00'}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:05:40 executing program 1: 20:05:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) 20:05:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 20:05:41 executing program 1: 20:05:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) 20:05:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:05:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffdc}, {0x0, 0xfffffffffffffffa}, {&(0x7f0000000000)="665306", 0xffffffffffffffee}], 0x12d, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:05:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:43 executing program 1: 20:05:43 executing program 5: 20:05:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) 20:05:43 executing program 5: 20:05:43 executing program 1: 20:05:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:43 executing program 5: 20:05:44 executing program 1: 20:05:44 executing program 5: 20:05:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:05:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:46 executing program 1: 20:05:46 executing program 5: 20:05:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 20:05:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000002, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0xa100, 0x151c5eb2551ad17) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00', 0x0, 0x8}, 0x143) dup2(r2, r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r7, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={r7, 0x3c, &(0x7f0000000300)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e23, @rand_addr=0x8}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r7, 0x1}, 0x8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) r8 = gettid() tkill(r8, 0x1000000000013) r9 = gettid() tkill(r9, 0x1000000000013) ptrace$setopts(0xffffffffffffffff, r9, 0x0, 0x240d0ff26659e8d9) open$dir(&(0x7f0000000000)='./file0\x00', 0x20220, 0x4) tkill(r0, 0x3c) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r10, 0x0, r11) r12 = epoll_create(0x100) ioctl$FICLONE(r10, 0x40049409, r12) ptrace$cont(0x18, r0, 0x0, 0x0) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r13) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket(0x10, 0x80002, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x202000) r17 = getpid() ptrace$cont(0x20, r17, 0x9, 0x2) 20:05:46 executing program 1: 20:05:46 executing program 5: 20:05:47 executing program 1: 20:05:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:47 executing program 5: 20:05:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:05:49 executing program 1: 20:05:49 executing program 5: 20:05:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 20:05:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) syz_emit_ethernet(0x1017, &(0x7f0000000200)={@dev={[], 0x10}, @random="58b51f520bd0", [], {@llc_tr={0x11, {@snap={0x0, 0xff, "11a3", "e5816d", 0x16, "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"}}}}}, &(0x7f0000000080)={0x0, 0x3, [0x4a3, 0x7e2, 0x77d, 0x60a]}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20180, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000040)={0x100, 0x0, 0x1000, 0x9, 0xbe, 0x14, 0x24, "07ed98e1452bcfef369fd62916a6228ce688edaf", "b41934dc0dd9df1e91d5037e3df440cc8704149d"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:05:50 executing program 1: 20:05:50 executing program 5: 20:05:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="286772cd1adb6f75705f6964ff", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) 20:05:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x40, &(0x7f00000000c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x32, 0x0, 0x8, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x1e, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}, @guehdr={0x1}], "4b174095bd47a4ff836d"}}}}}, 0x0) 20:05:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f0000000000)={@remote}, 0x95) 20:05:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:05:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:05:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000140)) 20:05:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") 20:05:52 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000180)}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRESOCT=0x0, @ANYPTR, @ANYRES64, @ANYRES32], 0x0, 0x2b}, 0x20) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:05:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) 20:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x8, 0x3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x0, 0x5}) 20:05:53 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) r3 = memfd_create(&(0x7f00000002c0)='system.snckprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x10024}], 0xd) 20:05:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000000)=0x5ae8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:05:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) r1 = memfd_create(&(0x7f00000002c0)='system.snckprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x10024}], 0xd) r2 = gettid() tkill(r2, 0x1000000000013) r3 = syz_open_procfs(r2, &(0x7f0000000240)='net/connector\x00') getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000280), 0x4) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x9ea73535593b6a42) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000180)=""/182, &(0x7f00000000c0)=0xb6) r6 = dup2(r4, r0) ioctl$EVIOCGRAB(r6, 0x40044590, &(0x7f0000000000)=0x7) [ 1010.779958][ T2694] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 1010.779958][ T2694] program syz-executor.5 not setting count and/or reply_len properly 20:05:53 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1010.874637][ T2743] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 1010.874637][ T2743] program syz-executor.1 not setting count and/or reply_len properly 20:05:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") 20:05:53 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) r3 = memfd_create(&(0x7f00000002c0)='system.snckprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x10024}], 0xd) [ 1011.008029][ T2815] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 1011.008029][ T2815] program syz-executor.5 not setting count and/or reply_len properly [ 1011.008418][ T2814] FAULT_INJECTION: forcing a failure. [ 1011.008418][ T2814] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.088067][ T2814] CPU: 1 PID: 2814 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1011.097908][ T2814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.108055][ T2814] Call Trace: [ 1011.111361][ T2814] dump_stack+0x197/0x210 [ 1011.115709][ T2814] should_fail.cold+0xa/0x15 [ 1011.120299][ T2814] ? fault_create_debugfs_attr+0x180/0x180 [ 1011.126114][ T2814] ? ___might_sleep+0x163/0x2c0 [ 1011.130978][ T2814] __should_failslab+0x121/0x190 [ 1011.135923][ T2814] should_failslab+0x9/0x14 [ 1011.140438][ T2814] __kmalloc_track_caller+0x2dc/0x760 [ 1011.145846][ T2814] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1011.152210][ T2814] ? fput_many+0x12c/0x1a0 [ 1011.156630][ T2814] ? strndup_user+0x77/0xd0 [ 1011.161133][ T2814] memdup_user+0x26/0xd0 [ 1011.165373][ T2814] strndup_user+0x77/0xd0 [ 1011.169709][ T2814] ksys_mount+0x3c/0x150 [ 1011.173961][ T2814] __x64_sys_mount+0xbe/0x150 [ 1011.178654][ T2814] do_syscall_64+0xfa/0x790 [ 1011.183176][ T2814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.189068][ T2814] RIP: 0033:0x45a639 [ 1011.192967][ T2814] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1011.212575][ T2814] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1011.220994][ T2814] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 [ 1011.228969][ T2814] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 1011.236951][ T2814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1011.244931][ T2814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1011.252905][ T2814] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 20:05:56 executing program 5 (fault-call:2 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:05:56 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:05:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:05:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") [ 1013.657420][ T2830] FAULT_INJECTION: forcing a failure. [ 1013.657420][ T2830] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.664706][ T2831] FAULT_INJECTION: forcing a failure. [ 1013.664706][ T2831] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.692238][ T2830] CPU: 1 PID: 2830 Comm: syz-executor.5 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1013.702080][ T2830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.712315][ T2830] Call Trace: [ 1013.715631][ T2830] dump_stack+0x197/0x210 [ 1013.720000][ T2830] should_fail.cold+0xa/0x15 [ 1013.724621][ T2830] ? fault_create_debugfs_attr+0x180/0x180 [ 1013.730451][ T2830] ? ___might_sleep+0x163/0x2c0 [ 1013.735321][ T2830] __should_failslab+0x121/0x190 [ 1013.740273][ T2830] should_failslab+0x9/0x14 [ 1013.744794][ T2830] kmem_cache_alloc_node_trace+0x274/0x750 [ 1013.750607][ T2830] ? __fdget_pos+0xee/0x110 [ 1013.755119][ T2830] ? __kasan_check_read+0x11/0x20 [ 1013.760160][ T2830] __kmalloc_node+0x3d/0x70 [ 1013.764672][ T2830] kvmalloc_node+0x68/0x100 [ 1013.769186][ T2830] traverse+0x3e9/0x730 [ 1013.773348][ T2830] ? fput_many+0x12c/0x1a0 [ 1013.777784][ T2830] seq_lseek+0x168/0x3e0 [ 1013.782036][ T2830] ? traverse+0x730/0x730 [ 1013.786373][ T2830] ksys_lseek+0x116/0x1b0 [ 1013.790711][ T2830] __x64_sys_lseek+0x73/0xb0 [ 1013.795311][ T2830] do_syscall_64+0xfa/0x790 [ 1013.799829][ T2830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1013.805714][ T2830] RIP: 0033:0x45a639 [ 1013.809587][ T2830] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1013.829200][ T2830] RSP: 002b:00007f6ed6962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1013.837591][ T2830] RAX: ffffffffffffffda RBX: 00007f6ed6962c90 RCX: 000000000045a639 [ 1013.845542][ T2830] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1013.853504][ T2830] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1013.861455][ T2830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ed69636d4 [ 1013.869417][ T2830] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000005 [ 1013.877413][ T2831] CPU: 0 PID: 2831 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1013.887239][ T2831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.897306][ T2831] Call Trace: [ 1013.900611][ T2831] dump_stack+0x197/0x210 [ 1013.904979][ T2831] should_fail.cold+0xa/0x15 [ 1013.909600][ T2831] ? fault_create_debugfs_attr+0x180/0x180 [ 1013.915446][ T2831] ? ___might_sleep+0x163/0x2c0 [ 1013.920327][ T2831] __should_failslab+0x121/0x190 [ 1013.925287][ T2831] should_failslab+0x9/0x14 [ 1013.929807][ T2831] kmem_cache_alloc+0x2aa/0x710 [ 1013.934672][ T2831] ? __might_fault+0x12b/0x1e0 [ 1013.939461][ T2831] ? find_held_lock+0x35/0x130 [ 1013.944247][ T2831] getname_flags+0xd6/0x5b0 [ 1013.948776][ T2831] user_path_at_empty+0x2f/0x50 [ 1013.953649][ T2831] do_mount+0x150/0x1b50 [ 1013.957915][ T2831] ? copy_mount_string+0x40/0x40 [ 1013.962872][ T2831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1013.969128][ T2831] ? _copy_from_user+0x12c/0x1a0 [ 1013.974090][ T2831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1013.980348][ T2831] ? copy_mount_options+0x2e8/0x3f0 [ 1013.985574][ T2831] ksys_mount+0xdb/0x150 [ 1013.989844][ T2831] __x64_sys_mount+0xbe/0x150 [ 1013.994549][ T2831] do_syscall_64+0xfa/0x790 [ 1013.999090][ T2831] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:05:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x100008) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:05:56 executing program 1 (fault-call:5 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) [ 1013.999371][ T2847] FAULT_INJECTION: forcing a failure. [ 1013.999371][ T2847] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.004980][ T2831] RIP: 0033:0x45a639 [ 1014.004999][ T2831] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.005011][ T2831] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1014.005029][ T2831] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 20:05:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") [ 1014.005039][ T2831] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 1014.005050][ T2831] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1014.005061][ T2831] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1014.005071][ T2831] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 [ 1014.034704][ T2849] ptrace attach of "/root/syz-executor.3"[2848] was attempted by "/root/syz-executor.3"[2849] 20:05:56 executing program 5 (fault-call:2 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) [ 1014.146331][ T2847] CPU: 1 PID: 2847 Comm: syz-executor.1 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1014.156168][ T2847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.156180][ T2847] Call Trace: [ 1014.169532][ T2847] dump_stack+0x197/0x210 [ 1014.173881][ T2847] should_fail.cold+0xa/0x15 [ 1014.178488][ T2847] ? fault_create_debugfs_attr+0x180/0x180 [ 1014.184307][ T2847] ? ___might_sleep+0x163/0x2c0 [ 1014.189172][ T2847] __should_failslab+0x121/0x190 [ 1014.194123][ T2847] should_failslab+0x9/0x14 [ 1014.198634][ T2847] kmem_cache_alloc_node_trace+0x274/0x750 [ 1014.204461][ T2847] ? __fdget_pos+0xee/0x110 [ 1014.208966][ T2847] ? __kasan_check_read+0x11/0x20 [ 1014.213990][ T2847] __kmalloc_node+0x3d/0x70 [ 1014.214009][ T2847] kvmalloc_node+0x68/0x100 [ 1014.214026][ T2847] traverse+0x3e9/0x730 [ 1014.214039][ T2847] ? fput_many+0x12c/0x1a0 [ 1014.214060][ T2847] seq_lseek+0x168/0x3e0 [ 1014.214076][ T2847] ? traverse+0x730/0x730 [ 1014.240132][ T2847] ksys_lseek+0x116/0x1b0 [ 1014.244475][ T2847] __x64_sys_lseek+0x73/0xb0 [ 1014.249077][ T2847] do_syscall_64+0xfa/0x790 [ 1014.253605][ T2847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.259511][ T2847] RIP: 0033:0x45a639 [ 1014.263411][ T2847] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.283019][ T2847] RSP: 002b:00007f03fda94c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1014.284227][ T2859] FAULT_INJECTION: forcing a failure. 