [ 191.826448][T13913] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 191.832163][T13913] should_failslab+0x9/0x20 [ 191.836662][T13913] __kmalloc+0x7a/0x340 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 191.840821][T13913] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 191.846537][T13913] tomoyo_realpath_from_path+0xdc/0x7c0 [ 191.852083][T13913] tomoyo_path_number_perm+0x166/0x640 [ 191.857543][T13913] ? smack_file_ioctl+0x226/0x2e0 [ 191.862580][T13913] ? __fget+0x4c1/0x510 [ 191.866746][T13913] tomoyo_file_ioctl+0x23/0x30 [ 191.871513][T13913] security_file_ioctl+0x6d/0xd0 [ 191.876451][T13913] __x64_sys_ioctl+0xa3/0x120 [ 191.881127][T13913] do_syscall_64+0xfe/0x140 [ 191.885623][T13913] entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 191.891509][T13913] RIP: 0033:0x459829 [ 191.895391][T13913] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.914986][T13913] RSP: 002b:00007ff8d33b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.923405][T13913] RAX: ffffffffffffffda RBX: 00007ff8d33b6c90 RCX: 0000000000459829 [ 191.931385][T13913] RDX: 0000000020000040 RSI: 00000000000089e0 RDI: 0000000000000004 02:05:04 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 191.939344][T13913] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.947392][T13913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8d33b76d4 [ 191.947397][T13913] R13: 00000000004c57ad R14: 00000000004d9e88 R15: 0000000000000005 [ 191.968282][T13912] CPU: 1 PID: 13912 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 191.976297][T13912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.986341][T13912] Call Trace: [ 191.989615][T13912] dump_stack+0x1d8/0x2f8 [ 191.993919][T13912] should_fail+0x555/0x770 [ 191.998318][T13912] __should_failslab+0x11a/0x160 [ 192.003230][T13912] ? alloc_vfsmnt+0xaa/0x470 [ 192.007795][T13912] should_failslab+0x9/0x20 [ 192.012271][T13912] __kmalloc_track_caller+0x79/0x340 [ 192.017531][T13912] kstrdup_const+0x55/0x90 [ 192.021936][T13912] alloc_vfsmnt+0xaa/0x470 [ 192.026326][T13912] clone_mnt+0x6b/0xbc0 [ 192.030459][T13912] ? do_raw_spin_unlock+0x49/0x260 [ 192.035545][T13912] copy_tree+0x4fc/0xd60 [ 192.039758][T13912] ? propagate_one+0x2d5/0x620 [ 192.044500][T13912] propagate_one+0x2d5/0x620 [ 192.049066][T13912] ? get_mountpoint+0x1dd/0x420 [ 192.053890][T13912] propagate_mnt+0xcd/0x8d0 [ 192.058368][T13912] attach_recursive_mnt+0x7ef/0x1e50 [ 192.063632][T13912] do_mount+0x188f/0x2490 [ 192.067939][T13912] ksys_mount+0xcc/0x100 [ 192.072155][T13912] __x64_sys_mount+0xbf/0xd0 [ 192.076719][T13912] do_syscall_64+0xfe/0x140 [ 192.081197][T13912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.087058][T13912] RIP: 0033:0x459829 [ 192.090925][T13912] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.110503][T13912] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.118888][T13912] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 192.126829][T13912] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 192.134770][T13912] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.142712][T13912] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 192.150655][T13912] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:04 executing program 4 (fault-call:8 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x4000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:04 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 192.219381][T13913] ERROR: Out of memory at tomoyo_realpath_from_path. 02:05:04 executing program 1 (fault-call:2 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:04 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:04 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000f2acd58276ed1e5e0000000000009500021ccb4c4c00"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x5c00, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 192.312747][T13954] FAULT_INJECTION: forcing a failure. [ 192.312747][T13954] name failslab, interval 1, probability 0, space 0, times 0 [ 192.367004][T13954] CPU: 0 PID: 13954 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 192.375015][T13954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.385072][T13954] Call Trace: [ 192.388366][T13954] dump_stack+0x1d8/0x2f8 [ 192.392698][T13954] should_fail+0x555/0x770 [ 192.397096][T13954] __should_failslab+0x11a/0x160 [ 192.402030][T13954] ? alloc_vfsmnt+0x27/0x470 [ 192.406600][T13954] should_failslab+0x9/0x20 [ 192.411078][T13954] kmem_cache_alloc+0x56/0x2e0 [ 192.415816][T13954] alloc_vfsmnt+0x27/0x470 [ 192.420204][T13954] clone_mnt+0x6b/0xbc0 [ 192.424332][T13954] ? do_raw_spin_unlock+0x49/0x260 [ 192.429416][T13954] copy_tree+0x4fc/0xd60 [ 192.433630][T13954] ? propagate_one+0x2d5/0x620 [ 192.438368][T13954] propagate_one+0x2d5/0x620 [ 192.442928][T13954] ? get_mountpoint+0x1dd/0x420 [ 192.447755][T13954] propagate_mnt+0xcd/0x8d0 [ 192.452232][T13954] attach_recursive_mnt+0x7ef/0x1e50 [ 192.457499][T13954] do_mount+0x188f/0x2490 [ 192.461805][T13954] ksys_mount+0xcc/0x100 [ 192.466034][T13954] __x64_sys_mount+0xbf/0xd0 [ 192.470607][T13954] do_syscall_64+0xfe/0x140 [ 192.475111][T13954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.480976][T13954] RIP: 0033:0x459829 [ 192.484842][T13954] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.504514][T13954] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:04 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 192.512897][T13954] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 192.520841][T13954] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 192.528783][T13954] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.536727][T13954] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 192.544675][T13954] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 192.554670][T13972] FAULT_INJECTION: forcing a failure. [ 192.554670][T13972] name failslab, interval 1, probability 0, space 0, times 0 [ 192.595303][T13972] CPU: 1 PID: 13972 Comm: syz-executor.1 Not tainted 5.3.0-rc5+ #84 [ 192.603309][T13972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.613361][T13972] Call Trace: [ 192.616652][T13972] dump_stack+0x1d8/0x2f8 [ 192.620988][T13972] should_fail+0x555/0x770 [ 192.625404][T13972] __should_failslab+0x11a/0x160 [ 192.630341][T13972] ? tomoyo_encode2+0x273/0x5a0 [ 192.635191][T13972] should_failslab+0x9/0x20 [ 192.639691][T13972] __kmalloc+0x7a/0x340 [ 192.643847][T13972] tomoyo_encode2+0x273/0x5a0 [ 192.648523][T13972] tomoyo_realpath_from_path+0x769/0x7c0 [ 192.654156][T13972] tomoyo_path_number_perm+0x166/0x640 [ 192.659622][T13972] ? smack_file_ioctl+0x226/0x2e0 [ 192.664641][T13972] ? __fget+0x4c1/0x510 [ 192.668792][T13972] tomoyo_file_ioctl+0x23/0x30 [ 192.673531][T13972] security_file_ioctl+0x6d/0xd0 [ 192.678453][T13972] __x64_sys_ioctl+0xa3/0x120 [ 192.683107][T13972] do_syscall_64+0xfe/0x140 [ 192.687587][T13972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.693450][T13972] RIP: 0033:0x459829 [ 192.697323][T13972] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.716987][T13972] RSP: 002b:00007ff8d3395c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.725370][T13972] RAX: ffffffffffffffda RBX: 00007ff8d3395c90 RCX: 0000000000459829 [ 192.733317][T13972] RDX: 0000000020000040 RSI: 00000000000089e0 RDI: 0000000000000003 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:05 executing program 4 (fault-call:8 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:05 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="185109bb000000000000000000005206b698428e19319800000000009500020000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xe7ff, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 192.741266][T13972] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 192.749209][T13972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8d33966d4 [ 192.757154][T13972] R13: 00000000004c57ad R14: 00000000004d9e88 R15: 0000000000000004 [ 192.854930][T13972] ERROR: Out of memory at tomoyo_realpath_from_path. [ 192.889531][T14004] FAULT_INJECTION: forcing a failure. [ 192.889531][T14004] name failslab, interval 1, probability 0, space 0, times 0 02:05:05 executing program 1 (fault-call:2 fault-nth:2): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:05 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:05 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000001e00000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="5abad15cfaa99ba6e376a98f04b6bca9cc5f397b4a78ec31b8056dcea40474d8090375ebb8e6e53cd4dd35be459f0f77fc499849b2834b271b923ab8d67584b2ce8757fc5d0dd8fa3c695ad27f0bd88b135101568fb3c773f6df6ad3bbd482fddcb44c237303b466c5a58ced6b28a04618c6c0dfd17cd241ac0411ee6a8494d8a6d0bbe4e76fd7e19686bbe809382fa4c606fe3c4469e0546f4def444154895bc9bd884e027ca9a8cd54f2658433b97b593c963b89592850271b83d413d501b7c3b6f057a726d1c20479b2e210ae732a17ec832c84e8a28c349aa4e58b52c82851efdff848f2d26d20b8902d9e04324b49dd632c8810", 0xf6}], 0x1, 0x2) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000080)='\x00', 0x0, r2) [ 192.912074][T14004] CPU: 0 PID: 14004 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 192.920078][T14004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.930122][T14004] Call Trace: [ 192.930140][T14004] dump_stack+0x1d8/0x2f8 [ 192.930152][T14004] should_fail+0x555/0x770 [ 192.930166][T14004] __should_failslab+0x11a/0x160 [ 192.930182][T14004] ? alloc_vfsmnt+0x27/0x470 [ 192.937756][T14004] should_failslab+0x9/0x20 [ 192.937768][T14004] kmem_cache_alloc+0x56/0x2e0 02:05:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xfdfd, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 192.937781][T14004] alloc_vfsmnt+0x27/0x470 [ 192.937793][T14004] clone_mnt+0x6b/0xbc0 [ 192.969394][T14004] ? do_raw_spin_unlock+0x49/0x260 [ 192.974508][T14004] copy_tree+0x4fc/0xd60 [ 192.978748][T14004] ? propagate_one+0x2d5/0x620 [ 192.983508][T14004] propagate_one+0x2d5/0x620 [ 192.988075][T14004] ? get_mountpoint+0x1dd/0x420 [ 192.992904][T14004] propagate_mnt+0xcd/0x8d0 [ 192.997385][T14004] attach_recursive_mnt+0x7ef/0x1e50 [ 193.002646][T14004] do_mount+0x188f/0x2490 [ 193.006948][T14004] ksys_mount+0xcc/0x100 [ 193.011164][T14004] __x64_sys_mount+0xbf/0xd0 [ 193.015727][T14004] do_syscall_64+0xfe/0x140 [ 193.020206][T14004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.026069][T14004] RIP: 0033:0x459829 [ 193.029937][T14004] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.049513][T14004] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.057894][T14004] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 193.065838][T14004] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 193.073797][T14004] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.081741][T14004] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 193.089686][T14004] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 193.163597][T14013] FAULT_INJECTION: forcing a failure. [ 193.163597][T14013] name failslab, interval 1, probability 0, space 0, times 0 [ 193.176542][T14013] CPU: 1 PID: 14013 Comm: syz-executor.1 Not tainted 5.3.0-rc5+ #84 [ 193.184519][T14013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.194563][T14013] Call Trace: [ 193.194579][T14013] dump_stack+0x1d8/0x2f8 [ 193.194595][T14013] should_fail+0x555/0x770 [ 193.206580][T14013] __should_failslab+0x11a/0x160 02:05:05 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 193.211513][T14013] ? tomoyo_encode2+0x273/0x5a0 [ 193.211528][T14013] should_failslab+0x9/0x20 [ 193.220839][T14013] __kmalloc+0x7a/0x340 [ 193.224995][T14013] tomoyo_encode2+0x273/0x5a0 [ 193.229668][T14013] tomoyo_realpath_from_path+0x769/0x7c0 [ 193.235298][T14013] tomoyo_path_number_perm+0x166/0x640 [ 193.240766][T14013] ? smack_file_ioctl+0x226/0x2e0 [ 193.245784][T14013] ? __fget+0x4c1/0x510 [ 193.249937][T14013] tomoyo_file_ioctl+0x23/0x30 [ 193.254698][T14013] security_file_ioctl+0x6d/0xd0 02:05:05 executing program 4 (fault-call:8 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:05 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x44000, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) [ 193.259629][T14013] __x64_sys_ioctl+0xa3/0x120 [ 193.264299][T14013] do_syscall_64+0xfe/0x140 [ 193.268799][T14013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.274674][T14013] RIP: 0033:0x459829 [ 193.278594][T14013] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.278599][T14013] RSP: 002b:00007ff8d33b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:05:05 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 193.278606][T14013] RAX: ffffffffffffffda RBX: 00007ff8d33b6c90 RCX: 0000000000459829 [ 193.278611][T14013] RDX: 0000000020000040 RSI: 00000000000089e0 RDI: 0000000000000004 [ 193.278615][T14013] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.278619][T14013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8d33b76d4 [ 193.278624][T14013] R13: 00000000004c57ad R14: 00000000004d9e88 R15: 0000000000000005 [ 193.285875][T14013] ERROR: Out of memory at tomoyo_realpath_from_path. [ 193.353736][T14024] vivid-006: kernel_thread() failed 02:05:05 executing program 1 (fault-call:2 fault-nth:3): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xffe7, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:05 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) [ 193.435295][T14043] FAULT_INJECTION: forcing a failure. [ 193.435295][T14043] name failslab, interval 1, probability 0, space 0, times 0 [ 193.518169][T14043] CPU: 0 PID: 14043 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 193.526306][T14043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.536355][T14043] Call Trace: [ 193.536374][T14043] dump_stack+0x1d8/0x2f8 [ 193.536389][T14043] should_fail+0x555/0x770 [ 193.536404][T14043] __should_failslab+0x11a/0x160 [ 193.548375][T14043] ? alloc_vfsmnt+0x27/0x470 [ 193.548387][T14043] should_failslab+0x9/0x20 [ 193.548397][T14043] kmem_cache_alloc+0x56/0x2e0 [ 193.548407][T14043] alloc_vfsmnt+0x27/0x470 [ 193.548419][T14043] clone_mnt+0x6b/0xbc0 [ 193.575673][T14043] ? do_raw_spin_unlock+0x49/0x260 [ 193.580774][T14043] copy_tree+0x128/0xd60 [ 193.585015][T14043] ? propagate_one+0x2d5/0x620 [ 193.588497][T14056] vivid-006: kernel_thread() failed [ 193.589773][T14043] ? count_mounts+0x1ab/0x230 [ 193.589785][T14043] propagate_one+0x2d5/0x620 [ 193.589792][T14043] ? get_mountpoint+0x1dd/0x420 [ 193.589804][T14043] propagate_mnt+0xcd/0x8d0 [ 193.604209][T14043] attach_recursive_mnt+0x7ef/0x1e50 [ 193.618782][T14043] do_mount+0x188f/0x2490 [ 193.623117][T14043] ksys_mount+0xcc/0x100 [ 193.627352][T14043] __x64_sys_mount+0xbf/0xd0 [ 193.627364][T14043] do_syscall_64+0xfe/0x140 [ 193.627375][T14043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.627386][T14043] RIP: 0033:0x459829 [ 193.646173][T14043] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:05:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r0}) 02:05:05 executing program 5: r0 = socket$kcm(0x2, 0x26, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="426e65180000000000000000f0000000002988c62d4a40d6"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x5, 0x81, 0x2, 0x9b, 0x6}) r3 = semget$private(0x0, 0x2, 0x204) semctl$SEM_INFO(r3, 0x3, 0x13, &(0x7f0000000080)=""/43) 02:05:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x1000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 193.646178][T14043] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.646191][T14043] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 193.682741][T14043] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 193.690710][T14043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.698679][T14043] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 193.706650][T14043] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:06 executing program 4 (fault-call:8 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:06 executing program 5: r0 = socket$kcm(0x2, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2) setsockopt$inet_dccp_int(r3, 0x21, 0xb, &(0x7f0000000080)=0x6, 0x4) 02:05:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x2, &(0x7f0000000040)={r1, r0}) 02:05:06 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 02:05:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x10, &(0x7f0000000040)={r1, r0}) 02:05:06 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x2, 0x4}, {0x2, 0x1000}]}, 0x14, 0x2) 02:05:06 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 02:05:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 193.853785][T14099] FAULT_INJECTION: forcing a failure. [ 193.853785][T14099] name failslab, interval 1, probability 0, space 0, times 0 [ 193.942510][T14099] CPU: 0 PID: 14099 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 193.950523][T14099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.960579][T14099] Call Trace: [ 193.963880][T14099] dump_stack+0x1d8/0x2f8 [ 193.968221][T14099] should_fail+0x555/0x770 [ 193.972654][T14099] __should_failslab+0x11a/0x160 [ 193.977597][T14099] ? alloc_vfsmnt+0xaa/0x470 [ 193.982211][T14099] should_failslab+0x9/0x20 [ 193.986695][T14099] __kmalloc_track_caller+0x79/0x340 [ 193.991959][T14099] kstrdup_const+0x55/0x90 [ 193.996351][T14099] alloc_vfsmnt+0xaa/0x470 [ 194.000743][T14099] clone_mnt+0x6b/0xbc0 [ 194.004873][T14099] ? do_raw_spin_unlock+0x49/0x260 [ 194.009958][T14099] copy_tree+0x128/0xd60 [ 194.014172][T14099] ? propagate_one+0x2d5/0x620 [ 194.018908][T14099] ? count_mounts+0x1ab/0x230 [ 194.023555][T14099] propagate_one+0x2d5/0x620 [ 194.028116][T14099] ? get_mountpoint+0x1dd/0x420 [ 194.032935][T14099] propagate_mnt+0xcd/0x8d0 [ 194.037415][T14099] attach_recursive_mnt+0x7ef/0x1e50 [ 194.042675][T14099] do_mount+0x188f/0x2490 [ 194.046977][T14099] ksys_mount+0xcc/0x100 [ 194.051189][T14099] __x64_sys_mount+0xbf/0xd0 [ 194.055752][T14099] do_syscall_64+0xfe/0x140 [ 194.060230][T14099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.066092][T14099] RIP: 0033:0x459829 [ 194.069962][T14099] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:05:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 194.089534][T14099] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.097914][T14099] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 194.105859][T14099] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 194.113802][T14099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.121746][T14099] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 194.129690][T14099] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:06 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r2}) 02:05:06 executing program 4 (fault-call:8 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x2275, &(0x7f0000000040)={r1, r0}) 02:05:06 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x3000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:06 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x227e, &(0x7f0000000040)={r1, r0}) 02:05:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000280)='vlan0\x00') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'ifb0\x00', {0x2, 0x4, @broadcast}}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={r3, r4, r5}, 0xc) [ 194.330905][T14144] FAULT_INJECTION: forcing a failure. [ 194.330905][T14144] name failslab, interval 1, probability 0, space 0, times 0 [ 194.387816][T14144] CPU: 0 PID: 14144 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 194.395850][T14144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.405885][T14144] Call Trace: [ 194.405902][T14144] dump_stack+0x1d8/0x2f8 [ 194.405920][T14144] should_fail+0x555/0x770 [ 194.405936][T14144] __should_failslab+0x11a/0x160 [ 194.422830][T14144] ? alloc_vfsmnt+0x27/0x470 [ 194.427407][T14144] should_failslab+0x9/0x20 [ 194.431896][T14144] kmem_cache_alloc+0x56/0x2e0 [ 194.436637][T14144] alloc_vfsmnt+0x27/0x470 [ 194.441029][T14144] clone_mnt+0x6b/0xbc0 [ 194.445162][T14144] ? do_raw_spin_unlock+0x49/0x260 [ 194.450245][T14144] copy_tree+0x4fc/0xd60 [ 194.454460][T14144] ? propagate_one+0x2d5/0x620 [ 194.459197][T14144] propagate_one+0x2d5/0x620 [ 194.463757][T14144] ? get_mountpoint+0x1dd/0x420 [ 194.468582][T14144] propagate_mnt+0xcd/0x8d0 [ 194.473059][T14144] attach_recursive_mnt+0x7ef/0x1e50 [ 194.478323][T14144] do_mount+0x188f/0x2490 [ 194.482627][T14144] ksys_mount+0xcc/0x100 [ 194.486840][T14144] __x64_sys_mount+0xbf/0xd0 [ 194.491405][T14144] do_syscall_64+0xfe/0x140 [ 194.495882][T14144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.501741][T14144] RIP: 0033:0x459829 [ 194.505610][T14144] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.525197][T14144] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x4000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:06 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:06 executing program 4 (fault-call:8 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 194.533581][T14144] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 194.541523][T14144] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 194.549464][T14144] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.557408][T14144] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 194.565350][T14144] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x5000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 194.673384][T14174] FAULT_INJECTION: forcing a failure. [ 194.673384][T14174] name failslab, interval 1, probability 0, space 0, times 0 [ 194.700535][T14174] CPU: 0 PID: 14174 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 194.708546][T14174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.718604][T14174] Call Trace: [ 194.721883][T14174] dump_stack+0x1d8/0x2f8 [ 194.726197][T14174] should_fail+0x555/0x770 [ 194.730612][T14174] __should_failslab+0x11a/0x160 [ 194.735559][T14174] ? alloc_vfsmnt+0x27/0x470 [ 194.740151][T14174] should_failslab+0x9/0x20 [ 194.744650][T14174] kmem_cache_alloc+0x56/0x2e0 [ 194.749403][T14174] alloc_vfsmnt+0x27/0x470 [ 194.753799][T14174] clone_mnt+0x6b/0xbc0 [ 194.757958][T14174] ? do_raw_spin_unlock+0x49/0x260 [ 194.763064][T14174] copy_tree+0x4fc/0xd60 [ 194.767301][T14174] ? propagate_one+0x2d5/0x620 02:05:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 194.772060][T14174] propagate_one+0x2d5/0x620 [ 194.776637][T14174] ? get_mountpoint+0x1dd/0x420 [ 194.781481][T14174] propagate_mnt+0xcd/0x8d0 [ 194.785979][T14174] attach_recursive_mnt+0x7ef/0x1e50 [ 194.791288][T14174] do_mount+0x188f/0x2490 [ 194.795614][T14174] ksys_mount+0xcc/0x100 [ 194.799847][T14174] __x64_sys_mount+0xbf/0xd0 [ 194.804434][T14174] do_syscall_64+0xfe/0x140 [ 194.808934][T14174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.814816][T14174] RIP: 0033:0x459829 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 194.818702][T14174] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.838751][T14174] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.847152][T14174] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 194.855121][T14174] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 194.863086][T14174] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:05:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x4c00, &(0x7f0000000040)={r1, r0}) 02:05:07 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x6000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:07 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x21, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 194.871042][T14174] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 194.871052][T14174] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:07 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:07 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000040)={{0x3, @default, 0x7}, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:07 executing program 4 (fault-call:8 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x4c01, &(0x7f0000000040)={r1, r0}) 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:07 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5406, &(0x7f0000000040)={r1, r0}) 02:05:07 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000098d6ae4f878ab47f00000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfdf9, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x2}}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:07 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x7000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 195.094857][T14239] FAULT_INJECTION: forcing a failure. [ 195.094857][T14239] name failslab, interval 1, probability 0, space 0, times 0 02:05:07 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 195.178551][T14239] CPU: 1 PID: 14239 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 195.186684][T14239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.196732][T14239] Call Trace: [ 195.200028][T14239] dump_stack+0x1d8/0x2f8 [ 195.204358][T14239] should_fail+0x555/0x770 [ 195.208769][T14239] __should_failslab+0x11a/0x160 [ 195.213705][T14239] ? alloc_vfsmnt+0xaa/0x470 [ 195.218287][T14239] should_failslab+0x9/0x20 [ 195.218299][T14239] __kmalloc_track_caller+0x79/0x340 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 195.218312][T14239] kstrdup_const+0x55/0x90 [ 195.218323][T14239] alloc_vfsmnt+0xaa/0x470 [ 195.218332][T14239] clone_mnt+0x6b/0xbc0 [ 195.218348][T14239] ? do_raw_spin_unlock+0x49/0x260 [ 195.228085][T14239] copy_tree+0x4fc/0xd60 [ 195.228094][T14239] ? propagate_one+0x2d5/0x620 [ 195.228105][T14239] propagate_one+0x2d5/0x620 [ 195.228112][T14239] ? get_mountpoint+0x1dd/0x420 [ 195.228121][T14239] propagate_mnt+0xcd/0x8d0 [ 195.228131][T14239] attach_recursive_mnt+0x7ef/0x1e50 [ 195.228146][T14239] do_mount+0x188f/0x2490 02:05:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5412, &(0x7f0000000040)={r1, r0}) 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 195.278567][T14239] ksys_mount+0xcc/0x100 [ 195.282803][T14239] __x64_sys_mount+0xbf/0xd0 [ 195.287389][T14239] do_syscall_64+0xfe/0x140 [ 195.291887][T14239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.297779][T14239] RIP: 0033:0x459829 [ 195.301667][T14239] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:05:07 executing program 4 (fault-call:8 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:07 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000001"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:07 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:07 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x8000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 195.321249][T14239] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.321257][T14239] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 195.321261][T14239] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 195.321265][T14239] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.321270][T14239] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 