20:05:56 executing program 0 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:05:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x8, [@func={0x3, 0x0, 0x0, 0xc, 0x3}, @ptr={0xe}, @var={0x4, 0x0, 0x0, 0xe, 0x1}, @func={0xd, 0x0, 0x0, 0xc, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x2000000}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x9}}, @restrict={0xb}, @union={0x7, 0x2, 0x0, 0x5, 0x1, 0xfffff735, [{0x10, 0x0, 0xff}, {0x5, 0x5, 0x8}]}]}, {0x0, [0xab80adfadbea748d, 0x0, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000100), 0xb4}, 0x20) [ 1014.284227][ T2859] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.291433][ T2847] RAX: ffffffffffffffda RBX: 00007f03fda94c90 RCX: 000000000045a639 [ 1014.291443][ T2847] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1014.291451][ T2847] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1014.291460][ T2847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f03fda956d4 [ 1014.291469][ T2847] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000007 [ 1014.352918][ T2859] CPU: 1 PID: 2859 Comm: syz-executor.5 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1014.362745][ T2859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.372803][ T2859] Call Trace: [ 1014.376110][ T2859] dump_stack+0x197/0x210 [ 1014.380451][ T2859] should_fail.cold+0xa/0x15 [ 1014.385051][ T2859] ? fault_create_debugfs_attr+0x180/0x180 [ 1014.390869][ T2859] ? ___might_sleep+0x163/0x2c0 [ 1014.395724][ T2859] __should_failslab+0x121/0x190 [ 1014.400655][ T2859] should_failslab+0x9/0x14 [ 1014.400671][ T2859] kmem_cache_alloc_trace+0x2d3/0x790 [ 1014.400690][ T2859] ? seq_printf+0xbb/0xf0 [ 1014.414853][ T2859] cgroup_show_path+0xc6/0x5d0 [ 1014.419623][ T2859] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1014.425266][ T2859] kernfs_sop_show_path+0x130/0x1b0 [ 1014.430477][ T2859] ? kernfs_test_super+0x150/0x150 [ 1014.435601][ T2859] show_mountinfo+0x246/0x940 [ 1014.440289][ T2859] ? down_read_killable+0x490/0x490 [ 1014.445499][ T2859] ? show_vfsmnt+0x420/0x420 [ 1014.450096][ T2859] ? seq_list_start+0x9d/0xc0 [ 1014.454791][ T2859] m_show+0x61/0x80 [ 1014.458615][ T2859] traverse+0x1cd/0x730 [ 1014.462786][ T2859] seq_lseek+0x168/0x3e0 [ 1014.467031][ T2859] ? traverse+0x730/0x730 [ 1014.471367][ T2859] ksys_lseek+0x116/0x1b0 [ 1014.475721][ T2859] __x64_sys_lseek+0x73/0xb0 [ 1014.480320][ T2859] do_syscall_64+0xfa/0x790 [ 1014.484836][ T2859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.490731][ T2859] RIP: 0033:0x45a639 [ 1014.494627][ T2859] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.514236][ T2859] RSP: 002b:00007f6ed6962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1014.522673][ T2859] RAX: ffffffffffffffda RBX: 00007f6ed6962c90 RCX: 000000000045a639 [ 1014.530653][ T2859] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1014.538633][ T2859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1014.546171][ T2873] FAULT_INJECTION: forcing a failure. [ 1014.546171][ T2873] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1014.546601][ T2859] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ed69636d4 [ 1014.546616][ T2859] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000005 [ 1014.575713][ T2873] CPU: 0 PID: 2873 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1014.585533][ T2873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.595596][ T2873] Call Trace: [ 1014.598873][ T2873] dump_stack+0x197/0x210 [ 1014.603194][ T2873] should_fail.cold+0xa/0x15 [ 1014.607765][ T2873] ? perf_trace_run_bpf_submit+0x138/0x190 [ 1014.613558][ T2873] ? fault_create_debugfs_attr+0x180/0x180 [ 1014.619345][ T2873] ? perf_trace_lock+0x315/0x4c0 [ 1014.624291][ T2873] ? __lock_acquire+0x16f2/0x4a00 [ 1014.629307][ T2873] should_fail_alloc_page+0x50/0x60 [ 1014.634518][ T2873] __alloc_pages_nodemask+0x1a1/0x910 [ 1014.639872][ T2873] ? fs_reclaim_release+0xf/0x30 [ 1014.644805][ T2873] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1014.650527][ T2873] ? fs_reclaim_release+0xf/0x30 [ 1014.655453][ T2873] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1014.661244][ T2873] ? fault_create_debugfs_attr+0x180/0x180 [ 1014.667042][ T2873] cache_grow_begin+0x90/0xc60 [ 1014.671787][ T2873] ? getname_flags+0xd6/0x5b0 [ 1014.676455][ T2873] ? trace_hardirqs_off+0x62/0x240 [ 1014.681562][ T2873] kmem_cache_alloc+0x64e/0x710 [ 1014.686403][ T2873] ? __might_fault+0x12b/0x1e0 [ 1014.691159][ T2873] getname_flags+0xd6/0x5b0 [ 1014.695651][ T2873] user_path_at_empty+0x2f/0x50 [ 1014.700487][ T2873] do_mount+0x150/0x1b50 [ 1014.704721][ T2873] ? copy_mount_string+0x40/0x40 [ 1014.709652][ T2873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1014.715875][ T2873] ? _copy_from_user+0x12c/0x1a0 [ 1014.720812][ T2873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1014.727047][ T2873] ? copy_mount_options+0x2e8/0x3f0 [ 1014.732250][ T2873] ksys_mount+0xdb/0x150 [ 1014.736477][ T2873] __x64_sys_mount+0xbe/0x150 [ 1014.741149][ T2873] do_syscall_64+0xfa/0x790 [ 1014.745645][ T2873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.751520][ T2873] RIP: 0033:0x45a639 [ 1014.755401][ T2873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.774988][ T2873] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1014.783385][ T2873] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 [ 1014.791336][ T2873] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 20:05:57 executing program 1 (fault-call:5 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) [ 1014.799292][ T2873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1014.807248][ T2873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1014.815199][ T2873] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 20:05:57 executing program 5 (fault-call:2 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:05:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") 20:05:57 executing program 0 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1014.949168][ T2878] FAULT_INJECTION: forcing a failure. [ 1014.949168][ T2878] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.973262][ T2880] FAULT_INJECTION: forcing a failure. [ 1014.973262][ T2880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1014.986502][ T2880] CPU: 1 PID: 2880 Comm: syz-executor.5 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1014.996309][ T2880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.006369][ T2880] Call Trace: [ 1015.009670][ T2880] dump_stack+0x197/0x210 [ 1015.014018][ T2880] should_fail.cold+0xa/0x15 [ 1015.018623][ T2880] ? fault_create_debugfs_attr+0x180/0x180 [ 1015.024523][ T2880] ? debug_smp_processor_id+0x33/0x18a [ 1015.029993][ T2880] ? perf_trace_lock+0xeb/0x4c0 [ 1015.034852][ T2880] ? __lock_acquire+0x16f2/0x4a00 [ 1015.039889][ T2880] should_fail_alloc_page+0x50/0x60 [ 1015.045090][ T2880] __alloc_pages_nodemask+0x1a1/0x910 [ 1015.050465][ T2880] ? fs_reclaim_release+0xf/0x30 [ 1015.055418][ T2880] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1015.061150][ T2880] ? fs_reclaim_release+0xf/0x30 [ 1015.066103][ T2880] ? fault_create_debugfs_attr+0x180/0x180 [ 1015.066816][ T2885] FAULT_INJECTION: forcing a failure. [ 1015.066816][ T2885] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.071939][ T2880] cache_grow_begin+0x90/0xc60 [ 1015.071956][ T2880] ? cgroup_show_path+0xc6/0x5d0 [ 1015.071970][ T2880] ? trace_hardirqs_off+0x62/0x240 [ 1015.071991][ T2880] kmem_cache_alloc_trace+0x6b3/0x790 [ 1015.104702][ T2880] cgroup_show_path+0xc6/0x5d0 [ 1015.109477][ T2880] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1015.115114][ T2880] kernfs_sop_show_path+0x130/0x1b0 [ 1015.120318][ T2880] ? kernfs_test_super+0x150/0x150 [ 1015.125441][ T2880] show_mountinfo+0x246/0x940 [ 1015.130125][ T2880] ? down_read_killable+0x490/0x490 [ 1015.135336][ T2880] ? show_vfsmnt+0x420/0x420 [ 1015.139926][ T2880] ? seq_list_start+0x9d/0xc0 [ 1015.144611][ T2880] m_show+0x61/0x80 [ 1015.148428][ T2880] traverse+0x1cd/0x730 [ 1015.152592][ T2880] seq_lseek+0x168/0x3e0 [ 1015.156824][ T2880] ? traverse+0x730/0x730 [ 1015.161154][ T2880] ksys_lseek+0x116/0x1b0 [ 1015.165489][ T2880] __x64_sys_lseek+0x73/0xb0 [ 1015.170087][ T2880] do_syscall_64+0xfa/0x790 [ 1015.174604][ T2880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.180495][ T2880] RIP: 0033:0x45a639 [ 1015.184391][ T2880] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1015.204019][ T2880] RSP: 002b:00007f6ed6962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1015.212452][ T2880] RAX: ffffffffffffffda RBX: 00007f6ed6962c90 RCX: 000000000045a639 [ 1015.220417][ T2880] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1015.228383][ T2880] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1015.236350][ T2880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ed69636d4 [ 1015.244319][ T2880] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000005 [ 1015.252300][ T2878] CPU: 0 PID: 2878 Comm: syz-executor.1 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1015.262111][ T2878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.272170][ T2878] Call Trace: [ 1015.275473][ T2878] dump_stack+0x197/0x210 [ 1015.279828][ T2878] should_fail.cold+0xa/0x15 [ 1015.284432][ T2878] ? fault_create_debugfs_attr+0x180/0x180 [ 1015.290246][ T2878] ? ___might_sleep+0x163/0x2c0 [ 1015.295107][ T2878] __should_failslab+0x121/0x190 [ 1015.300052][ T2878] should_failslab+0x9/0x14 [ 1015.305237][ T2878] kmem_cache_alloc_trace+0x2d3/0x790 [ 1015.310613][ T2878] ? seq_printf+0xbb/0xf0 [ 1015.314956][ T2878] cgroup_show_path+0xc6/0x5d0 [ 1015.319716][ T2878] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1015.325350][ T2878] kernfs_sop_show_path+0x130/0x1b0 [ 1015.330550][ T2878] ? kernfs_test_super+0x150/0x150 [ 1015.335653][ T2878] show_mountinfo+0x246/0x940 [ 1015.340331][ T2878] ? down_read_killable+0x490/0x490 [ 1015.345536][ T2878] ? show_vfsmnt+0x420/0x420 [ 1015.350134][ T2878] ? seq_list_start+0x9d/0xc0 [ 1015.354820][ T2878] m_show+0x61/0x80 [ 1015.358624][ T2878] traverse+0x1cd/0x730 [ 1015.362793][ T2878] seq_lseek+0x168/0x3e0 [ 1015.367052][ T2878] ? traverse+0x730/0x730 [ 1015.371388][ T2878] ksys_lseek+0x116/0x1b0 [ 1015.375731][ T2878] __x64_sys_lseek+0x73/0xb0 [ 1015.380324][ T2878] do_syscall_64+0xfa/0x790 [ 1015.384836][ T2878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.390725][ T2878] RIP: 0033:0x45a639 [ 1015.394617][ T2878] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1015.414224][ T2878] RSP: 002b:00007f03fda94c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1015.422638][ T2878] RAX: ffffffffffffffda RBX: 00007f03fda94c90 RCX: 000000000045a639 [ 1015.430623][ T2878] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1015.438585][ T2878] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1015.446559][ T2878] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f03fda956d4 [ 1015.454529][ T2878] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000007 [ 1015.466251][ T2885] CPU: 1 PID: 2885 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1015.476081][ T2885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.486146][ T2885] Call Trace: [ 1015.489454][ T2885] dump_stack+0x197/0x210 [ 1015.493806][ T2885] should_fail.cold+0xa/0x15 [ 1015.498418][ T2885] ? fault_create_debugfs_attr+0x180/0x180 [ 1015.504238][ T2885] ? ___might_sleep+0x163/0x2c0 [ 1015.509107][ T2885] __should_failslab+0x121/0x190 [ 1015.514069][ T2885] should_failslab+0x9/0x14 [ 1015.518583][ T2885] __kmalloc+0x2e0/0x770 [ 1015.522822][ T2885] ? save_stack+0x5c/0x90 [ 1015.522834][ T2885] ? save_stack+0x23/0x90 [ 1015.522848][ T2885] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1015.522867][ T2885] tomoyo_encode2.part.0+0xf5/0x400 [ 1015.522887][ T2885] ? do_syscall_64+0xfa/0x790 [ 1015.546734][ T2885] tomoyo_encode+0x2b/0x50 [ 1015.551166][ T2885] tomoyo_mount_acl+0xe0/0x840 [ 1015.555947][ T2885] ? __kasan_check_read+0x11/0x20 [ 1015.560974][ T2885] ? mark_lock+0xc2/0x1220 [ 1015.565376][ T2885] ? lock_downgrade+0x920/0x920 [ 1015.570205][ T2885] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1015.575732][ T2885] ? __kasan_check_read+0x11/0x20 [ 1015.580736][ T2885] ? __lock_acquire+0x8a0/0x4a00 [ 1015.585698][ T2885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1015.591985][ T2885] ? debug_smp_processor_id+0x33/0x18a [ 1015.597436][ T2885] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1015.603595][ T2885] ? lock_acquire+0x190/0x410 [ 1015.608251][ T2885] ? tomoyo_mount_permission+0x10a/0x400 [ 1015.613880][ T2885] tomoyo_mount_permission+0x16a/0x400 [ 1015.619344][ T2885] ? tomoyo_mount_permission+0x10a/0x400 [ 1015.624978][ T2885] ? tomoyo_mount_acl+0x840/0x840 [ 1015.629994][ T2885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1015.636247][ T2885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1015.642486][ T2885] ? strncpy_from_user+0x2b4/0x400 [ 1015.647578][ T2885] tomoyo_sb_mount+0x35/0x40 [ 1015.652177][ T2885] security_sb_mount+0x87/0xd0 [ 1015.656964][ T2885] do_mount+0x1d4/0x1b50 [ 1015.661203][ T2885] ? copy_mount_string+0x40/0x40 [ 1015.666120][ T2885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1015.672345][ T2885] ? _copy_from_user+0x12c/0x1a0 [ 1015.677264][ T2885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1015.683482][ T2885] ? copy_mount_options+0x2e8/0x3f0 [ 1015.688662][ T2885] ksys_mount+0xdb/0x150 [ 1015.692887][ T2885] __x64_sys_mount+0xbe/0x150 [ 1015.697545][ T2885] do_syscall_64+0xfa/0x790 [ 1015.702040][ T2885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.707909][ T2885] RIP: 0033:0x45a639 [ 1015.711795][ T2885] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1015.731418][ T2885] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1015.739836][ T2885] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 [ 1015.747791][ T2885] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 1015.755747][ T2885] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1015.763718][ T2885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1015.771669][ T2885] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 20:05:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:05:59 executing program 5 (fault-call:2 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:05:59 executing program 1 (fault-call:5 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:05:59 executing program 0 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:05:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") [ 1016.764098][ T2904] FAULT_INJECTION: forcing a failure. [ 1016.764098][ T2904] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.778393][ T2906] FAULT_INJECTION: forcing a failure. [ 1016.778393][ T2906] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.793984][ T2905] FAULT_INJECTION: forcing a failure. [ 1016.793984][ T2905] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1016.807196][ T2905] CPU: 1 PID: 2905 Comm: syz-executor.5 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1016.817001][ T2905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.827059][ T2905] Call Trace: [ 1016.830360][ T2905] dump_stack+0x197/0x210 [ 1016.834715][ T2905] should_fail.cold+0xa/0x15 [ 1016.839321][ T2905] ? fault_create_debugfs_attr+0x180/0x180 [ 1016.845135][ T2905] ? debug_smp_processor_id+0x33/0x18a [ 1016.850606][ T2905] ? perf_trace_lock+0xeb/0x4c0 [ 1016.855473][ T2905] ? __lock_acquire+0x16f2/0x4a00 [ 1016.860520][ T2905] should_fail_alloc_page+0x50/0x60 [ 1016.865737][ T2905] __alloc_pages_nodemask+0x1a1/0x910 [ 1016.871116][ T2905] ? fs_reclaim_release+0xf/0x30 [ 1016.876060][ T2905] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1016.881775][ T2905] ? fs_reclaim_release+0xf/0x30 [ 1016.886770][ T2905] ? fault_create_debugfs_attr+0x180/0x180 [ 1016.892587][ T2905] cache_grow_begin+0x90/0xc60 [ 1016.897342][ T2905] ? cgroup_show_path+0xc6/0x5d0 [ 1016.902269][ T2905] ? trace_hardirqs_off+0x62/0x240 [ 1016.907375][ T2905] kmem_cache_alloc_trace+0x6b3/0x790 [ 1016.912765][ T2905] cgroup_show_path+0xc6/0x5d0 [ 1016.917509][ T2905] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1016.923124][ T2905] kernfs_sop_show_path+0x130/0x1b0 [ 1016.928302][ T2905] ? kernfs_test_super+0x150/0x150 [ 1016.933412][ T2905] show_mountinfo+0x246/0x940 [ 1016.938069][ T2905] ? down_read_killable+0x490/0x490 [ 1016.943250][ T2905] ? show_vfsmnt+0x420/0x420 [ 1016.947822][ T2905] ? seq_list_start+0x9d/0xc0 [ 1016.952491][ T2905] m_show+0x61/0x80 [ 1016.956279][ T2905] traverse+0x1cd/0x730 [ 1016.960422][ T2905] seq_lseek+0x168/0x3e0 [ 1016.964646][ T2905] ? traverse+0x730/0x730 [ 1016.968957][ T2905] ksys_lseek+0x116/0x1b0 [ 1016.973275][ T2905] __x64_sys_lseek+0x73/0xb0 [ 1016.977873][ T2905] do_syscall_64+0xfa/0x790 [ 1016.982377][ T2905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.988248][ T2905] RIP: 0033:0x45a639 [ 1016.992154][ T2905] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.011738][ T2905] RSP: 002b:00007f6ed6962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1017.020125][ T2905] RAX: ffffffffffffffda RBX: 00007f6ed6962c90 RCX: 000000000045a639 [ 1017.028083][ T2905] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1017.036037][ T2905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1017.044004][ T2905] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ed69636d4 [ 1017.051966][ T2905] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000005 [ 1017.063099][ T2906] CPU: 1 PID: 2906 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1017.072921][ T2906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.082976][ T2906] Call Trace: [ 1017.086275][ T2906] dump_stack+0x197/0x210 [ 1017.090607][ T2906] should_fail.cold+0xa/0x15 [ 1017.095193][ T2906] ? fault_create_debugfs_attr+0x180/0x180 [ 1017.101003][ T2906] ? ___might_sleep+0x163/0x2c0 [ 1017.105860][ T2906] __should_failslab+0x121/0x190 [ 1017.110796][ T2906] should_failslab+0x9/0x14 [ 1017.115298][ T2906] __kmalloc+0x2e0/0x770 [ 1017.119530][ T2906] ? __kmalloc+0x608/0x770 [ 1017.123946][ T2906] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1017.129655][ T2906] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1017.135200][ T2906] tomoyo_mount_acl+0x149/0x840 [ 1017.140045][ T2906] ? __kasan_check_read+0x11/0x20 [ 1017.145059][ T2906] ? mark_lock+0xc2/0x1220 [ 1017.149468][ T2906] ? lock_downgrade+0x920/0x920 [ 1017.154322][ T2906] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1017.159861][ T2906] ? __kasan_check_read+0x11/0x20 [ 1017.164879][ T2906] ? debug_smp_processor_id+0x33/0x18a [ 1017.170327][ T2906] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1017.176501][ T2906] ? lock_acquire+0x190/0x410 [ 1017.181353][ T2906] ? tomoyo_mount_permission+0x10a/0x400 [ 1017.186985][ T2906] tomoyo_mount_permission+0x16a/0x400 [ 1017.192475][ T2906] ? tomoyo_mount_permission+0x10a/0x400 [ 1017.198116][ T2906] ? tomoyo_mount_acl+0x840/0x840 [ 1017.203140][ T2906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1017.209385][ T2906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1017.215615][ T2906] ? strncpy_from_user+0x2b4/0x400 [ 1017.220721][ T2906] tomoyo_sb_mount+0x35/0x40 [ 1017.225304][ T2906] security_sb_mount+0x87/0xd0 [ 1017.230060][ T2906] do_mount+0x1d4/0x1b50 [ 1017.234294][ T2906] ? copy_mount_string+0x40/0x40 [ 1017.239227][ T2906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1017.245452][ T2906] ? _copy_from_user+0x12c/0x1a0 [ 1017.250386][ T2906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1017.256619][ T2906] ? copy_mount_options+0x2e8/0x3f0 [ 1017.261810][ T2906] ksys_mount+0xdb/0x150 [ 1017.266046][ T2906] __x64_sys_mount+0xbe/0x150 [ 1017.270717][ T2906] do_syscall_64+0xfa/0x790 [ 1017.275215][ T2906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.281095][ T2906] RIP: 0033:0x45a639 [ 1017.284988][ T2906] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.304579][ T2906] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1017.312977][ T2906] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 [ 1017.320944][ T2906] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 1017.328906][ T2906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1017.336889][ T2906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1017.344855][ T2906] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 [ 1017.352881][ T2904] CPU: 0 PID: 2904 Comm: syz-executor.1 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1017.356967][ T2906] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1017.362688][ T2904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.362694][ T2904] Call Trace: [ 1017.362716][ T2904] dump_stack+0x197/0x210 [ 1017.362739][ T2904] should_fail.cold+0xa/0x15 [ 1017.362758][ T2904] ? fault_create_debugfs_attr+0x180/0x180 [ 1017.362776][ T2904] ? ___might_sleep+0x163/0x2c0 [ 1017.362793][ T2904] __should_failslab+0x121/0x190 [ 1017.362812][ T2904] should_failslab+0x9/0x14 [ 1017.411891][ T2904] kmem_cache_alloc_trace+0x2d3/0x790 [ 1017.417256][ T2904] ? seq_printf+0xbb/0xf0 [ 1017.421568][ T2904] cgroup_show_path+0xc6/0x5d0 [ 1017.426311][ T2904] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1017.431921][ T2904] kernfs_sop_show_path+0x130/0x1b0 [ 1017.437113][ T2904] ? kernfs_test_super+0x150/0x150 [ 1017.442211][ T2904] show_mountinfo+0x246/0x940 [ 1017.446868][ T2904] ? down_read_killable+0x490/0x490 [ 1017.452157][ T2904] ? show_vfsmnt+0x420/0x420 [ 1017.456735][ T2904] ? seq_list_start+0x9d/0xc0 [ 1017.461408][ T2904] m_show+0x61/0x80 [ 1017.465218][ T2904] traverse+0x1cd/0x730 [ 1017.469364][ T2904] seq_lseek+0x168/0x3e0 [ 1017.473604][ T2904] ? traverse+0x730/0x730 [ 1017.477915][ T2904] ksys_lseek+0x116/0x1b0 [ 1017.482230][ T2904] __x64_sys_lseek+0x73/0xb0 [ 1017.486813][ T2904] do_syscall_64+0xfa/0x790 [ 1017.491300][ T2904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.497169][ T2904] RIP: 0033:0x45a639 [ 1017.501042][ T2904] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.520623][ T2904] RSP: 002b:00007f03fda94c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1017.529015][ T2904] RAX: ffffffffffffffda RBX: 00007f03fda94c90 RCX: 000000000045a639 [ 1017.536966][ T2904] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1017.544931][ T2904] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1017.552880][ T2904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f03fda956d4 [ 1017.560828][ T2904] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000007 20:06:00 executing program 0 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:00 executing program 5 (fault-call:2 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:06:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0xffffffffffffff6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_ON(r5, 0x7001) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) 20:06:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") [ 1017.624156][ T2916] FAULT_INJECTION: forcing a failure. [ 1017.624156][ T2916] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.677199][ T2916] CPU: 1 PID: 2916 Comm: syz-executor.5 