195.321274][T14239] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 195.453278][T14278] FAULT_INJECTION: forcing a failure. [ 195.453278][T14278] name failslab, interval 1, probability 0, space 0, times 0 [ 195.481602][T14294] FAULT_INJECTION: forcing a failure. [ 195.481602][T14294] name failslab, interval 1, probability 0, space 0, times 0 02:05:07 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000ef000000000000000000950002000000000098b673dbe07c9bf456a541326ae69e74e47a63b01602a95a604d05fbd33ffda163ad08b3aeaec17175e3d778e3a2eb"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$XDP_STATISTICS(r3, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) ioctl$TCSETX(r3, 0x5433, &(0x7f0000000080)={0x8, 0x8, [0xb3, 0xb46c, 0x10000, 0x1, 0xd141], 0x8}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5421, &(0x7f0000000040)={r1, r0}) [ 195.507079][T14278] CPU: 1 PID: 14278 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #84 [ 195.515081][T14278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.525133][T14278] Call Trace: [ 195.528426][T14278] dump_stack+0x1d8/0x2f8 [ 195.532753][T14278] should_fail+0x555/0x770 [ 195.537170][T14278] __should_failslab+0x11a/0x160 [ 195.542110][T14278] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 195.547836][T14278] should_failslab+0x9/0x20 [ 195.552317][T14278] __kmalloc+0x7a/0x340 [ 195.556453][T14278] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 195.562150][T14278] tomoyo_realpath_from_path+0xdc/0x7c0 [ 195.567674][T14278] tomoyo_path_number_perm+0x166/0x640 [ 195.573115][T14278] ? smack_file_ioctl+0x278/0x2e0 [ 195.578111][T14278] ? __fget+0x4c1/0x510 [ 195.582241][T14278] tomoyo_file_ioctl+0x23/0x30 [ 195.586982][T14278] security_file_ioctl+0x6d/0xd0 [ 195.591894][T14278] __x64_sys_ioctl+0xa3/0x120 [ 195.596542][T14278] do_syscall_64+0xfe/0x140 [ 195.601018][T14278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.606883][T14278] RIP: 0033:0x459829 [ 195.610752][T14278] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.630327][T14278] RSP: 002b:00007f7a7e263c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 195.638707][T14278] RAX: ffffffffffffffda RBX: 00007f7a7e263c90 RCX: 0000000000459829 [ 195.646649][T14278] RDX: 0000000020000000 RSI: 00000000c0585609 RDI: 0000000000000003 [ 195.654603][T14278] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.663050][T14278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a7e2646d4 [ 195.670994][T14278] R13: 00000000004c4d7e R14: 00000000004d90d8 R15: 0000000000000004 [ 195.687243][T14294] CPU: 1 PID: 14294 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 195.689410][T14278] ERROR: Out of memory at tomoyo_realpath_from_path. [ 195.698881][T14294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.698885][T14294] Call Trace: [ 195.698900][T14294] dump_stack+0x1d8/0x2f8 [ 195.698914][T14294] should_fail+0x555/0x770 [ 195.698925][T14294] __should_failslab+0x11a/0x160 [ 195.698935][T14294] ? alloc_vfsmnt+0x27/0x470 [ 195.698944][T14294] should_failslab+0x9/0x20 [ 195.698954][T14294] kmem_cache_alloc+0x56/0x2e0 [ 195.698967][T14294] alloc_vfsmnt+0x27/0x470 [ 195.698979][T14294] clone_mnt+0x6b/0xbc0 [ 195.715676][T14294] ? do_raw_spin_unlock+0x49/0x260 [ 195.723236][T14294] copy_tree+0x4fc/0xd60 [ 195.723246][T14294] ? propagate_one+0x2d5/0x620 [ 195.723260][T14294] propagate_one+0x2d5/0x620 [ 195.732560][T14294] ? get_mountpoint+0x1dd/0x420 [ 195.732571][T14294] propagate_mnt+0xcd/0x8d0 [ 195.732583][T14294] attach_recursive_mnt+0x7ef/0x1e50 [ 195.732599][T14294] do_mount+0x188f/0x2490 [ 195.746386][T14294] ksys_mount+0xcc/0x100 [ 195.746397][T14294] __x64_sys_mount+0xbf/0xd0 [ 195.746408][T14294] do_syscall_64+0xfe/0x140 [ 195.746422][T14294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.811452][T14294] RIP: 0033:0x459829 [ 195.815322][T14294] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.835412][T14294] RSP: 002b:00007ffafaf25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.843793][T14294] RAX: ffffffffffffffda RBX: 00007ffafaf25c90 RCX: 0000000000459829 [ 195.851735][T14294] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 195.859679][T14294] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 195.867622][T14294] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf266d4 [ 195.875565][T14294] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:08 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x9000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:08 executing program 2 (fault-call:2 fault-nth:1): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5450, &(0x7f0000000040)={r1, r0}) [ 195.964764][T14312] FAULT_INJECTION: forcing a failure. [ 195.964764][T14312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.977983][T14312] CPU: 0 PID: 14312 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #84 [ 195.985935][T14312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.995976][T14312] Call Trace: [ 195.999262][T14312] dump_stack+0x1d8/0x2f8 [ 196.003590][T14312] should_fail+0x555/0x770 [ 196.008002][T14312] should_fail_alloc_page+0x55/0x60 [ 196.013194][T14312] prepare_alloc_pages+0x283/0x470 [ 196.018306][T14312] __alloc_pages_nodemask+0xb2/0x5d0 [ 196.023575][T14312] ? stack_trace_save+0x150/0x150 [ 196.028582][T14312] kmem_getpages+0x56/0xa20 [ 196.033060][T14312] cache_grow_begin+0x7e/0x2c0 [ 196.037801][T14312] cache_alloc_refill+0x311/0x3f0 [ 196.042796][T14312] ? check_preemption_disabled+0xb7/0x2a0 [ 196.048485][T14312] __kmalloc+0x318/0x340 [ 196.052698][T14312] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 196.058388][T14312] tomoyo_realpath_from_path+0xdc/0x7c0 [ 196.063907][T14312] tomoyo_path_number_perm+0x166/0x640 [ 196.069346][T14312] ? smack_file_ioctl+0x278/0x2e0 [ 196.074342][T14312] ? __fget+0x4c1/0x510 [ 196.078472][T14312] tomoyo_file_ioctl+0x23/0x30 [ 196.083207][T14312] security_file_ioctl+0x6d/0xd0 [ 196.088118][T14312] __x64_sys_ioctl+0xa3/0x120 [ 196.092774][T14312] do_syscall_64+0xfe/0x140 [ 196.097250][T14312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.103114][T14312] RIP: 0033:0x459829 [ 196.106983][T14312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.126559][T14312] RSP: 002b:00007f7a7e263c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 196.134940][T14312] RAX: ffffffffffffffda RBX: 00007f7a7e263c90 RCX: 0000000000459829 [ 196.142987][T14312] RDX: 0000000020000000 RSI: 00000000c0585609 RDI: 0000000000000003 [ 196.150933][T14312] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:05:08 executing program 4 (fault-call:8 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:08 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000040000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 196.158877][T14312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a7e2646d4 [ 196.166819][T14312] R13: 00000000004c4d7e R14: 00000000004d90d8 R15: 0000000000000004 02:05:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:08 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=0x0, &(0x7f0000000240)=0x4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000280)={r5, 0x6, 0x6}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000780)={{{@in=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) r9 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f0000000bc0)={&(0x7f00000003c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80}, 0xc, &(0x7f00000006c0)=[{&(0x7f0000000400)={0x290, 0x25, 0x59b1caa299c63a3d, 0x70bd2b, 0x25dfdbfd, "", [@generic="27c738888cbf2bf79880696b711cbd44d3424b73f5d71197a261a5d19e1354c6de90cec4b614a4668390ed84c50b883a6db0a4d24848350e1e9d044cc035a045f1ae4c1aa14085bd77a552ed85ed59329c1f92c17927fe6aecfc95a04fe7d05318d00aa5b22228aa0354c1c3fc150686e3c4b67425fdb2f657cc01bbb69f1c08c57e6cdeffea70f2ee47c47054b832d03af6f54479b5ebc80e0609", @nested={0x1a4, 0x31, [@typed={0x4, 0x49}, @generic="08085ce551dced22b9bbaeda559f61c8fd14b18d06473e51d3a0e1ed425432c05338c94fd1dcc2f9f89e5158580f28d41e7f0c46d2bbea6c89c20982b370b33ee941a09b6a89", @generic="0001d99e90a7367c23e976488a8a69abca9479134a95d046270a70dbb36b892fa7aa9e26f12537bc4744e644f3911885a038d8c92ad486d63c918df27489e228ea50b982900b1b06b9097a46060d6b02149dce56b9cd8fc8b696962bfeaa10388bf9d1d3954c36946bd4874c70e8d0d49df14b7d5ccc7fb96724980c817c3864af59caaa", @generic="e93afa8cb23c5765bd807375eb75367c0ed2de34fcc6ca43df0b574a66b0815b4d1aa6af4e4fdb86f360c6852a3691c1eca9ed362de9bc1c5747b12477aaff0aceafe7fc8a5403a2aaaebc6487d1eca6918de1305f0e02b57f475797acc8afe89140cc9707df4db62674cbb293768ecba0021c3885a17cf3c6812fbaac0ee4b749f7bb6ac946eb2e03817256fcf8681cf9440a6e4675adaf64c4d204b6334aaa65a0f88d30fd4c8ad9804530a82712e1246f87bc2129dc7f785affe11b78fcdce8462b07304d3635d31c61e72103b6"]}, @nested={0x3c, 0x1a, [@generic="f51ef2551b87e28d2eab67168155493ea416e1c02b6b7d6c29ad16ba6fe7f2b8290e2a9035cd0c8a1b9c6e00fd703894375aad6318317008"]}, @typed={0x4, 0x3d}]}, 0x290}], 0x1, &(0x7f0000000ac0)=[@rights={{0x28, 0x1, 0x1, [r3, r0, r1, r3, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @rights={{0x18, 0x1, 0x1, [r1, r3]}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [r2, r1, r2, r0, r1, r3, r0]}}], 0xd0, 0x1}, 0x40004) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x5100010}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r4, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x308b73a50357c6cc}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="7ed108bb772d73b7b6bf855ab5d0ec93"}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000094}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5451, &(0x7f0000000040)={r1, r0}) [ 196.243399][T14324] FAULT_INJECTION: forcing a failure. [ 196.243399][T14324] name failslab, interval 1, probability 0, space 0, times 0 [ 196.309405][T14324] CPU: 1 PID: 14324 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 196.317414][T14324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.327455][T14324] Call Trace: [ 196.330732][T14324] dump_stack+0x1d8/0x2f8 [ 196.335041][T14324] should_fail+0x555/0x770 [ 196.339434][T14324] __should_failslab+0x11a/0x160 [ 196.344348][T14324] ? alloc_vfsmnt+0x27/0x470 [ 196.348916][T14324] should_failslab+0x9/0x20 [ 196.353411][T14324] kmem_cache_alloc+0x56/0x2e0 [ 196.358148][T14324] alloc_vfsmnt+0x27/0x470 [ 196.362537][T14324] clone_mnt+0x6b/0xbc0 [ 196.366673][T14324] ? do_raw_spin_unlock+0x49/0x260 [ 196.371754][T14324] copy_tree+0x4fc/0xd60 [ 196.375972][T14324] ? propagate_one+0x2d5/0x620 [ 196.380707][T14324] propagate_one+0x2d5/0x620 [ 196.385280][T14324] ? get_mountpoint+0x1dd/0x420 [ 196.390101][T14324] propagate_mnt+0xcd/0x8d0 [ 196.394577][T14324] attach_recursive_mnt+0x7ef/0x1e50 [ 196.399841][T14324] do_mount+0x188f/0x2490 [ 196.404145][T14324] ksys_mount+0xcc/0x100 [ 196.408362][T14324] __x64_sys_mount+0xbf/0xd0 [ 196.412926][T14324] do_syscall_64+0xfe/0x140 [ 196.417402][T14324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.423266][T14324] RIP: 0033:0x459829 [ 196.427134][T14324] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.446710][T14324] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:08 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xa000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:08 executing program 2 (fault-call:2 fault-nth:2): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 196.455091][T14324] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 196.463036][T14324] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 196.471066][T14324] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.479022][T14324] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 196.486963][T14324] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:08 executing program 4 (fault-call:8 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) [ 196.580439][T14351] FAULT_INJECTION: forcing a failure. [ 196.580439][T14351] name failslab, interval 1, probability 0, space 0, times 0 [ 196.600853][T14351] CPU: 0 PID: 14351 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #84 [ 196.608849][T14351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.608854][T14351] Call Trace: [ 196.608869][T14351] dump_stack+0x1d8/0x2f8 [ 196.608886][T14351] should_fail+0x555/0x770 [ 196.630923][T14351] __should_failslab+0x11a/0x160 [ 196.635861][T14351] ? tomoyo_encode2+0x273/0x5a0 [ 196.640710][T14351] should_failslab+0x9/0x20 [ 196.645201][T14351] __kmalloc+0x7a/0x340 [ 196.649345][T14351] tomoyo_encode2+0x273/0x5a0 [ 196.649359][T14351] tomoyo_realpath_from_path+0x769/0x7c0 [ 196.649375][T14351] tomoyo_path_number_perm+0x166/0x640 [ 196.665088][T14351] ? smack_file_ioctl+0x278/0x2e0 [ 196.665101][T14351] ? __fget+0x4c1/0x510 [ 196.674242][T14351] tomoyo_file_ioctl+0x23/0x30 02:05:08 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xb000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5452, &(0x7f0000000040)={r1, r0}) 02:05:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 196.678999][T14351] security_file_ioctl+0x6d/0xd0 [ 196.683928][T14351] __x64_sys_ioctl+0xa3/0x120 [ 196.688600][T14351] do_syscall_64+0xfe/0x140 [ 196.693095][T14351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.698969][T14351] RIP: 0033:0x459829 [ 196.698979][T14351] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.698984][T14351] RSP: 002b:00007f7a7e263c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 196.698993][T14351] RAX: ffffffffffffffda RBX: 00007f7a7e263c90 RCX: 0000000000459829 [ 196.698998][T14351] RDX: 0000000020000000 RSI: 00000000c0585609 RDI: 0000000000000003 [ 196.699002][T14351] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.699007][T14351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a7e2646d4 [ 196.699011][T14351] R13: 00000000004c4d7e R14: 00000000004d90d8 R15: 0000000000000004 02:05:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x5460, &(0x7f0000000040)={r1, r0}) [ 196.785112][T14368] FAULT_INJECTION: forcing a failure. [ 196.785112][T14368] name failslab, interval 1, probability 0, space 0, times 0 [ 196.802499][T14368] CPU: 0 PID: 14368 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 196.810495][T14368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.820547][T14368] Call Trace: [ 196.823831][T14368] dump_stack+0x1d8/0x2f8 [ 196.828611][T14368] should_fail+0x555/0x770 [ 196.833028][T14368] __should_failslab+0x11a/0x160 [ 196.837966][T14368] ? alloc_vfsmnt+0x27/0x470 [ 196.842543][T14368] should_failslab+0x9/0x20 [ 196.847030][T14368] kmem_cache_alloc+0x56/0x2e0 [ 196.851778][T14368] alloc_vfsmnt+0x27/0x470 [ 196.856174][T14368] clone_mnt+0x6b/0xbc0 [ 196.860304][T14368] ? do_raw_spin_unlock+0x49/0x260 [ 196.865387][T14368] copy_tree+0x4fc/0xd60 [ 196.869599][T14368] ? propagate_one+0x2d5/0x620 [ 196.874337][T14368] propagate_one+0x2d5/0x620 [ 196.878900][T14368] ? get_mountpoint+0x1dd/0x420 [ 196.883721][T14368] propagate_mnt+0xcd/0x8d0 [ 196.888199][T14368] attach_recursive_mnt+0x7ef/0x1e50 [ 196.893463][T14368] do_mount+0x188f/0x2490 [ 196.897767][T14368] ksys_mount+0xcc/0x100 [ 196.901983][T14368] __x64_sys_mount+0xbf/0xd0 [ 196.906546][T14368] do_syscall_64+0xfe/0x140 [ 196.911023][T14368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.916901][T14368] RIP: 0033:0x459829 [ 196.920771][T14368] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.940346][T14368] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 196.948732][T14368] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 196.956675][T14368] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 196.964619][T14368] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.972562][T14368] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 196.980505][T14368] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 [ 196.994476][T14351] ERROR: Out of memory at tomoyo_realpath_from_path. 02:05:09 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffffffffffff}, 0x2, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x70) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x202) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000100)='syzkaller0\x00') 02:05:09 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xc000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:09 executing program 2 (fault-call:2 fault-nth:3): r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:09 executing program 4 (fault-call:8 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x6364, &(0x7f0000000040)={r1, r0}) 02:05:09 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:09 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xd000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:09 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000100)=@ipx={0x4, 0x8, 0x6, "824d9d84b0fa", 0x6}, 0x80, &(0x7f0000000480)=[{&(0x7f00000001c0)="54fd0a0e08f67be48294dba189cf7df4c884c27d5f6e3d27329df46d8bad22874218239da7a167604a5a1353a616e39ae20551f312da311fb83946c8a7dd5ddc08d185dfb0c6f7a9b8a91dbaf4dd6c14cf9c9c337d693bfcf4fe5ce7713c89c13787ffddd8f4abdc7bdd9d3ca92bf2f8e1e53278254ce8751a41df82dd50daa0ce3653d976b328bb8d240e17035c9c9742ac720d8f2c73eb3b3a3ef55989db34deda7d47f9ce8b4c35d953b34c354abddb3b6adfd403b3c822f873ee12fbb69665894412ea41142e026d33a68d00424e00f3e8422b152613", 0xd8}, {&(0x7f00000003c0)="9f0c7f4fbda1fcb0c7ab23c27b88b6b78067076f53eefc237c1e3303655c4fe20561852550fcb1a19cf5205c9bb3a0b27ee3ea68651a97d37f271992c6c8fe69b6d2a46d793500f9d04ff7a8bfd3b2b661bcc4b55ee8b548efff86f5beb609b35d1e6c40e9d8adaacdf1e6f9d9f22b427e41cfafff99fc33cc0b456c0591f86d660cb21430eaa30dd442", 0x8a}], 0x2}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x276640, 0x0) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xa, 0xe87, 0x2000004, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:09 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0xe000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 197.260749][T14415] FAULT_INJECTION: forcing a failure. [ 197.260749][T14415] name failslab, interval 1, probability 0, space 0, times 0 02:05:09 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x2, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 197.326817][T14415] CPU: 0 PID: 14415 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 197.334839][T14415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.344985][T14415] Call Trace: [ 197.348280][T14415] dump_stack+0x1d8/0x2f8 [ 197.352617][T14415] should_fail+0x555/0x770 [ 197.357026][T14415] __should_failslab+0x11a/0x160 [ 197.361952][T14415] ? alloc_vfsmnt+0x27/0x470 [ 197.366517][T14415] should_failslab+0x9/0x20 [ 197.371020][T14415] kmem_cache_alloc+0x56/0x2e0 [ 197.371033][T14415] alloc_vfsmnt+0x27/0x470 [ 197.371045][T14415] clone_mnt+0x6b/0xbc0 [ 197.380181][T14415] ? do_raw_spin_unlock+0x49/0x260 [ 197.380191][T14415] copy_tree+0x4fc/0xd60 [ 197.380199][T14415] ? propagate_one+0x2d5/0x620 [ 197.380213][T14415] propagate_one+0x2d5/0x620 [ 197.402924][T14415] ? get_mountpoint+0x1dd/0x420 [ 197.407753][T14415] propagate_mnt+0xcd/0x8d0 [ 197.412232][T14415] attach_recursive_mnt+0x7ef/0x1e50 [ 197.417491][T14415] do_mount+0x188f/0x2490 [ 197.421807][T14415] ksys_mount+0xcc/0x100 [ 197.426047][T14415] __x64_sys_mount+0xbf/0xd0 [ 197.430616][T14415] do_syscall_64+0xfe/0x140 [ 197.435106][T14415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.440977][T14415] RIP: 0033:0x459829 [ 197.444846][T14415] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.464421][T14415] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x6431, &(0x7f0000000040)={r1, r0}) [ 197.472801][T14415] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 197.480753][T14415] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 197.488722][T14415] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.496682][T14415] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 197.504632][T14415] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:09 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x10000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 197.529771][T14442] vivid-004: kernel_thread() failed 02:05:09 executing program 4 (fault-call:8 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:09 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs(r3, &(0x7f0000000280)='net/udp6\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f00000000c0)=@xdp={0x2c, 0x4, r4, 0x3f}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="e3741c1b", 0x4}], 0x1, &(0x7f00000003c0)=[{0x98, 0x108, 0x5, "1830dd821ad8f32f9f91772e105d7ae3e12999b4054e693263734814a1a17bc9497f1cd4a6a06c264b2f7eeb81e1c4a4a9a30120a704fda40b3bc28629ef996d99f6358aa6ddb5ac216d437fe311598c886392b4d6c1b039c1ef47214586bd58746d657a0b03560b3b28b77c55baa58363380291ceb2951a4bc947c2e9d6c5d08d"}, {0x1010, 0xb4818db6e36ed5ad, 0x5, "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"}, {0x30, 0x13f, 0x5, "d042b61d3edd8a5bb2ce610dccfe40e10e0648ae1c3bb08a8365fed1aeb5"}], 0x10d8}, 0x4000) rename(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='./file0\x00') r5 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x95, 0x400000) ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d) 02:05:09 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x10, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x8901, &(0x7f0000000040)={r1, r0}) 02:05:09 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000003c0)={0x3, 0x7, 0x752e, 0x0, 0x0, [], [], [], 0x9, 0x5}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) [ 197.656206][T14469] FAULT_INJECTION: forcing a failure. [ 197.656206][T14469] name failslab, interval 1, probability 0, space 0, times 0 02:05:10 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x4c01, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:10 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x11000000, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) 02:05:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x8902, &(0x7f0000000040)={r1, r0}) [ 197.823263][T14469] CPU: 0 PID: 14469 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #84 [ 197.831292][T14469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.841332][T14469] Call Trace: [ 197.844609][T14469] dump_stack+0x1d8/0x2f8 [ 197.848918][T14469] should_fail+0x555/0x770 [ 197.853308][T14469] __should_failslab+0x11a/0x160 [ 197.858219][T14469] ? alloc_vfsmnt+0x27/0x470 [ 197.862783][T14469] should_failslab+0x9/0x20 [ 197.867257][T14469] kmem_cache_alloc+0x56/0x2e0 [ 197.871997][T14469] ? rcu_lock_release+0x9/0x30 [ 197.876735][T14469] alloc_vfsmnt+0x27/0x470 [ 197.881125][T14469] clone_mnt+0x6b/0xbc0 [ 197.885251][T14469] ? rcu_lock_release+0x26/0x30 [ 197.890073][T14469] copy_tree+0x4fc/0xd60 [ 197.894285][T14469] ? propagate_one+0x2d5/0x620 [ 197.899022][T14469] propagate_one+0x2d5/0x620 [ 197.903580][T14469] ? get_mountpoint+0x1dd/0x420 [ 197.908403][T14469] propagate_mnt+0xcd/0x8d0 [ 197.912881][T14469] attach_recursive_mnt+0x7ef/0x1e50 [ 197.918142][T14469] do_mount+0x188f/0x2490 [ 197.922447][T14469] ksys_mount+0xcc/0x100 [ 197.926661][T14469] __x64_sys_mount+0xbf/0xd0 [ 197.931224][T14469] do_syscall_64+0xfe/0x140 [ 197.935710][T14469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.941573][T14469] RIP: 0033:0x459829 [ 197.945443][T14469] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.965018][T14469] RSP: 002b:00007ffafaf46c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:05:10 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$VIDIOC_QUERYBUF(r0, 0x5421, &(0x7f0000000000)={0x2, 0xb, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a702287d"}, 0x0, 0x0, @userptr, 0x4}) [ 197.973401][T14469] RAX: ffffffffffffffda RBX: 00007ffafaf46c90 RCX: 0000000000459829 [ 197.981342][T14469] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000020000080 [ 197.989286][T14469] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.997228][T14469] R10: 0000000000005112 R11: 0000000000000246 R12: 00007ffafaf476d4 [ 198.005169][T14469] R13: 00000000004c5e57 R14: 00000000004da878 R15: 0000000000000004 02:05:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="10000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 02:05:10 executing program 4 (fault-call:8 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5112, 0x0) 02:05:10 executing program 5: r0 = socket$kcm(0x2, 0xae8b2bc41cc5bd67, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 02:05:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x8903, &(0x7f0000000040)={r1, r0}) [ 198.097204][ T3615] WARNING: CPU: 1 PID: 3615 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 198.106102][ T3615] Kernel panic - not syncing: panic_on_warn set ... [ 198.106123][ T3907] kobject: 'loop4' (00000000e8dc0b62): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 198.112668][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 198.112673][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.112686][ T3615] Workqueue: events bpf_prog_free_deferred [ 198.112690][ T3615] Call Trace: [ 198.112703][ T3615] dump_stack+0x1d8/0x2f8 [ 198.112712][ T3615] panic+0x25c/0x799 [ 198.112719][ T3615] ? __warn+0x126/0x230 [ 198.112728][ T3615] __warn+0x22f/0x230 [ 198.112735][ T3615] ? bpf_jit_free+0x1a8/0x1f0 [ 198.112745][ T3615] report_bug+0x190/0x290 [ 198.112767][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 198.112771][ T3615] #PF: supervisor read access in kernel mode [ 198.112776][ T3615] #PF: error_code(0x0000) - not-present page [ 198.112779][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 198.112795][ T3615] Oops: 0000 [#1] PREEMPT SMP KASAN [ 198.112802][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 198.112806][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.112812][ T3615] Workqueue: events bpf_prog_free_deferred [ 198.112823][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 198.112831][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 198.112835][ T3615] RSP: 0018:ffff88809b9cf828 EFLAGS: 00010806 [ 198.112845][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 198.270029][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 198.277975][ T3615] RBP: ffff88809b9cf860 R08: ffffffff817dc33b R09: 0000000000000001 [ 198.285921][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 198.293865][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 198.301810][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 198.310709][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.317269][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 198.325217][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 198.333168][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 198.341118][ T3615] Call Trace: [ 198.344396][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 198.352168][ T3615] #PF: supervisor read access in kernel mode [ 198.358123][ T3615] #PF: error_code(0x0000) - not-present page [ 198.364070][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 198.371605][ T3615] Oops: 0000 [#2] PREEMPT SMP KASAN [ 198.376774][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 198.384371][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.394406][ T3615] Workqueue: events bpf_prog_free_deferred [ 198.400190][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 198.406052][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 198.425625][ T3615] RSP: 0018:ffff88809b9cf450 EFLAGS: 00010806 [ 198.431662][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 198.439604][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 198.447547][ T3615] RBP: ffff88809b9cf488 R08: ffffffff817dc33b R09: 0000000000000001 [ 198.455491][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 198.463435][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 198.471382][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 198.480368][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.486924][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 198.494868][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 198.502813][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 198.510754][ T3615] Call Trace: [ 198.514025][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 198.521708][ T3615] #PF: supervisor read access in kernel mode [ 198.527658][ T3615] #PF: error_code(0x0000) - not-present page [ 198.533604][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 198.541126][ T3615] Oops: 0000 [#3] PREEMPT SMP KASAN [ 198.546296][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 198.553893][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.563922][ T3615] Workqueue: events bpf_prog_free_deferred [ 198.569704][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 198.575571][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 198.595142][ T3615] RSP: 0018:ffff88809b9cf080 EFLAGS: 00010806 [ 198.601177][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 198.609121][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 198.617067][ T3615] RBP: ffff88809b9cf0b8 R08: ffffffff817dc33b R09: 0000000000000001 [ 198.625010][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 198.632955][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 198.640900][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 198.649799][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.656353][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 198.664296][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 198.672257][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 198.680199][ T3615] Call Trace: [ 198.683469][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 198.691152][ T3615] #PF: supervisor read access in kernel mode [ 198.697099][ T3615] #PF: error_code(0x0000) - not-present page [ 198.703046][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 198.710566][ T3615] Oops: 0000 [#4] PREEMPT SMP KASAN [ 198.715760][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 198.723358][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.733390][ T3615] Workqueue: events bpf_prog_free_deferred [ 198.739168][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 198.745027][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 198.764600][ T3615] RSP: 0018:ffff88809b9cecb0 EFLAGS: 00010806 [ 198.770638][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 198.778579][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 198.786520][ T3615] RBP: ffff88809b9cece8 R08: ffffffff817dc33b R09: 0000000000000001 [ 198.794465][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 198.802411][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 198.810357][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 198.819258][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.825810][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 198.834224][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 198.842174][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 198.850120][ T3615] Call Trace: [ 198.853396][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 198.861080][ T3615] #PF: supervisor read access in kernel mode [ 198.867025][ T3615] #PF: error_code(0x0000) - not-present page [ 198.872970][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 198.880489][ T3615] Oops: 0000 [#5] PREEMPT SMP KASAN [ 198.885657][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 198.893257][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.903289][ T3615] Workqueue: events bpf_prog_free_deferred [ 198.909067][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 198.914928][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 198.934588][ T3615] RSP: 0018:ffff88809b9ce8e0 EFLAGS: 00010806 [ 198.940628][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 198.948571][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 198.956513][ T3615] RBP: ffff88809b9ce918 R08: ffffffff817dc33b R09: 0000000000000001 [ 198.964458][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 198.972400][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 198.980344][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 198.989242][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.995799][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 199.003744][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.011689][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.019632][ T3615] Call Trace: [ 199.022904][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 199.030584][ T3615] #PF: supervisor read access in kernel mode [ 199.036539][ T3615] #PF: error_code(0x0000) - not-present page [ 199.042487][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 199.050005][ T3615] Oops: 0000 [#6] PREEMPT SMP KASAN [ 199.055175][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 199.062771][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.072801][ T3615] Workqueue: events bpf_prog_free_deferred [ 199.078583][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 199.084444][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 199.104017][ T3615] RSP: 0018:ffff88809b9ce510 EFLAGS: 00010806 [ 199.110052][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 199.117998][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 199.126028][ T3615] RBP: ffff88809b9ce548 R08: ffffffff817dc33b R09: 0000000000000001 [ 199.133969][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 199.141911][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 199.149854][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 199.158752][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.165323][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 199.173268][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.181213][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.189170][ T3615] Call Trace: [ 199.192441][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 199.200337][ T3615] #PF: supervisor read access in kernel mode [ 199.206284][ T3615] #PF: error_code(0x0000) - not-present page [ 199.212229][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 199.219746][ T3615] Oops: 0000 [#7] PREEMPT SMP KASAN [ 199.224914][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 199.232507][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.242539][ T3615] Workqueue: events bpf_prog_free_deferred [ 199.248319][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 199.254179][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 199.273752][ T3615] RSP: 0018:ffff88809b9ce140 EFLAGS: 00010806 [ 199.279787][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 199.287732][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 199.295689][ T3615] RBP: ffff88809b9ce178 R08: ffffffff817dc33b R09: 0000000000000001 [ 199.303631][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 199.311576][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 199.319519][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 199.328416][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.334971][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 199.342915][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.351807][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.359749][ T3615] Call Trace: [ 199.363019][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 199.370705][ T3615] #PF: supervisor read access in kernel mode [ 199.376651][ T3615] #PF: error_code(0x0000) - not-present page [ 199.382597][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 199.390113][ T3615] Oops: 0000 [#8] PREEMPT SMP KASAN [ 199.395299][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 199.402899][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.412931][ T3615] Workqueue: events bpf_prog_free_deferred [ 199.418710][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 199.424574][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 199.444148][ T3615] RSP: 0018:ffff88809b9cdd70 EFLAGS: 00010806 [ 199.450185][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 199.458132][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 199.466075][ T3615] RBP: ffff88809b9cdda8 R08: ffffffff817dc33b R09: 0000000000000001 [ 199.474018][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 199.481960][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 199.489905][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 199.498806][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.505359][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 199.513305][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.521251][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.529192][ T3615] Call Trace: [ 199.532459][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 199.540143][ T3615] #PF: supervisor read access in kernel mode [ 199.546089][ T3615] #PF: error_code(0x0000) - not-present page [ 199.552033][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 199.559548][ T3615] Oops: 0000 [#9] PREEMPT SMP KASAN [ 199.564716][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 199.572313][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.582344][ T3615] Workqueue: events bpf_prog_free_deferred [ 199.588123][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 199.593986][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 199.613559][ T3615] RSP: 0018:ffff88809b9cd9a0 EFLAGS: 00010806 [ 199.619597][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 199.627545][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 199.635488][ T3615] RBP: ffff88809b9cd9d8 R08: ffffffff817dc33b R09: 0000000000000001 [ 199.643432][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 199.651377][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 199.659787][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 199.668717][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.675274][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 199.683239][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.691186][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.699131][ T3615] Call Trace: [ 199.702413][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 199.710097][ T3615] #PF: supervisor read access in kernel mode [ 199.716049][ T3615] #PF: error_code(0x0000) - not-present page [ 199.721997][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 199.729518][ T3615] Oops: 0000 [#10] PREEMPT SMP KASAN [ 199.735974][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 199.743570][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.753605][ T3615] Workqueue: events bpf_prog_free_deferred [ 199.759385][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 199.765244][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 199.784824][ T3615] RSP: 0018:ffff88809b9cd5d0 EFLAGS: 00010806 [ 199.790860][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 199.798803][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 199.806746][ T3615] RBP: ffff88809b9cd608 R08: ffffffff817dc33b R09: 0000000000000001 [ 199.814689][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 199.822635][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 199.830670][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 199.839571][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.846131][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 199.854076][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.862021][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.869965][ T3615] Call Trace: [ 199.873239][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 199.880922][ T3615] #PF: supervisor read access in kernel mode [ 199.886870][ T3615] #PF: error_code(0x0000) - not-present page [ 199.892816][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 199.900335][ T3615] Oops: 0000 [#11] PREEMPT SMP KASAN [ 199.905595][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 199.913190][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.923230][ T3615] Workqueue: events bpf_prog_free_deferred [ 199.929012][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 199.934875][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 199.954449][ T3615] RSP: 0018:ffff88809b9cd200 EFLAGS: 00010806 [ 199.960484][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 199.968428][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 199.976371][ T3615] RBP: ffff88809b9cd238 R08: ffffffff817dc33b R09: 0000000000000001 [ 199.984315][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 