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1017.687035][ T2916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.697097][ T2916] Call Trace: [ 1017.700405][ T2916] dump_stack+0x197/0x210 [ 1017.704756][ T2916] should_fail.cold+0xa/0x15 [ 1017.709375][ T2916] ? fault_create_debugfs_attr+0x180/0x180 [ 1017.715192][ T2916] ? ___might_sleep+0x163/0x2c0 [ 1017.715213][ T2916] __should_failslab+0x121/0x190 [ 1017.715235][ T2916] should_failslab+0x9/0x14 [ 1017.729482][ T2916] kmem_cache_alloc_trace+0x2d3/0x790 [ 1017.734868][ T2916] ? seq_printf+0xbb/0xf0 [ 1017.736177][ T2920] FAULT_INJECTION: forcing a failure. [ 1017.736177][ T2920] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.739205][ T2916] cgroup_show_path+0xc6/0x5d0 [ 1017.739222][ T2916] ? cgroup1_show_options+0x2ae/0x490 [ 1017.739240][ T2916] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1017.762704][ T2916] kernfs_sop_show_path+0x130/0x1b0 [ 1017.762721][ T2916] ? kernfs_test_super+0x150/0x150 [ 1017.762735][ T2916] show_mountinfo+0x246/0x940 [ 1017.762750][ T2916] ? down_read_killable+0x490/0x490 [ 1017.762769][ T2916] ? show_vfsmnt+0x420/0x420 [ 1017.793086][ T2916] ? seq_list_start+0x9d/0xc0 [ 1017.797782][ T2916] m_show+0x61/0x80 [ 1017.801601][ T2916] traverse+0x1cd/0x730 [ 1017.805777][ T2916] seq_lseek+0x168/0x3e0 [ 1017.810030][ T2916] ? traverse+0x730/0x730 [ 1017.814367][ T2916] ksys_lseek+0x116/0x1b0 [ 1017.818707][ T2916] __x64_sys_lseek+0x73/0xb0 [ 1017.823302][ T2916] do_syscall_64+0xfa/0x790 [ 1017.827816][ T2916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.833726][ T2916] RIP: 0033:0x45a639 [ 1017.837630][ T2916] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.857245][ T2916] RSP: 002b:00007f6ed6962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1017.865660][ T2916] RAX: ffffffffffffffda RBX: 00007f6ed6962c90 RCX: 000000000045a639 [ 1017.873626][ T2916] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1017.881597][ T2916] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1017.889567][ T2916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ed69636d4 [ 1017.897535][ T2916] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000005 [ 1017.905519][ T2920] CPU: 0 PID: 2920 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1017.915337][ T2920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:06:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:06:00 executing program 5 (fault-call:2 fault-nth:5): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) [ 1017.925400][ T2920] Call Trace: [ 1017.928711][ T2920] dump_stack+0x197/0x210 [ 1017.933069][ T2920] should_fail.cold+0xa/0x15 [ 1017.937682][ T2920] ? fault_create_debugfs_attr+0x180/0x180 [ 1017.943515][ T2920] ? ___might_sleep+0x163/0x2c0 [ 1017.948390][ T2920] __should_failslab+0x121/0x190 [ 1017.953351][ T2920] should_failslab+0x9/0x14 [ 1017.957872][ T2920] __kmalloc+0x2e0/0x770 [ 1017.962139][ T2920] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1017.967535][ T2920] tomoyo_encode2.part.0+0xf5/0x400 [ 1017.972751][ T2920] ? __get_fs_type+0x9a/0xd0 [ 1017.977375][ T2920] tomoyo_encode+0x2b/0x50 [ 1017.981816][ T2920] tomoyo_mount_acl+0x320/0x840 [ 1017.986702][ T2920] ? mark_lock+0xc2/0x1220 [ 1017.991134][ T2920] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1017.996728][ T2920] ? __kasan_check_read+0x11/0x20 [ 1017.999547][ T2938] FAULT_INJECTION: forcing a failure. [ 1017.999547][ T2938] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.001769][ T2920] ? debug_smp_processor_id+0x33/0x18a [ 1018.001794][ T2920] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1018.001852][ T2920] ? lock_acquire+0x190/0x410 [ 1018.030654][ T2920] ? tomoyo_mount_permission+0x10a/0x400 [ 1018.036299][ T2920] tomoyo_mount_permission+0x16a/0x400 [ 1018.041758][ T2920] ? tomoyo_mount_permission+0x10a/0x400 [ 1018.047410][ T2920] ? tomoyo_mount_acl+0x840/0x840 [ 1018.052448][ T2920] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1018.058714][ T2920] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1018.064960][ T2920] ? strncpy_from_user+0x2b4/0x400 [ 1018.070085][ T2920] tomoyo_sb_mount+0x35/0x40 [ 1018.074687][ T2920] security_sb_mount+0x87/0xd0 [ 1018.079454][ T2920] do_mount+0x1d4/0x1b50 [ 1018.083702][ T2920] ? copy_mount_string+0x40/0x40 [ 1018.088636][ T2920] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1018.094875][ T2920] ? _copy_from_user+0x12c/0x1a0 [ 1018.099817][ T2920] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1018.106596][ T2920] ? copy_mount_options+0x2e8/0x3f0 [ 1018.111797][ T2920] ksys_mount+0xdb/0x150 [ 1018.116056][ T2920] __x64_sys_mount+0xbe/0x150 [ 1018.120776][ T2920] do_syscall_64+0xfa/0x790 20:06:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x44, 0x0) [ 1018.125303][ T2920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.131198][ T2920] RIP: 0033:0x45a639 [ 1018.135095][ T2920] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1018.154743][ T2920] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1018.163170][ T2920] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 [ 1018.171151][ T2920] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 1018.179137][ T2920] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1018.187221][ T2920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1018.195372][ T2920] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 [ 1018.203385][ T2938] CPU: 1 PID: 2938 Comm: syz-executor.5 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1018.213186][ T2938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.213192][ T2938] Call Trace: [ 1018.213213][ T2938] dump_stack+0x197/0x210 [ 1018.213240][ T2938] should_fail.cold+0xa/0x15 [ 1018.235452][ T2938] ? fault_create_debugfs_attr+0x180/0x180 [ 1018.241270][ T2938] ? ___might_sleep+0x163/0x2c0 [ 1018.246127][ T2938] __should_failslab+0x121/0x190 [ 1018.251071][ T2938] should_failslab+0x9/0x14 [ 1018.251089][ T2938] kmem_cache_alloc_trace+0x2d3/0x790 [ 1018.251108][ T2938] ? seq_printf+0xbb/0xf0 [ 1018.251129][ T2938] cgroup_show_path+0xc6/0x5d0 [ 1018.251153][ T2938] ? cgroup1_show_options+0x2ae/0x490 [ 1018.265297][ T2938] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 1018.265319][ T2938] kernfs_sop_show_path+0x130/0x1b0 [ 1018.265338][ T2938] ? kernfs_test_super+0x150/0x150 [ 1018.265356][ T2938] show_mountinfo+0x246/0x940 [ 1018.275450][ T2938] ? down_read_killable+0x490/0x490 [ 1018.275469][ T2938] ? show_vfsmnt+0x420/0x420 [ 1018.275487][ T2938] ? seq_list_start+0x9d/0xc0 [ 1018.275509][ T2938] m_show+0x61/0x80 [ 1018.275527][ T2938] traverse+0x1cd/0x730 [ 1018.286326][ T2938] seq_lseek+0x168/0x3e0 [ 1018.286344][ T2938] ? traverse+0x730/0x730 [ 1018.286361][ T2938] ksys_lseek+0x116/0x1b0 [ 1018.286381][ T2938] __x64_sys_lseek+0x73/0xb0 [ 1018.286401][ T2938] do_syscall_64+0xfa/0x790 [ 1018.286425][ T2938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.346347][ T2938] RIP: 0033:0x45a639 [ 1018.350248][ T2938] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1018.369858][ T2938] RSP: 002b:00007f6ed6962c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1018.378285][ T2938] RAX: ffffffffffffffda RBX: 00007f6ed6962c90 RCX: 000000000045a639 [ 1018.386275][ T2938] RDX: 0000000000000000 RSI: 0000000020400000 RDI: 0000000000000003 [ 1018.394252][ T2938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1018.402227][ T2938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ed69636d4 [ 1018.410245][ T2938] R13: 00000000004c6f2e R14: 00000000004dc510 R15: 0000000000000005 20:06:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:02 executing program 0 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:02 executing program 5 (fault-call:2 fault-nth:6): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:06:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0xa0, 0x0) 20:06:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1019.807695][ T3060] FAULT_INJECTION: forcing a failure. [ 1019.807695][ T3060] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.836453][ T3060] CPU: 1 PID: 3060 Comm: syz-executor.0 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1019.846298][ T3060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.856361][ T3060] Call Trace: [ 1019.859658][ T3060] dump_stack+0x197/0x210 [ 1019.863978][ T3060] should_fail.cold+0xa/0x15 [ 1019.868555][ T3060] ? fault_create_debugfs_attr+0x180/0x180 [ 1019.874348][ T3060] ? ___might_sleep+0x163/0x2c0 [ 1019.879189][ T3060] __should_failslab+0x121/0x190 [ 1019.884117][ T3060] should_failslab+0x9/0x14 [ 1019.888598][ T3060] __kmalloc+0x2e0/0x770 [ 1019.892821][ T3060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.899104][ T3060] ? d_absolute_path+0x11b/0x170 [ 1019.904071][ T3060] ? __d_path+0x140/0x140 [ 1019.908394][ T3060] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1019.913762][ T3060] tomoyo_encode2.part.0+0xf5/0x400 [ 1019.918940][ T3060] tomoyo_encode+0x2b/0x50 [ 1019.923335][ T3060] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1019.928951][ T3060] tomoyo_mount_acl+0x149/0x840 [ 1019.933805][ T3060] ? __kasan_check_read+0x11/0x20 [ 1019.938844][ T3060] ? mark_lock+0xc2/0x1220 [ 1019.943237][ T3060] ? lock_downgrade+0x920/0x920 [ 1019.948067][ T3060] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1019.953592][ T3060] ? __kasan_check_read+0x11/0x20 [ 1019.958603][ T3060] ? debug_smp_processor_id+0x33/0x18a [ 1019.964044][ T3060] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1019.970206][ T3060] ? lock_acquire+0x190/0x410 [ 1019.974861][ T3060] ? tomoyo_mount_permission+0x10a/0x400 [ 1019.980473][ T3060] tomoyo_mount_permission+0x16a/0x400 [ 1019.985909][ T3060] ? tomoyo_mount_permission+0x10a/0x400 [ 1019.991524][ T3060] ? tomoyo_mount_acl+0x840/0x840 [ 1019.996529][ T3060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1020.002761][ T3060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1020.008978][ T3060] ? strncpy_from_user+0x2b4/0x400 [ 1020.014069][ T3060] tomoyo_sb_mount+0x35/0x40 [ 1020.018643][ T3060] security_sb_mount+0x87/0xd0 [ 1020.023402][ T3060] do_mount+0x1d4/0x1b50 [ 1020.027643][ T3060] ? copy_mount_string+0x40/0x40 [ 1020.032573][ T3060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1020.038801][ T3060] ? _copy_from_user+0x12c/0x1a0 [ 1020.043736][ T3060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1020.049955][ T3060] ? copy_mount_options+0x2e8/0x3f0 [ 1020.055135][ T3060] ksys_mount+0xdb/0x150 [ 1020.059374][ T3060] __x64_sys_mount+0xbe/0x150 [ 1020.064037][ T3060] do_syscall_64+0xfa/0x790 [ 1020.068527][ T3060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1020.074397][ T3060] RIP: 0033:0x45a639 [ 1020.078270][ T3060] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1020.097865][ T3060] RSP: 002b:00007f5f2c205c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:06:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) [ 1020.106254][ T3060] RAX: ffffffffffffffda RBX: 00007f5f2c205c90 RCX: 000000000045a639 [ 1020.114215][ T3060] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 1020.122185][ T3060] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1020.130159][ T3060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f2c2066d4 [ 1020.138125][ T3060] R13: 00000000004c7194 R14: 00000000004dca08 R15: 0000000000000004 [ 1020.182755][ T3060] ERROR: Out of memory at tomoyo_realpath_from_path. 20:06:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x152, 0x0) 20:06:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) fdatasync(r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:03 executing program 0 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x46, 0x0) 20:06:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x1a5, 0x0) 20:06:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 20:06:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x1fa, 0x0) 20:06:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0xa4, 0x0) 20:06:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 20:06:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x23b, 0x0) 20:06:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 20:06:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x105, 0x0) 20:06:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x28a, 0x0) 20:06:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:06 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000240)) 20:06:06 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 20:06:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x1000000000013) waitid(0x3, r0, 0x0, 0x2, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3e) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r5 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'lo\x00', 0x265c6b1c7a04319a}) ptrace$cont(0x20, r1, 0x0, 0x0) 20:06:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2cd, 0x0) 20:06:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x4, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x15a, 0x0) 20:06:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xed, &(0x7f0000000140), &(0x7f00000000c0)=0x4) 20:06:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x30c, 0x0) 20:06:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x300002}, 0xc, &(0x7f00000005c0)={0x0}}, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x9, 0x0, 0x0, [], 0x6}, {0x4}, {}, {0x5}, {0x5, 0x0, 0x3}, {0x3}, {}, {0x5, 0x0, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0xa}, {}, {0x0, 0x0, 0x6}]}}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000280)=""/49, 0x31}], 0x1, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) clock_getres(0x0, &(0x7f0000000000)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000002c0)={0x0, 0x6, 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:06:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x1af, 0x0) 20:06:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x5, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0x2) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x354, 0x0) 20:06:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x206, 0x0) 20:06:09 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 20:06:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x6, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1027.191881][ T4972] skbuff: bad partial csum: csum=0/4096 headroom=64 headlen=3712 20:06:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x397, 0x0) 20:06:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x249, 0x0) 20:06:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x7, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r7, @ANYBLOB="0000ffff00e8ffff000000080c085665ecf5000004008000fbe641aba200000000"], 0x34}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x1d, r7}, 0x10, &(0x7f0000000080)={&(0x7f0000000100)={0x0, 0x205, 0x80000000, {0x0, 0x2710}, {0x77359400}, {0x2, 0x1, 0x1}, 0x1, @canfd={{0x4, 0x1, 0x1}, 0x14, 0x1, 0x0, 0x0, "3c4f53e9a9a7267a82c03230635a6e907c2a00fc8ed624b7e2e9474418ee23a168768e88b276b10fb9ea784ccdb377b160edd4e5b27ed4efba61f89c9bc96b87"}}, 0x80}, 0x1, 0x0, 0x0, 0x20004000}, 0x4484) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r8, 0x10, &(0x7f0000000000)={0x101}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) r11 = syz_open_pts(r2, 0x4a201) ioctl$VT_OPENQRY(r11, 0x5600, &(0x7f0000000340)) ptrace$cont(0x20, r8, 0x0, 0x0) [ 1027.468822][ T5347] skbuff: bad partial csum: csum=0/4096 headroom=64 headlen=3712 20:06:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x3db, 0x0) [ 1027.556470][ T5429] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1027.578722][ T5514] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:06:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x29a, 0x0) 20:06:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x8, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1027.624054][ T5541] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:06:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560a84ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 20:06:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x120) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x1000, 0x7, 0x4, 0x1008, {r1, r2/1000+30000}, {0x3, 0x0, 0x1, 0x7, 0x40, 0x20, "399f4877"}, 0x2, 0x4, @fd=r3, 0x4}) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x419, 0x0) 20:06:10 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pread64(r0, 0x0, 0x0, 0x0) 20:06:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2df, 0x0) 20:06:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x10, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x0, 0x0, &(0x7f00000000c0)) 20:06:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x483, 0x0) 20:06:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000300)=""/228, 0xe4}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/145, 0x91}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup2(r6, r5) recvfrom$inet(r7, 0x0, 0xffffff51, 0x0, 0x0, 0x800e00511) shutdown(r4, 0x0) shutdown(r2, 0x0) 20:06:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x320, 0x0) 20:06:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xf0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4dd, 0x0) 20:06:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socket$rds(0x15, 0x5, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x36a, 0x0) 20:06:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400002, 0x0) 20:06:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x300, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400003, 0x0) 20:06:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x3af, 0x0) 20:06:15 executing program 4: readv(0xffffffffffffffff, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e000512ed0080637e6394f20200d2000500fcb711407f480f0001000300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) socket$nl_route(0x10, 0x3, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) 20:06:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400004, 0x0) 20:06:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x500, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x3f5, 0x0) 20:06:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x28, r0, 0x80000000000, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:16 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x210100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000380)={0x0, r3, 0xbe, 0xf4, 0x1, 0x8}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000180)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1}, 0x8) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1, &(0x7f00000000c0)={0x77359400}) unshare(0x6c060000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r8, &(0x7f00000001c0)="a4a0ba78a40fe8d25be1c0250a5d7d80a0dd85d09a188778c0b32b893ea00092b65b3b750ae826e78230de4e3b4f3933f06790b1c115a5139f21cd140955b2226bb4514e5897e18a3a6b03ed0b1d036a0f1298d2ce454bcce8246e2300f127a1877091caf4a099d796f81a52b167314bf37db8a9c437d795", &(0x7f0000000280)=""/187, 0x4}, 0x20) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}, 0x100) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000300)) 20:06:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x435, 0x0) 20:06:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400005, 0x0) 20:06:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x600, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1034.025998][ T7515] IPVS: ftp: loaded support on port[0] = 21 20:06:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400006, 0x0) 20:06:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x700, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x4a1, 0x0) [ 1034.247262][ T26] audit: type=1326 audit(1574366776.713:8644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7511 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x0 20:06:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x4fd, 0x0) 20:06:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400007, 0x0) 20:06:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x1020, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1035.132105][T11936] tipc: TX() has been purged, node left! 20:06:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x6, 0x800) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400002, 0x0) 20:06:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400008, 0x0) 20:06:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x2000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:19 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x210100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000380)={0x0, r3, 0xbe, 0xf4, 0x1, 0x8}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000180)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1}, 0x8) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1, &(0x7f00000000c0)={0x77359400}) unshare(0x6c060000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r8, &(0x7f00000001c0)="a4a0ba78a40fe8d25be1c0250a5d7d80a0dd85d09a188778c0b32b893ea00092b65b3b750ae826e78230de4e3b4f3933f06790b1c115a5139f21cd140955b2226bb4514e5897e18a3a6b03ed0b1d036a0f1298d2ce454bcce8246e2300f127a1877091caf4a099d796f81a52b167314bf37db8a9c437d795", &(0x7f0000000280)=""/187, 0x4}, 0x20) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}, 0x100) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000300)) 20:06:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1037.138663][ T8463] IPVS: ftp: loaded support on port[0] = 21 20:06:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpin6, &(0x7f0000000200)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x14) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet6(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0xa, 0x4e22, 0xddfe, @mcast1, 0x3}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000300)="56c9ba9ae88f709900b0554c95e9d43ca21bcd7bdee42baf8c32d57c30d6bd690020459358131fd0d0d829eb6ad5bf76f9", 0x31}, {&(0x7f0000000340)="5842fc335225fc159cb1bf943cb6f85d6e1605385fc14e621a7549a4439b7e5b73e74f8582db13ba176924b4a6fb97882ef85a33234acac8bf2b06893eec593846e2a5c2ba3ffb1ca83831a5a9189e1a8b9bef595fd854077b48d44493250af6ec931bd884faae40c0d64d", 0x6b}, {&(0x7f00000003c0)="be684695462a2e5d5130a09b181ce81db0", 0x11}], 0x3, &(0x7f0000000440)}, 0x8000) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/qat_adf_ctl\x00', 0x100, 0x0) sendmmsg$alg(r3, &(0x7f0000003900)=[{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000680)="4e7fef8c93f90fe2e35423303b3db10ed7470cd20c5df0640ea4929602f0d45111051110b14ba215e6533da473f5a1607e596de71539a8a949422ba7f4f3629153414e52649d6c7047996864f79466f45ee3d117460fff981e75", 0x5a}, {&(0x7f0000000700)="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", 0xfc}, {&(0x7f0000000800)="d36521bc7207dfc73c6381f392bfadf3307bd808a7b0482a59662086e5c57647df125d926fae47052ff717332474ebfe86ae3012729a7319ef0768bb91aaa13ae5e1bfa5e6142e9b1170efb02f3c87647ca43972dbf04f121ce347023d405a667b8d9f28e770d3f457d8747a72fdb3b571dbb7f7c962e42b6ca9d3a5535f", 0x7e}, {&(0x7f0000000880)="7aad00772f5b53a7b9b6a1a41f83ced8827f4790bb48bb82fe5a38b539a9a251c57523aea8c51ed96641fb79bc1b29e0158eff046dfaf2f64e3e8303182b2bf07b3ea0436754384a4311e52ba11848e0d73f204c9a27e08b980f15122a2752fededec0464ce773909e3528e301d302fbf3a516116cb4175099a5530cc9dbcd67be76a146f97a3ecaf59300bf6f58b9bb8473f9037ed9eb252dc790972455afe305ccea0eb8c1fa75fc7b06da236ae93c8172dbecdc955c3ed7a06075501be0f1e93f84", 0xc3}, {&(0x7f0000000980)="d8b75c77af55f90e98ce4cd51e88b82c75ab10080e2617b78411c0dc71cfb52475e3c11d1253b1416ae9fdc5592acfbdb2cd57f55ab86f967baabf56050c4af83fd58f685275afe9e855215da471c9ae2f3b7bd61cb7f8a150bc45fc81483e3a09af4628d7d2ec1caa2e9e3f1bd8fc2fe507856c22123add0a6ae7153d72cefbfd35efe57b09f505755931b1a9122886bf3c4c460f89e0f3d343fba8370a0cf69688949ea7ffa5eb149b5c093e45659dd88f7b725038739e15cf0993b0ce7722cbc71255169540a267f4dea1f0226b9a46f13770b0ecb77e1b048b26bafb79edd672dd14d4bdb0e61fbd7cc5e5", 0xed}], 0x5, &(0x7f0000000b00)=[@iv={0xb0, 0x117, 0x2, 0x97, "373795d5603cfa8a2871c10d5a3e97a0c5834a00f32efc44af4972ff92d389d3c7c4d7d478e1fef0084726688068d82d039bcdd30ae8ffeac9832217e07ddb034803d8c9f8207d4790340771d4ecaae48b1acea46e1d29dad1c89f8064e8463d4bf9fc16e9cfc915c744b8a064bfa02a2c06583f5c1df5f5b7d872975156ecf64965182d539737cec6268babf186be7bffde20c5ef4fe5"}], 0xb0, 0x40048}, {0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000bc0)="3229d96d7c2d79", 0x7}, {&(0x7f0000000c00)}, {&(0x7f0000000c40)="cc55c24239f352c77995e3cc53e1a9473cda1080b8e60a83763fd077ec0d549c7f2b5d09981dc96918190596582ec16b92e3337fe45777a4e58a031d9b5204005ef243ac7355225a786f82f226ffe503e5fd9c3c0b317c73aa11b3bf1b3969d85b30a0a139dd7524abd73cf4d24c26ce5bed73e5f642ec3d5dc91cd386342f8e336671ea0cc60053a6959fbd9bc02383eeedccd5d73ce3125579570a222742b335a2f0237c119dcd13c44b45016a", 0xae}, {&(0x7f0000000d00)="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", 0x1000}], 0x4, &(0x7f0000001d40)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xc8, 0x117, 0x2, 