199.992260][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 200.000206][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 200.009105][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.015669][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 200.023628][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.031572][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 200.039518][ T3615] Call Trace: [ 200.042792][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 200.050476][ T3615] #PF: supervisor read access in kernel mode [ 200.056471][ T3615] #PF: error_code(0x0000) - not-present page [ 200.062417][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 200.069938][ T3615] Oops: 0000 [#12] PREEMPT SMP KASAN [ 200.075193][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 200.082787][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.092814][ T3615] Workqueue: events bpf_prog_free_deferred [ 200.098596][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 200.104458][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 200.124048][ T3615] RSP: 0018:ffff88809b9cce30 EFLAGS: 00010806 [ 200.130086][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 200.138028][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 200.145968][ T3615] RBP: ffff88809b9cce68 R08: ffffffff817dc33b R09: 0000000000000001 [ 200.153912][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 200.161858][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 200.169802][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 200.178699][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.185251][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 200.193196][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.201138][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 200.209083][ T3615] Call Trace: [ 200.212352][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 200.220036][ T3615] #PF: supervisor read access in kernel mode [ 200.225983][ T3615] #PF: error_code(0x0000) - not-present page [ 200.231939][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 200.239464][ T3615] Oops: 0000 [#13] PREEMPT SMP KASAN [ 200.244717][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 200.252313][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.262345][ T3615] Workqueue: events bpf_prog_free_deferred [ 200.268123][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 200.273986][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 200.293562][ T3615] RSP: 0018:ffff88809b9cca60 EFLAGS: 00010806 [ 200.299598][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 200.307542][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 200.315486][ T3615] RBP: ffff88809b9cca98 R08: ffffffff817dc33b R09: 0000000000000001 [ 200.323442][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 200.331388][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 200.339333][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 200.348232][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.354789][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 200.362734][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.370680][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 200.378621][ T3615] Call Trace: [ 200.381892][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 200.389574][ T3615] #PF: supervisor read access in kernel mode [ 200.395528][ T3615] #PF: error_code(0x0000) - not-present page [ 200.401474][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 200.408992][ T3615] Oops: 0000 [#14] PREEMPT SMP KASAN [ 200.414249][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 200.421847][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.431877][ T3615] Workqueue: events bpf_prog_free_deferred [ 200.437660][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 200.443521][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 200.463098][ T3615] RSP: 0018:ffff88809b9cc690 EFLAGS: 00010806 [ 200.469134][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 200.477105][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 200.485049][ T3615] RBP: ffff88809b9cc6c8 R08: ffffffff817dc33b R09: 0000000000000001 [ 200.492992][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 200.500934][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 200.508877][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 200.517783][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.524337][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 200.532283][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.540228][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 200.548169][ T3615] Call Trace: [ 200.551438][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 200.559123][ T3615] #PF: supervisor read access in kernel mode [ 200.565073][ T3615] #PF: error_code(0x0000) - not-present page [ 200.571020][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 200.578553][ T3615] Oops: 0000 [#15] PREEMPT SMP KASAN [ 200.583809][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 200.591405][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.601437][ T3615] Workqueue: events bpf_prog_free_deferred [ 200.607219][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 200.613082][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 200.632658][ T3615] RSP: 0018:ffff88809b9cc2c0 EFLAGS: 00010806 [ 200.638701][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 200.646642][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 200.654586][ T3615] RBP: ffff88809b9cc2f8 R08: ffffffff817dc33b R09: 0000000000000001 [ 200.662531][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 200.670473][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 200.678419][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 200.687319][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.693875][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 200.705726][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.713673][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 200.721616][ T3615] Call Trace: [ 200.724895][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 200.732576][ T3615] #PF: supervisor read access in kernel mode [ 200.738532][ T3615] #PF: error_code(0x0000) - not-present page [ 200.744481][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 200.751998][ T3615] Oops: 0000 [#16] PREEMPT SMP KASAN [ 200.757251][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 200.764857][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.774887][ T3615] Workqueue: events bpf_prog_free_deferred [ 200.780675][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 200.786540][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 200.806114][ T3615] RSP: 0018:ffff88809b9cbef0 EFLAGS: 00010806 [ 200.812151][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 200.820095][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 200.828569][ T3615] RBP: ffff88809b9cbf28 R08: ffffffff817dc33b R09: 0000000000000001 [ 200.836517][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 200.844461][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 200.852407][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 200.861309][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.867863][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 200.875809][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.883753][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 200.891694][ T3615] Call Trace: [ 200.894974][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 200.902658][ T3615] #PF: supervisor read access in kernel mode [ 200.908604][ T3615] #PF: error_code(0x0000) - not-present page [ 200.915279][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 200.922799][ T3615] Oops: 0000 [#17] PREEMPT SMP KASAN [ 200.928058][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 200.935653][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.945686][ T3615] Workqueue: events bpf_prog_free_deferred [ 200.951469][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 200.957329][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 200.976903][ T3615] RSP: 0018:ffff88809b9cbb20 EFLAGS: 00010806 [ 200.982938][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 200.990883][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 200.998825][ T3615] RBP: ffff88809b9cbb58 R08: ffffffff817dc33b R09: 0000000000000001 [ 201.006768][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 201.014712][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 201.022654][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 201.031555][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.038116][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 201.046060][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.054005][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 201.061945][ T3615] Call Trace: [ 201.065210][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 201.072891][ T3615] #PF: supervisor read access in kernel mode [ 201.078840][ T3615] #PF: error_code(0x0000) - not-present page [ 201.084783][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 201.092301][ T3615] Oops: 0000 [#18] PREEMPT SMP KASAN [ 201.097554][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 201.105147][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.115179][ T3615] Workqueue: events bpf_prog_free_deferred [ 201.120961][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 201.126823][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 201.146396][ T3615] RSP: 0018:ffff88809b9cb750 EFLAGS: 00010806 [ 201.152431][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 201.160374][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 201.168318][ T3615] RBP: ffff88809b9cb788 R08: ffffffff817dc33b R09: 0000000000000001 [ 201.176259][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 201.184202][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 201.192146][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 201.201044][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.207596][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 201.215543][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.223487][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 201.231431][ T3615] Call Trace: [ 201.234699][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 201.242380][ T3615] #PF: supervisor read access in kernel mode [ 201.248326][ T3615] #PF: error_code(0x0000) - not-present page [ 201.254273][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 201.261790][ T3615] Oops: 0000 [#19] PREEMPT SMP KASAN [ 201.267046][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 201.274642][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.284672][ T3615] Workqueue: events bpf_prog_free_deferred [ 201.290454][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 201.296317][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 201.315892][ T3615] RSP: 0018:ffff88809b9cb380 EFLAGS: 00010806 [ 201.321927][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 201.329870][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 201.337813][ T3615] RBP: ffff88809b9cb3b8 R08: ffffffff817dc33b R09: 0000000000000001 [ 201.345756][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 201.353701][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 201.361648][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 201.370545][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.377099][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 201.385047][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.392990][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 201.400934][ T3615] Call Trace: [ 201.404200][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 201.411882][ T3615] #PF: supervisor read access in kernel mode [ 201.417828][ T3615] #PF: error_code(0x0000) - not-present page [ 201.423773][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 201.431292][ T3615] Oops: 0000 [#20] PREEMPT SMP KASAN [ 201.436546][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 201.444140][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.454182][ T3615] Workqueue: events bpf_prog_free_deferred [ 201.459960][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 201.465822][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 201.485397][ T3615] RSP: 0018:ffff88809b9cafb0 EFLAGS: 00010806 [ 201.491434][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 201.499380][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 201.507325][ T3615] RBP: ffff88809b9cafe8 R08: ffffffff817dc33b R09: 0000000000000001 [ 201.515267][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 201.523208][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 201.531151][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 201.540051][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.546604][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 201.554549][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.562491][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 201.570431][ T3615] Call Trace: [ 201.573702][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 201.581393][ T3615] #PF: supervisor read access in kernel mode [ 201.587348][ T3615] #PF: error_code(0x0000) - not-present page [ 201.593303][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 201.600820][ T3615] Oops: 0000 [#21] PREEMPT SMP KASAN [ 201.606076][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 201.613670][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.623700][ T3615] Workqueue: events bpf_prog_free_deferred [ 201.629480][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 201.635338][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 201.654911][ T3615] RSP: 0018:ffff88809b9cabe0 EFLAGS: 00010806 [ 201.661462][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 201.669409][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 201.677355][ T3615] RBP: ffff88809b9cac18 R08: ffffffff817dc33b R09: 0000000000000001 [ 201.685300][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 201.693242][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 201.701188][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 201.710087][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.716645][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 201.724592][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.732539][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 201.744042][ T3615] Call Trace: [ 201.747322][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 201.755007][ T3615] #PF: supervisor read access in kernel mode [ 201.760954][ T3615] #PF: error_code(0x0000) - not-present page [ 201.766901][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 201.774435][ T3615] Oops: 0000 [#22] PREEMPT SMP KASAN [ 201.779692][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 201.787289][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.797430][ T3615] Workqueue: events bpf_prog_free_deferred [ 201.803230][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 201.809093][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 201.829155][ T3615] RSP: 0018:ffff88809b9ca810 EFLAGS: 00010806 [ 201.835192][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 201.843134][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 201.851075][ T3615] RBP: ffff88809b9ca848 R08: ffffffff817dc33b R09: 0000000000000001 [ 201.859017][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 201.866977][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 201.874923][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 201.883820][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.890375][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 201.898324][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.906267][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 201.914208][ T3615] Call Trace: [ 201.917477][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 201.925161][ T3615] #PF: supervisor read access in kernel mode [ 201.931109][ T3615] #PF: error_code(0x0000) - not-present page [ 201.937056][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 201.944573][ T3615] Oops: 0000 [#23] PREEMPT SMP KASAN [ 201.949832][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 201.957428][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.967459][ T3615] Workqueue: events bpf_prog_free_deferred [ 201.973238][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 201.979103][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 201.998679][ T3615] RSP: 0018:ffff88809b9ca440 EFLAGS: 00010806 [ 202.004712][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 202.012657][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 202.020603][ T3615] RBP: ffff88809b9ca478 R08: ffffffff817dc33b R09: 0000000000000001 [ 202.028547][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 202.036490][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 202.044435][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 202.053336][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.059891][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 202.067839][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.075784][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 202.083726][ T3615] Call Trace: [ 202.087074][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 202.094765][ T3615] #PF: supervisor read access in kernel mode [ 202.100714][ T3615] #PF: error_code(0x0000) - not-present page [ 202.106663][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 202.114183][ T3615] Oops: 0000 [#24] PREEMPT SMP KASAN [ 202.119440][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 202.127034][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.137065][ T3615] Workqueue: events bpf_prog_free_deferred [ 202.142845][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 202.148708][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 202.168281][ T3615] RSP: 0018:ffff88809b9ca070 EFLAGS: 00010806 [ 202.174315][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 202.182260][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 202.190206][ T3615] RBP: ffff88809b9ca0a8 R08: ffffffff817dc33b R09: 0000000000000001 [ 202.198164][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 202.206110][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 202.214068][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 202.222970][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.229523][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 202.237468][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.245413][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 202.253357][ T3615] Call Trace: [ 202.256628][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 202.264314][ T3615] #PF: supervisor read access in kernel mode [ 202.270263][ T3615] #PF: error_code(0x0000) - not-present page [ 202.276210][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 202.283730][ T3615] Oops: 0000 [#25] PREEMPT SMP KASAN [ 202.288989][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 202.296587][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.306615][ T3615] Workqueue: events bpf_prog_free_deferred [ 202.312395][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 202.318257][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 202.337834][ T3615] RSP: 0018:ffff88809b9c9ca0 EFLAGS: 00010806 [ 202.343869][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 202.351903][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 202.359847][ T3615] RBP: ffff88809b9c9cd8 R08: ffffffff817dc33b R09: 0000000000000001 [ 202.367790][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 202.375839][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 202.383783][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 202.392683][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.399246][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 202.407192][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.415134][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 202.423077][ T3615] Call Trace: [ 202.426342][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 202.434030][ T3615] #PF: supervisor read access in kernel mode [ 202.439980][ T3615] #PF: error_code(0x0000) - not-present page [ 202.445926][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 202.453444][ T3615] Oops: 0000 [#26] PREEMPT SMP KASAN [ 202.458700][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 202.466295][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.476325][ T3615] Workqueue: events bpf_prog_free_deferred [ 202.482105][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 202.487968][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 202.507542][ T3615] RSP: 0018:ffff88809b9c98d0 EFLAGS: 00010806 [ 202.513579][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 202.521524][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 202.529468][ T3615] RBP: ffff88809b9c9908 R08: ffffffff817dc33b R09: 0000000000000001 [ 202.537411][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 202.545358][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 202.553303][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 202.562201][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.568753][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 202.576697][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.584643][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 202.592584][ T3615] Call Trace: [ 202.595854][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 202.603538][ T3615] #PF: supervisor read access in kernel mode [ 202.609482][ T3615] #PF: error_code(0x0000) - not-present page [ 202.615427][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 202.622944][ T3615] Oops: 0000 [#27] PREEMPT SMP KASAN [ 202.628197][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 202.635792][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.645843][ T3615] Workqueue: events bpf_prog_free_deferred [ 202.651624][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 202.657486][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 202.677059][ T3615] RSP: 0018:ffff88809b9c9500 EFLAGS: 00010806 [ 202.683096][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 202.691040][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 202.698983][ T3615] RBP: ffff88809b9c9538 R08: ffffffff817dc33b R09: 0000000000000001 [ 202.706924][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 202.714870][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 202.722815][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 202.731716][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.738273][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 202.746219][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.754162][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 202.762102][ T3615] Call Trace: [ 202.765369][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 202.773053][ T3615] #PF: supervisor read access in kernel mode [ 202.779001][ T3615] #PF: error_code(0x0000) - not-present page [ 202.784946][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 202.792464][ T3615] Oops: 0000 [#28] PREEMPT SMP KASAN [ 202.797721][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 202.805319][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.815355][ T3615] Workqueue: events bpf_prog_free_deferred [ 202.821135][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 202.827530][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 202.847122][ T3615] RSP: 0018:ffff88809b9c9130 EFLAGS: 00010806 [ 202.853157][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 202.861104][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 202.869046][ T3615] RBP: ffff88809b9c9168 R08: ffffffff817dc33b R09: 0000000000000001 [ 202.876987][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 202.884933][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 202.892880][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 202.901781][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.908341][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 202.916286][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.924230][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 202.932170][ T3615] Call Trace: [ 202.935444][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 202.943129][ T3615] #PF: supervisor read access in kernel mode [ 202.949080][ T3615] #PF: error_code(0x0000) - not-present page [ 202.955025][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 202.962545][ T3615] Oops: 0000 [#29] PREEMPT SMP KASAN [ 202.967801][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 202.975399][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.985431][ T3615] Workqueue: events bpf_prog_free_deferred [ 202.991211][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 202.997075][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 203.016652][ T3615] RSP: 0018:ffff88809b9c8d60 EFLAGS: 00010806 [ 203.022688][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 203.030633][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 203.038578][ T3615] RBP: ffff88809b9c8d98 R08: ffffffff817dc33b R09: 0000000000000001 [ 203.046523][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 203.054468][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 203.062410][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 203.071313][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.077870][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 203.085816][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.093762][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 203.101709][ T3615] Call Trace: [ 203.104973][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 203.112658][ T3615] #PF: supervisor read access in kernel mode [ 203.118603][ T3615] #PF: error_code(0x0000) - not-present page [ 203.124551][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 203.132071][ T3615] Oops: 0000 [#30] PREEMPT SMP KASAN [ 203.137336][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 203.144933][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.154963][ T3615] Workqueue: events bpf_prog_free_deferred [ 203.160744][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 203.166607][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 203.186183][ T3615] RSP: 0018:ffff88809b9c8990 EFLAGS: 00010806 [ 203.192219][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 203.200168][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 203.208110][ T3615] RBP: ffff88809b9c89c8 R08: ffffffff817dc33b R09: 0000000000000001 [ 203.216053][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 