0xb1, "66a03ea0683c6f2646c0c8a0f3409a7698db45eae7b0a28b1d4c6e051934315746baaf86eed479066c95841f6b064ab47d3d071ec1d792949f4146df3196a86216a8bdaa292f69e5136adeb1d985ff8649656c27d1c2d35e04253cab408f78d1ad3bb330f478d1d90223a5a8bd41f1511543fbd7c58e8bd5f016852fcb5a810210f6f8a706dc808c8a2df29408ed60d0740d71b266731c68a953bcaf7cdffc205df5fe34952c3b68617365514ceb5033ec"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x3}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x158, 0x20000000}, {0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000001ec0)="b345f938f0e7d370db392fa4e0a290ee3e1430144d3f2888ec542b954fa3db9fe82499f8916fab5d7de230224d323b187ce4710c23dd2f6f6394", 0x3a}, {&(0x7f0000001f00)="91a302c1e94c95264ba45c5aca7e6dbb866d834cf1537c8c4cb8ddc068355e15514d0b2e91050d9b5243efa96debe110caee0454b82b69fd98519ae6ceee713d7cd25f31f772e805f97e73d9d1427a545e410802796724fc53ed14d4f42ea0d5bb5b4e695f", 0x65}, {&(0x7f0000001f80)="e3a4ffc1f2431124d3980d2d89975a70300200b0c506e31014d11ef23cdb9b18b1cd9e84ee575a0f9184db2f855066df3a7ddda21a44b65444efdb7e2a4326f7edb70ca6c23988757a580895ef9122dc2ae757256f52be3d5a0ff173f6e0214738c9086731357f3a6cf88aee8d731d6eb4997b9b31c19469a7d28a0ad909fdd70ca9f69790bee80f9a56428e8c163ca469d318", 0x93}, {&(0x7f0000002040)="9dbf05f201f969c016c1e00a51824b5ab0540843f19714abc98944b7a0a56297b21d4ebc23bc1875ad3cc08ae2e1bce1cad37c450be33a851dbed14f04a00f0d2a8179065e2b9a78f409f0d8eb117eaa345b242d75ea4f43e1ee1f2dafcb1f8cf1014232bb0f6e0feb44675938c9513235be9692ede308a07b08c5794c61d79a00bb4e0201f341f3760c49b50286fa2b730be1d7a47cf66118475940467031290a8a040a55b431a8f50f9c7c6f2fb75d408e19d27ab16e41c855c348390eb7b9312f7b56d895201c83b7e51748289a7cc370a4cd2b5a1c499cd1c417c529c52733b3cf9833f25000d96eba9fe9ae8716", 0xf0}, {&(0x7f0000002140)="2397cfab40e1ed20f33dd12078166607cee3513f722576c7", 0x18}, {&(0x7f0000002180)="665188940974a3a1e2f15ee33dc166846686de632a43f736904d9bb15cb492d9d5077754ad3cfa37ec2dc2ec644876360c51316eaf1c2d2f7d32178c692ecde7d1315b5cbd9182429ca69cd1395f3c80f6f90fc6ff27ee5f36e56a2d927c887a498d47786fc67eac62ea9b38fc4419a1feaf48870ba2c17fe8163bce4bb422b94db9abcbaa5356ba1faaf00e5de49bd1756b68efdd40099cefdf6711c5cc1a17b2ac7e68cc0d0ccf1b56a448fcb150645d5733fbea683bdae596d5abf9c2092b51c9de04c88983622d7b8cb4bae5c80e2e7e8dd741c3c06835b8", 0xda}], 0x6, &(0x7f0000002300)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x80}, @op={0x18}, @op={0x18, 0x117, 0x3, 0xa0f01195d93a9ddb}, @iv={0xf8, 0x117, 0x2, 0xe3, "a3fbe79a82033896ac462897bae6c04a5bb43284aaaebb4f4ad750c49a69701e273847d441ea04ce965bdf06f5f561cbc4f2abba46b9d7805f8217bfd76ff1604fbe8aec03b2677ddc8ae288dba64d1809f0bf020aff6eaee43322ea11fbaa96349283972110275bc2df25d682c983c4cc1785fb0506d50c1d505432c7773b24d1097ef03213b3e1e749f61a7caac78d1c532a58e0d0cd873f759739a4a4aec19b871d7ade079b0ba2347aa1969316c98ed84b447b619e9a254524e1c652842c07ca7cc555a388d669bd6cc239a2896eafe63fb7c94dffbb8ee5d2cddd8baa3bd08d5f"}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x1a0, 0x4000000}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000024c0)="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", 0xfb}, {&(0x7f00000025c0)="81c22edfc0", 0x5}, {&(0x7f0000002600)="2fb6ec4f048aa6d88621be21098d1a9741a0f26bfad2007c1ad31b2fb3768c9fc7d7f671378bbc466d735f4927f10df5b3d13baa47ea396497090e3237791645d9d77ce38119c44df37d525bd338a86c9c1b78fe7a264c7dbb8dbd421c89a29f43a7f6bc8de37016f843ec67dac82ecf03652d8e85d1fe0bf5fba3b33ba76061a876901a020c5ac9b292e783400b278980fb258c", 0x94}, {&(0x7f00000026c0)="059df2c153aa0f95558323b740404fcdff4cc27723aca59362a47bb6740ebd61adf9e29325b200db718251af0ab1568f8cd6017676925943d4a3e739f14b5d3a30c34e3aa37bc7e9d596ef39fe4eb7af2327992fb1200b8cf530aebbd91162ff64b89f3920e2a02a271c8fff66573b81eb1123f7a88157b9695ebe8e38937fec4572ac67e203cfe09ec3486a6f314f768852849087f2ed18160e76bd362901d9bc02fb583216047db831835f9aa4a922ffe12666d62c98ace2caed01", 0xbc}], 0x4, &(0x7f00000027c0)=[@assoc={0x18, 0x117, 0x4, 0x8001}, @assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0xcb}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0x48, 0x117, 0x2, 0x31, "e1cdb79fb70ff2db7170d0d892a3e92c586e895b0c921f656964f8dafc73652eeebea1888c557a46e4b17fd4e9255908d7"}, @iv={0x90, 0x117, 0x2, 0x7a, "156b95a9f2f8f380e72a3ed888daab35fef51835f27d9dec46b255323f0bdb8a17dfb853c56d2a2eef9c40de995fd14c3380576806c0d47bb1e0fd816dd0e6b4c5dc2381c1f11892c93ddc81bcec11e1560c5b5d788cf61f1b451e3c07726105089751f23c98686f87faaffa869acf49a07fc9111f38b99c6e24"}], 0x1138, 0x800}], 0x4, 0x0) timerfd_settime(0xffffffffffffffff, 0x2, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3ff, 0x14200) ioctl$SIOCGETNODEID(r5, 0x89e1, &(0x7f0000000100)={0x3}) 20:06:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040000a, 0x0) 20:06:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x2010, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400003, 0x0) [ 1037.308920][ T26] audit: type=1326 audit(1574366779.773:8645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8460 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x0 20:06:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400004, 0x0) 20:06:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x408) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x6, 0x1aa) ptrace$cont(0x20, r0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x9, 0xf11b3596aae28052) 20:06:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400010, 0x0) 20:06:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x3f00, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r4, r3) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r6, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000000c0)={r6, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x5, 0x1, 0x0, 0x101, r6}, 0x10) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400005, 0x0) 20:06:20 executing program 4: io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}]) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f00000002c0)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x45, 0x0, &(0x7f0000000180)="e5e74f729e812b5a85b1c44466bfeefc8dcd689ba5d51d858c1232a5f6a0f2b1f9403a922baf2f01c96a29389288a54f64012b422d64cb220368499f2013ea53a5fb62dce9"}) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1039.473055][T11936] tipc: TX() has been purged, node left! 20:06:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400012, 0x0) 20:06:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000200)=""/203, &(0x7f0000000000)=0xcb) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = clone3(&(0x7f0000000300)={0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), 0x26, 0x0, &(0x7f0000000140)=""/46, 0x2e, &(0x7f0000000180)}, 0x40) ptrace$setregs(0xd, r3, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x4000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400006, 0x0) 20:06:22 executing program 4: 20:06:22 executing program 4: 20:06:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400007, 0x0) 20:06:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040002d, 0x0) 20:06:22 executing program 4: 20:06:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xedc0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400008, 0x0) 20:06:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:25 executing program 4: 20:06:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400048, 0x0) 20:06:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xf000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040000a, 0x0) 20:06:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffffffffffc, 0xe5, 0xaf, @buffer={0x0, 0x3, &(0x7f0000000000)=""/3}, &(0x7f0000000200)="fa28a83b050bcad470dde01b33b930da1018b15da9dbe8312b2724ea773f8dcda37a614a9e14553e248998028bcd5727770834b2eb5719d21ab9269ed375826d63d9ed0ef13f5309d0aa701b90f6bf794fe1b13cb8f63f17e925a7a760aa37720ca00182fd67dac382ded136b32466f3621be5f32ad734d0e399f7b908532a0872535961086fb59ed1eab882117adb0fab6abeec4c2aac44e8809f5d9bdede5dd4247a275c2cfd7d39142cdaf94936143695e10298eef25e69e317bc5f93bbde304ca6626b339dd5c79ba3cef5a19bf7d78cecd5acde366043667bc37a0a3856bceb26cd73", &(0x7f0000000100)=""/186, 0x7, 0x2, 0x0, &(0x7f0000000040)}) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x9, r3, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 20:06:25 executing program 4: 20:06:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040004c, 0x0) 20:06:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400010, 0x0) 20:06:25 executing program 4: 20:06:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xff00, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:25 executing program 4: 20:06:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400012, 0x0) 20:06:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400068, 0x0) 20:06:28 executing program 4: 20:06:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xf0ffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40001, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r6, r5) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r8, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f00000000c0)={r8, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000180)={r8, 0x7ff, 0xcd19, 0xf001, 0x200, 0x60ed6031}, 0x14) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x40, @empty, 0x1}}, 0x2, 0x8, 0x9, 0x6}, &(0x7f0000000340)=0x98) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r10, 0x0, r11) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000380)={0x0, 0x4}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r9, 0x84, 0x13, &(0x7f0000000000)={r12, 0x4000008}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000080)={r13, 0x5}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x5, 0x7, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000100)={0x9, 0x2, 0x1, 0x2, 0xc7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:06:28 executing program 4: 20:06:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x1000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:28 executing program 4: 20:06:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040002d, 0x0) 20:06:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040006c, 0x0) 20:06:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x2000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:31 executing program 4: 20:06:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400048, 0x0) 20:06:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400074, 0x0) 20:06:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x3000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RXATTRWALK(r3, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0xc00000000000000}, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x3, 0x0) 20:06:31 executing program 4: 20:06:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000d0000000000"], 0x404a}}, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x200) 20:06:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x4000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040004c, 0x0) 20:06:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040007a, 0x0) 20:06:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000500)='ntfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@fmask={'fmask'}}, {@disable_sparse_no='disable_sparse=no'}, {@errors_recover='errors=recover'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@umask={'umask'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@fmask={'fmask'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@gid={'gid'}}]}) [ 1049.672621][T12067] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1049.740433][T12067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1049.752903][T12067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1050.376966][T12069] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1050.386545][T12069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1050.394063][T12069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:06:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 20:06:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x204000f5, 0x0) 20:06:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x5000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400068, 0x0) 20:06:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) syz_extract_tcp_res(0x0, 0x0, 0x0) 20:06:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x6000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000300)=""/228, 0xe4}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/145, 