203.224001][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 203.231947][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 203.240848][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.247401][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 203.255345][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.263288][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 203.271235][ T3615] Call Trace: [ 203.274508][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 203.282192][ T3615] #PF: supervisor read access in kernel mode [ 203.288142][ T3615] #PF: error_code(0x0000) - not-present page [ 203.294089][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 203.301612][ T3615] Thread overran stack, or stack corrupted [ 203.307386][ T3615] Oops: 0000 [#31] PREEMPT SMP KASAN [ 203.312642][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 203.320234][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.330262][ T3615] Workqueue: events bpf_prog_free_deferred [ 203.336042][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 203.341902][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 203.361474][ T3615] RSP: 0018:ffff88809b9c85c0 EFLAGS: 00010806 [ 203.367510][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 203.375475][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 203.383418][ T3615] RBP: ffff88809b9c85f8 R08: ffffffff817dc33b R09: 0000000000000001 [ 203.391360][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 203.399303][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 203.407246][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 203.416144][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.422698][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 203.430642][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.438674][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 203.446615][ T3615] Call Trace: [ 203.449885][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 203.457570][ T3615] #PF: supervisor read access in kernel mode [ 203.463513][ T3615] #PF: error_code(0x0000) - not-present page [ 203.469459][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 203.476974][ T3615] Thread overran stack, or stack corrupted [ 203.482748][ T3615] Oops: 0000 [#32] PREEMPT SMP KASAN [ 203.488003][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 203.495598][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.505629][ T3615] Workqueue: events bpf_prog_free_deferred [ 203.511407][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 203.517273][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 203.536847][ T3615] RSP: 0018:ffff88809b9c81f0 EFLAGS: 00010806 [ 203.542882][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 203.550827][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 203.558771][ T3615] RBP: ffff88809b9c8228 R08: ffffffff817dc33b R09: 0000000000000001 [ 203.566814][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 203.574764][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 203.582710][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 203.591607][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.598160][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 203.606116][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.614061][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 203.622001][ T3615] Call Trace: [ 203.625270][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 203.632953][ T3615] #PF: supervisor read access in kernel mode [ 203.638900][ T3615] #PF: error_code(0x0000) - not-present page [ 203.644845][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 203.652362][ T3615] Thread overran stack, or stack corrupted [ 203.658144][ T3615] Oops: 0000 [#33] PREEMPT SMP KASAN [ 203.663922][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 203.671523][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.681560][ T3615] Workqueue: events bpf_prog_free_deferred [ 203.687345][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 203.693208][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 203.712782][ T3615] RSP: 0018:ffff88809b9c7e20 EFLAGS: 00010806 [ 203.718819][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 203.726762][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 203.734967][ T3615] RBP: ffff88809b9c7e58 R08: ffffffff817dc33b R09: 0000000000000001 [ 203.743184][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 203.751129][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 203.759075][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 203.767972][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.774525][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 203.782475][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.790419][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 203.798372][ T3615] Call Trace: [ 203.801654][ T3615] ? __bad_area_nosemaphore+0x108/0x470 [ 203.807169][ T3615] ? vprintk_emit+0x239/0x3a0 [ 203.811823][ T3615] ? bad_area_nosemaphore+0x2d/0x40 [ 203.816994][ T3615] ? __do_page_fault+0x1a4/0x1f0 [ 203.821904][ T3615] ? do_page_fault+0x99/0xb0 [ 203.826471][ T3615] ? page_fault+0x39/0x40 [ 203.830786][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 203.838472][ T3615] #PF: supervisor read access in kernel mode [ 203.844430][ T3615] #PF: error_code(0x0000) - not-present page [ 203.850379][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 203.857897][ T3615] Thread overran stack, or stack corrupted [ 203.863674][ T3615] Oops: 0000 [#34] PREEMPT SMP KASAN [ 203.868930][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 203.876524][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.886553][ T3615] Workqueue: events bpf_prog_free_deferred [ 203.892332][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 203.898195][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 203.917771][ T3615] RSP: 0018:ffff88809b9c7a50 EFLAGS: 00010806 [ 203.923804][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 203.931749][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 203.939694][ T3615] RBP: ffff88809b9c7a88 R08: ffffffff817dc33b R09: 0000000000000001 [ 203.947638][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 203.955583][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 203.963526][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 203.972424][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.978981][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 203.986925][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.994869][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 204.002810][ T3615] Call Trace: [ 204.006073][ T3615] ? __bad_area_nosemaphore+0x108/0x470 [ 204.011587][ T3615] ? vprintk_emit+0x239/0x3a0 [ 204.016241][ T3615] ? bad_area_nosemaphore+0x2d/0x40 [ 204.021414][ T3615] ? __do_page_fault+0x1a4/0x1f0 [ 204.026324][ T3615] ? do_page_fault+0x99/0xb0 [ 204.030886][ T3615] ? page_fault+0x39/0x40 [ 204.035196][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 204.042889][ T3615] #PF: supervisor read access in kernel mode [ 204.048837][ T3615] #PF: error_code(0x0000) - not-present page [ 204.054782][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 204.062311][ T3615] Thread overran stack, or stack corrupted [ 204.068090][ T3615] Oops: 0000 [#35] PREEMPT SMP KASAN [ 204.073346][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 204.080940][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.090969][ T3615] Workqueue: events bpf_prog_free_deferred [ 204.096748][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 204.102611][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 204.122185][ T3615] RSP: 0018:ffff88809b9c7680 EFLAGS: 00010806 [ 204.128224][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 204.136168][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 204.144108][ T3615] RBP: ffff88809b9c76b8 R08: ffffffff817dc33b R09: 0000000000000001 [ 204.152053][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 204.159995][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 204.167943][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 204.176842][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.183485][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 204.191431][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 204.199387][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 204.207327][ T3615] Call Trace: [ 204.210605][ T3615] ? __bad_area_nosemaphore+0x108/0x470 [ 204.216236][ T3615] ? vprintk_emit+0x239/0x3a0 [ 204.220888][ T3615] ? bad_area_nosemaphore+0x2d/0x40 [ 204.226058][ T3615] ? __do_page_fault+0x1a4/0x1f0 [ 204.230966][ T3615] ? do_page_fault+0x99/0xb0 [ 204.235529][ T3615] ? page_fault+0x39/0x40 [ 204.239836][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 204.247521][ T3615] #PF: supervisor read access in kernel mode [ 204.253471][ T3615] #PF: error_code(0x0000) - not-present page [ 204.259546][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 204.267063][ T3615] Thread overran stack, or stack corrupted [ 204.272840][ T3615] Oops: 0000 [#36] PREEMPT SMP KASAN [ 204.278095][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 204.285704][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.295737][ T3615] Workqueue: events bpf_prog_free_deferred [ 204.301522][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 204.307385][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 204.326961][ T3615] RSP: 0018:ffff88809b9c72b0 EFLAGS: 00010806 [ 204.332995][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 204.340938][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 204.348880][ T3615] RBP: ffff88809b9c72e8 R08: ffffffff817dc33b R09: 0000000000000001 [ 204.356839][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 204.364785][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 204.372731][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 204.381633][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.388190][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 204.396138][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 204.404080][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 204.412023][ T3615] Call Trace: [ 204.415288][ T3615] ? __bad_area_nosemaphore+0x108/0x470 [ 204.420807][ T3615] ? vprintk_emit+0x239/0x3a0 [ 204.425459][ T3615] ? bad_area_nosemaphore+0x2d/0x40 [ 204.430628][ T3615] ? __do_page_fault+0x1a4/0x1f0 [ 204.435535][ T3615] ? do_page_fault+0x99/0xb0 [ 204.440098][ T3615] ? page_fault+0x39/0x40 [ 204.444409][ T3615] BUG: unable to handle page fault for address: fffffbfff4004000 [ 204.452091][ T3615] #PF: supervisor read access in kernel mode [ 204.458037][ T3615] #PF: error_code(0x0000) - not-present page [ 204.463984][ T3615] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 99ab9067 PTE 0 [ 204.471503][ T3615] Thread overran stack, or stack corrupted [ 204.477279][ T3615] Oops: 0000 [#37] PREEMPT SMP KASAN [ 204.482539][ T3615] CPU: 1 PID: 3615 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #84 [ 204.490136][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.500166][ T3615] Workqueue: events bpf_prog_free_deferred [ 204.505963][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 204.511828][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 204.531407][ T3615] RSP: 0018:ffff88809b9c6ee0 EFLAGS: 00010806 [ 204.537442][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 204.545385][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 204.553327][ T3615] RBP: ffff88809b9c6f18 R08: ffffffff817dc33b R09: 0000000000000001 [ 204.561270][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 204.569333][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 204.577277][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 204.586181][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.592737][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 204.600683][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 204.608633][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 204.616574][ T3615] Call Trace: [ 204.619828][ T3615] Modules linked in: [ 204.623698][ T3615] CR2: fffffbfff4004000 [ 204.627837][ T3615] ---[ end trace 2d7bc00130eb4b7c ]--- [ 204.633271][ T3615] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 204.639134][ T3615] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 204.658710][ T3615] RSP: 0018:ffff88809b9cf828 EFLAGS: 00010806 [ 204.664747][ T3615] RAX: 1ffffffff4004000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 204.672692][ T3615] RDX: ffff88809b9e2500 RSI: ffffffffff7a5ce0 RDI: ffffffffa0020000 [ 204.680647][ T3615] RBP: ffff88809b9cf860 R08: ffffffff817dc33b R09: 0000000000000001 [ 204.688593][ T3615] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0020000 [ 204.696533][ T3615] R13: 0000000000000000 R14: ffffffffff7a5ce0 R15: ffff88809bb2d878 [ 204.704480][ T3615] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 204.713379][ T3615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.719935][ T3615] CR2: fffffbfff4004000 CR3: 0000000088387000 CR4: 00000000001406e0 [ 204.727880][ T3615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 204.735828][ T3615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 204.743773][ T3615] Kernel panic - not syncing: Fatal exception [ 204.750926][ T3615] Kernel Offset: disabled [ 204.755243][ T3615] Rebooting in 86400 seconds..