0x91}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup2(r6, r5) recvfrom$inet(r7, 0x0, 0xffffff51, 0x0, 0x0, 0x800e00511) shutdown(r4, 0x0) shutdown(r2, 0x0) 20:06:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040006c, 0x0) 20:06:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400300, 0x0) 20:06:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x7000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400500, 0x0) 20:06:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400074, 0x0) 20:06:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x8000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400600, 0x0) 20:06:37 executing program 3 (fault-call:6 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:37 executing program 4 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1055.585287][T13373] FAULT_INJECTION: forcing a failure. [ 1055.585287][T13373] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.617902][T13309] FAULT_INJECTION: forcing a failure. [ 1055.617902][T13309] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.633239][T13309] CPU: 0 PID: 13309 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1055.643160][T13309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.653223][T13309] Call Trace: [ 1055.656537][T13309] dump_stack+0x197/0x210 [ 1055.660901][T13309] should_fail.cold+0xa/0x15 [ 1055.665524][T13309] ? fault_create_debugfs_attr+0x180/0x180 [ 1055.671354][T13309] ? ___might_sleep+0x163/0x2c0 [ 1055.676317][T13309] __should_failslab+0x121/0x190 [ 1055.681271][T13309] should_failslab+0x9/0x14 [ 1055.685966][T13309] kmem_cache_alloc+0x2aa/0x710 [ 1055.690841][T13309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.697111][T13309] ? debug_smp_processor_id+0x33/0x18a [ 1055.702596][T13309] getname_flags+0xd6/0x5b0 [ 1055.707127][T13309] do_mknodat+0x18d/0x480 [ 1055.711485][T13309] ? do_file_open_root+0x3a0/0x3a0 [ 1055.717224][T13309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1055.722706][T13309] ? do_syscall_64+0x26/0x790 [ 1055.727400][T13309] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:06:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040007a, 0x0) 20:06:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x10000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1055.733483][T13309] ? do_syscall_64+0x26/0x790 [ 1055.738184][T13309] __x64_sys_mknod+0x7b/0xb0 [ 1055.742792][T13309] do_syscall_64+0xfa/0x790 [ 1055.747317][T13309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.753503][T13309] RIP: 0033:0x45a639 [ 1055.757416][T13309] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.777186][T13309] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1055.785625][T13309] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1055.793713][T13309] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1055.801992][T13309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1055.810139][T13309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1055.818215][T13309] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 [ 1055.827791][T13373] CPU: 1 PID: 13373 Comm: syz-executor.3 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1055.837864][T13373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.837871][T13373] Call Trace: [ 1055.837891][T13373] dump_stack+0x197/0x210 [ 1055.837912][T13373] should_fail.cold+0xa/0x15 [ 1055.837932][T13373] ? fault_create_debugfs_attr+0x180/0x180 [ 1055.866058][T13373] ? xfrm_state_find+0x1cb3/0x5030 [ 1055.871192][T13373] ? find_held_lock+0x35/0x130 [ 1055.875980][T13373] __should_failslab+0x121/0x190 [ 1055.880932][T13373] should_failslab+0x9/0x14 [ 1055.880951][T13373] kmem_cache_alloc+0x47/0x710 [ 1055.880966][T13373] ? lock_downgrade+0x920/0x920 [ 1055.880989][T13373] xfrm_state_alloc+0x26/0x4e0 [ 1055.899861][T13373] xfrm_state_find+0x1e3c/0x5030 [ 1055.904842][T13373] ? xfrm_alloc_spi+0x990/0x990 [ 1055.909834][T13373] ? rcu_read_lock_held_common+0x130/0x130 [ 1055.909854][T13373] ? find_held_lock+0x35/0x130 [ 1055.920579][T13373] ? ip6_pol_route+0x2c2/0xaf0 [ 1055.925406][T13373] xfrm_tmpl_resolve+0x32a/0xc90 [ 1055.930364][T13373] ? xfrm_tmpl_resolve+0x32a/0xc90 [ 1055.935518][T13373] ? __xfrm_dst_lookup+0x140/0x140 [ 1055.940786][T13373] ? ip6_pol_route_lookup+0x1830/0x1830 [ 1055.946351][T13373] ? is_bpf_text_address+0xac/0x160 [ 1055.951571][T13373] ? find_held_lock+0x35/0x130 [ 1055.956367][T13373] ? __kasan_check_read+0x11/0x20 [ 1055.961411][T13373] ? mark_lock+0xc2/0x1220 [ 1055.965854][T13373] xfrm_resolve_and_create_bundle+0x137/0x2660 [ 1055.972030][T13373] ? __kasan_check_read+0x11/0x20 [ 1055.977078][T13373] ? __lockdep_free_key_range+0x120/0x120 [ 1055.982928][T13373] ? xfrm_sk_policy_lookup+0x3c7/0x500 [ 1055.988413][T13373] ? __xfrm_decode_session+0x2e90/0x2e90 [ 1055.994071][T13373] ? lock_downgrade+0x920/0x920 [ 1055.998941][T13373] ? rcu_read_lock_held+0x9c/0xb0 [ 1056.004078][T13373] ? __kasan_check_read+0x11/0x20 [ 1056.009127][T13373] ? xfrm_sk_policy_lookup+0x3e9/0x500 [ 1056.014602][T13373] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1056.020356][T13373] xfrm_lookup_with_ifid+0x278/0x1fb0 [ 1056.025755][T13373] ? xfrm_lookup_with_ifid+0x278/0x1fb0 [ 1056.031330][T13373] ? __local_bh_enable_ip+0x15a/0x270 [ 1056.036723][T13373] ? __audit_inode+0x81a/0x13b0 [ 1056.041712][T13373] ? xfrm_policy_lookup+0x90/0x90 [ 1056.046769][T13373] ? ip6_flush_pending_frames+0xd0/0xd0 [ 1056.052534][T13373] ? __lockdep_free_key_range+0x120/0x120 [ 1056.058271][T13373] ? __lockdep_free_key_range+0x120/0x120 [ 1056.064014][T13373] ? rawv6_sendmsg+0x832/0x36d0 [ 1056.068901][T13373] ? find_held_lock+0x35/0x130 [ 1056.073691][T13373] xfrm_lookup_route+0x3b/0x1e0 [ 1056.078563][T13373] ip6_dst_lookup_flow+0x189/0x220 20:06:38 executing program 4 (fault-call:8 fault-nth:1): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400700, 0x0) 20:06:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400a00, 0x0) [ 1056.083689][T13373] ? lock_downgrade+0x920/0x920 [ 1056.088560][T13373] ? ip6_dst_lookup+0x70/0x70 [ 1056.093251][T13373] ? rcu_read_lock_held+0x9c/0xb0 [ 1056.098297][T13373] ? __kasan_check_read+0x11/0x20 [ 1056.103343][T13373] rawv6_sendmsg+0xb3b/0x36d0 [ 1056.108040][T13373] ? debug_smp_processor_id+0x33/0x18a [ 1056.113527][T13373] ? rawv6_bind+0x9a0/0x9a0 [ 1056.118206][T13373] ? mark_lock+0xc2/0x1220 [ 1056.122629][T13373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.122643][T13373] ? __might_fault+0x12b/0x1e0 [ 1056.122659][T13373] ? __might_fault+0x12b/0x1e0 [ 1056.122672][T13373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1056.122688][T13373] ? rw_copy_check_uvector+0x2ce/0x390 [ 1056.122700][T13373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.122724][T13373] ? ___might_sleep+0x163/0x2c0 [ 1056.161290][T13373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1056.167634][T13373] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1056.173251][T13373] inet_sendmsg+0x9e/0xe0 [ 1056.177605][T13373] ? inet_sendmsg+0x9e/0xe0 [ 1056.182131][T13373] ? inet_send_prepare+0x4e0/0x4e0 20:06:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20401200, 0x0) [ 1056.187344][T13373] sock_sendmsg+0xd7/0x130 [ 1056.191788][T13373] ___sys_sendmsg+0x3e2/0x920 [ 1056.196491][T13373] ? copy_msghdr_from_user+0x440/0x440 [ 1056.202083][T13373] ? lock_downgrade+0x920/0x920 [ 1056.206954][T13373] ? rcu_read_lock_held+0x9c/0xb0 [ 1056.211999][T13373] ? __kasan_check_read+0x11/0x20 [ 1056.217044][T13373] ? __fget+0x37f/0x550 [ 1056.221224][T13373] ? ksys_dup3+0x3e0/0x3e0 [ 1056.225658][T13373] ? __lockdep_free_key_range+0x120/0x120 [ 1056.231396][T13373] ? debug_smp_processor_id+0x33/0x18a [ 1056.236873][T13373] ? __fget_light+0x1a9/0x230 [ 1056.241742][T13373] ? __fdget+0x1b/0x20 [ 1056.245813][T13373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1056.245829][T13373] ? sockfd_lookup_light+0xcb/0x180 [ 1056.245847][T13373] __sys_sendmmsg+0x1bf/0x4d0 [ 1056.245868][T13373] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1056.245900][T13373] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1056.273536][T13373] ? fput_many+0x12c/0x1a0 [ 1056.277974][T13373] ? fput+0x1b/0x20 [ 1056.281807][T13373] ? ksys_write+0x1cf/0x290 [ 1056.286330][T13373] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1056.291814][T13373] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1056.297304][T13373] ? do_syscall_64+0x26/0x790 [ 1056.302009][T13373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.308098][T13373] ? do_syscall_64+0x26/0x790 [ 1056.312806][T13373] __x64_sys_sendmmsg+0x9d/0x100 [ 1056.317911][T13373] do_syscall_64+0xfa/0x790 [ 1056.322539][T13373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.328448][T13373] RIP: 0033:0x45a639 [ 1056.332361][T13373] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.352111][T13373] RSP: 002b:00007f164a0c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1056.360545][T13373] RAX: ffffffffffffffda RBX: 00007f164a0c9c90 RCX: 000000000045a639 [ 1056.368650][T13373] RDX: 0400000000000058 RSI: 0000000020007e00 RDI: 0000000000000005 [ 1056.376674][T13373] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1056.376682][T13373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f164a0ca6d4 [ 1056.376690][T13373] R13: 00000000004c83c8 R14: 00000000004de808 R15: 0000000000000006 [ 1056.614154][T14140] FAULT_INJECTION: forcing a failure. [ 1056.614154][T14140] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.627709][T14140] CPU: 1 PID: 14140 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1056.637622][T14140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.647673][T14140] Call Trace: [ 1056.651147][T14140] dump_stack+0x197/0x210 [ 1056.655476][T14140] should_fail.cold+0xa/0x15 [ 1056.660063][T14140] ? fault_create_debugfs_attr+0x180/0x180 [ 1056.665867][T14140] ? ___might_sleep+0x163/0x2c0 [ 1056.670707][T14140] __should_failslab+0x121/0x190 [ 1056.675637][T14140] should_failslab+0x9/0x14 [ 1056.680132][T14140] kmem_cache_alloc+0x2aa/0x710 [ 1056.685008][T14140] ? __d_lookup+0x42a/0x750 [ 1056.689503][T14140] ? lookup_dcache+0x23/0x140 [ 1056.694391][T14140] ? d_lookup+0xf4/0x260 [ 1056.698759][T14140] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1056.704117][T14140] __d_alloc+0x2e/0x8c0 [ 1056.708380][T14140] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1056.714090][T14140] d_alloc+0x4d/0x280 [ 1056.718065][T14140] __lookup_hash+0xcd/0x190 [ 1056.722563][T14140] filename_create+0x1a7/0x4f0 [ 1056.727712][T14140] ? kern_path_mountpoint+0x40/0x40 [ 1056.732909][T14140] ? strncpy_from_user+0x2b4/0x400 [ 1056.738219][T14140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.744462][T14140] ? getname_flags+0x277/0x5b0 [ 1056.749223][T14140] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1056.755463][T14140] do_mknodat+0x1a4/0x480 [ 1056.759797][T14140] ? do_file_open_root+0x3a0/0x3a0 [ 1056.764907][T14140] ? do_syscall_64+0x26/0x790 [ 1056.769578][T14140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.775636][T14140] ? do_syscall_64+0x26/0x790 [ 1056.780323][T14140] __x64_sys_mknod+0x7b/0xb0 [ 1056.784961][T14140] do_syscall_64+0xfa/0x790 [ 1056.789510][T14140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.795393][T14140] RIP: 0033:0x45a639 [ 1056.799392][T14140] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.819025][T14140] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1056.827430][T14140] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1056.835626][T14140] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1056.843602][T14140] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1056.851584][T14140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1056.859651][T14140] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e651", 0x40}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20402d00, 0x0) 20:06:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x204000f5, 0x0) 20:06:41 executing program 4 (fault-call:8 fault-nth:2): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1058.621294][T14150] FAULT_INJECTION: forcing a failure. [ 1058.621294][T14150] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.706764][T14150] CPU: 0 PID: 14150 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1058.716709][T14150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.726788][T14150] Call Trace: [ 1058.730131][T14150] dump_stack+0x197/0x210 [ 1058.734500][T14150] should_fail.cold+0xa/0x15 [ 1058.739136][T14150] ? fault_create_debugfs_attr+0x180/0x180 [ 1058.744973][T14150] ? ___might_sleep+0x163/0x2c0 [ 1058.749857][T14150] __should_failslab+0x121/0x190 [ 1058.754825][T14150] should_failslab+0x9/0x14 [ 1058.759356][T14150] kmem_cache_alloc+0x2aa/0x710 [ 1058.764226][T14150] ? __d_lookup+0x42a/0x750 [ 1058.768748][T14150] ? lookup_dcache+0x23/0x140 [ 1058.773450][T14150] ? d_lookup+0xf4/0x260 [ 1058.777718][T14150] __d_alloc+0x2e/0x8c0 [ 1058.781916][T14150] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1058.787660][T14150] d_alloc+0x4d/0x280 [ 1058.791657][T14150] __lookup_hash+0xcd/0x190 [ 1058.796182][T14150] filename_create+0x1a7/0x4f0 [ 1058.800973][T14150] ? kern_path_mountpoint+0x40/0x40 20:06:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400300, 0x0) 20:06:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20404000, 0x0) [ 1058.806194][T14150] ? strncpy_from_user+0x2b4/0x400 [ 1058.811327][T14150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1058.817591][T14150] ? getname_flags+0x277/0x5b0 [ 1058.822503][T14150] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1058.828770][T14150] do_mknodat+0x1a4/0x480 [ 1058.833133][T14150] ? do_file_open_root+0x3a0/0x3a0 [ 1058.838267][T14150] ? do_syscall_64+0x26/0x790 [ 1058.842968][T14150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1058.849154][T14150] ? do_syscall_64+0x26/0x790 [ 1058.853857][T14150] __x64_sys_mknod+0x7b/0xb0 [ 1058.858471][T14150] do_syscall_64+0xfa/0x790 [ 1058.863123][T14150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1058.869031][T14150] RIP: 0033:0x45a639 [ 1058.872943][T14150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1058.892720][T14150] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1058.901156][T14150] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1058.909149][T14150] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1058.917178][T14150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1058.925285][T14150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1058.933266][T14150] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20100000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20404800, 0x0) 20:06:41 executing program 4 (fault-call:8 fault-nth:3): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1059.337939][T14865] FAULT_INJECTION: forcing a failure. [ 1059.337939][T14865] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.364647][T14865] CPU: 1 PID: 14865 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1059.374725][T14865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.384802][T14865] Call Trace: [ 1059.388133][T14865] dump_stack+0x197/0x210 [ 1059.392500][T14865] should_fail.cold+0xa/0x15 [ 1059.397130][T14865] ? fault_create_debugfs_attr+0x180/0x180 [ 1059.402967][T14865] ? ___might_sleep+0x163/0x2c0 [ 1059.407836][T14865] __should_failslab+0x121/0x190 [ 1059.412774][T14865] should_failslab+0x9/0x14 [ 1059.417277][T14865] kmem_cache_alloc_trace+0x2d3/0x790 [ 1059.422645][T14865] ? lock_downgrade+0x920/0x920 [ 1059.427490][T14865] ? rwlock_bug.part.0+0x90/0x90 [ 1059.432512][T14865] p9_fid_create+0x48/0x2b0 [ 1059.437029][T14865] p9_client_attach+0x9a/0x6a0 [ 1059.441938][T14865] ? v9fs_fid_find+0x1dd/0x260 [ 1059.446884][T14865] ? p9_client_readlink+0x400/0x400 [ 1059.452091][T14865] ? v9fs_session_init.cold+0x73/0x73 [ 1059.457462][T14865] ? __lockdep_free_key_range+0x120/0x120 [ 1059.463185][T14865] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1059.468873][T14865] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1059.474592][T14865] v9fs_fid_lookup+0xd9/0x1d0 [ 1059.479356][T14865] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1059.484634][T14865] ? v9fs_vfs_create+0x120/0x120 [ 1059.489756][T14865] ? do_raw_spin_unlock+0x178/0x270 [ 1059.494953][T14865] v9fs_vfs_lookup+0x71/0x90 [ 1059.499558][T14865] __lookup_hash+0x11d/0x190 [ 1059.504230][T14865] filename_create+0x1a7/0x4f0 [ 1059.509011][T14865] ? kern_path_mountpoint+0x40/0x40 [ 1059.514217][T14865] ? strncpy_from_user+0x2b4/0x400 [ 1059.519334][T14865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1059.525578][T14865] ? getname_flags+0x277/0x5b0 [ 1059.530333][T14865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1059.536583][T14865] do_mknodat+0x1a4/0x480 [ 1059.541445][T14865] ? do_file_open_root+0x3a0/0x3a0 [ 1059.546564][T14865] ? do_syscall_64+0x26/0x790 [ 1059.551238][T14865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1059.557296][T14865] ? do_syscall_64+0x26/0x790 [ 1059.561972][T14865] __x64_sys_mknod+0x7b/0xb0 [ 1059.566570][T14865] do_syscall_64+0xfa/0x790 [ 1059.571191][T14865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1059.577195][T14865] RIP: 0033:0x45a639 [ 1059.581090][T14865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1059.600691][T14865] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1059.609158][T14865] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1059.617127][T14865] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1059.625339][T14865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1059.633444][T14865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1059.641581][T14865] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e651", 0x40}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400500, 0x0) 20:06:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x3f000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20404c00, 0x0) 20:06:44 executing program 4 (fault-call:8 fault-nth:4): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1061.794205][T14909] FAULT_INJECTION: forcing a failure. [ 1061.794205][T14909] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.848778][T14909] CPU: 1 PID: 14909 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1061.858717][T14909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.868790][T14909] Call Trace: [ 1061.872106][T14909] dump_stack+0x197/0x210 [ 1061.876472][T14909] should_fail.cold+0xa/0x15 [ 1061.881093][T14909] ? fault_create_debugfs_attr+0x180/0x180 [ 1061.886924][T14909] ? ___might_sleep+0x163/0x2c0 [ 1061.891803][T14909] __should_failslab+0x121/0x190 20:06:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x40000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20406800, 0x0) [ 1061.896771][T14909] should_failslab+0x9/0x14 [ 1061.901310][T14909] kmem_cache_alloc+0x2aa/0x710 [ 1061.906188][T14909] ? kmem_cache_alloc+0x364/0x710 [ 1061.911491][T14909] ? filename_create+0x1a7/0x4f0 [ 1061.916460][T14909] p9_fcall_init.isra.0+0x118/0x1d0 [ 1061.921688][T14909] p9_client_prepare_req.part.0+0xa3/0x810 [ 1061.927522][T14909] p9_client_rpc+0x21c/0x12a0 [ 1061.932221][T14909] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1061.938598][T14909] ? p9_client_prepare_req.part.0+0x810/0x810 20:06:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400600, 0x0) [ 1061.944692][T14909] ? __kasan_check_read+0x11/0x20 [ 1061.949896][T14909] ? mark_lock+0xc2/0x1220 [ 1061.954349][T14909] ? mark_held_locks+0xa4/0xf0 [ 1061.959144][T14909] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1061.964446][T14909] ? trace_hardirqs_on+0x67/0x240 [ 1061.969502][T14909] p9_client_attach+0x170/0x6a0 [ 1061.974369][T14909] ? v9fs_fid_find+0x1dd/0x260 [ 1061.979136][T14909] ? p9_client_readlink+0x400/0x400 [ 1061.984344][T14909] ? v9fs_session_init.cold+0x73/0x73 [ 1061.989851][T14909] ? __lockdep_free_key_range+0x120/0x120 [ 1061.995589][T14909] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1062.001148][T14909] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1062.006893][T14909] v9fs_fid_lookup+0xd9/0x1d0 [ 1062.011598][T14909] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1062.016907][T14909] ? v9fs_vfs_create+0x120/0x120 [ 1062.021863][T14909] ? do_raw_spin_unlock+0x178/0x270 [ 1062.021886][T14909] v9fs_vfs_lookup+0x71/0x90 [ 1062.021907][T14909] __lookup_hash+0x11d/0x190 [ 1062.036320][T14909] filename_create+0x1a7/0x4f0 [ 1062.041108][T14909] ? kern_path_mountpoint+0x40/0x40 [ 1062.046322][T14909] ? strncpy_from_user+0x2b4/0x400 [ 1062.046346][T14909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1062.046361][T14909] ? getname_flags+0x277/0x5b0 [ 1062.046384][T14909] do_mknodat+0x1a4/0x480 [ 1062.066915][T14909] ? do_file_open_root+0x3a0/0x3a0 [ 1062.072045][T14909] ? do_syscall_64+0x26/0x790 [ 1062.076740][T14909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1062.082826][T14909] ? do_syscall_64+0x26/0x790 [ 1062.087527][T14909] __x64_sys_mknod+0x7b/0xb0 [ 1062.092136][T14909] do_syscall_64+0xfa/0x790 [ 1062.096665][T14909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1062.102696][T14909] RIP: 0033:0x45a639 [ 1062.106741][T14909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1062.126364][T14909] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1062.134796][T14909] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1062.142871][T14909] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1062.150939][T14909] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1062.158930][T14909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1062.166945][T14909] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x8cffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:44 executing program 4 (fault-call:8 fault-nth:5): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20406c00, 0x0) [ 1062.505281][T15649] FAULT_INJECTION: forcing a failure. [ 1062.505281][T15649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1062.518822][T15649] CPU: 0 PID: 15649 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1062.528845][T15649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1062.539010][T15649] Call Trace: [ 1062.542358][T15649] dump_stack+0x197/0x210 [ 1062.546687][T15649] should_fail.cold+0xa/0x15 [ 1062.551355][T15649] ? save_stack+0x5c/0x90 [ 1062.555702][T15649] ? fault_create_debugfs_attr+0x180/0x180 [ 1062.561661][T15649] ? p9_client_attach+0x170/0x6a0 [ 1062.566711][T15649] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1062.572471][T15649] ? v9fs_fid_lookup+0xd9/0x1d0 [ 1062.577343][T15649] ? v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1062.582816][T15649] ? v9fs_vfs_lookup+0x71/0x90 [ 1062.587681][T15649] ? __lookup_hash+0x11d/0x190 [ 1062.592458][T15649] ? filename_create+0x1a7/0x4f0 [ 1062.597399][T15649] ? do_mknodat+0x1a4/0x480 [ 1062.601901][T15649] should_fail_alloc_page+0x50/0x60 [ 1062.607111][T15649] __alloc_pages_nodemask+0x1a1/0x910 [ 1062.612473][T15649] ? arch_stack_walk+0x97/0xf0 [ 1062.617520][T15649] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1062.623240][T15649] ? fault_create_debugfs_attr+0x180/0x180 [ 1062.629036][T15649] cache_grow_begin+0x90/0xc60 [ 1062.633796][T15649] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1062.639160][T15649] ? trace_hardirqs_off+0x62/0x240 [ 1062.644339][T15649] kmem_cache_alloc+0x64e/0x710 [ 1062.649183][T15649] p9_fcall_init.isra.0+0x118/0x1d0 [ 1062.654370][T15649] p9_client_prepare_req.part.0+0xa3/0x810 [ 1062.660242][T15649] p9_client_rpc+0x21c/0x12a0 [ 1062.664916][T15649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1062.671157][T15649] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1062.677218][T15649] ? __kasan_check_read+0x11/0x20 [ 1062.682243][T15649] ? mark_lock+0xc2/0x1220 [ 1062.686776][T15649] ? mark_held_locks+0xa4/0xf0 [ 1062.691566][T15649] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1062.696879][T15649] ? trace_hardirqs_on+0x67/0x240 [ 1062.701964][T15649] p9_client_attach+0x170/0x6a0 [ 1062.706842][T15649] ? v9fs_fid_find+0x1dd/0x260 [ 1062.711594][T15649] ? p9_client_readlink+0x400/0x400 [ 1062.716781][T15649] ? v9fs_session_init.cold+0x73/0x73 [ 1062.722154][T15649] ? __lockdep_free_key_range+0x120/0x120 [ 1062.727868][T15649] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1062.733400][T15649] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1062.739111][T15649] v9fs_fid_lookup+0xd9/0x1d0 [ 1062.743780][T15649] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1062.749055][T15649] ? v9fs_vfs_create+0x120/0x120 [ 1062.754041][T15649] ? do_raw_spin_unlock+0x178/0x270 [ 1062.759229][T15649] v9fs_vfs_lookup+0x71/0x90 [ 1062.763807][T15649] __lookup_hash+0x11d/0x190 [ 1062.768386][T15649] filename_create+0x1a7/0x4f0 [ 1062.773138][T15649] ? kern_path_mountpoint+0x40/0x40 [ 1062.778325][T15649] ? strncpy_from_user+0x2b4/0x400 [ 1062.783428][T15649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1062.789652][T15649] ? getname_flags+0x277/0x5b0 [ 1062.794437][T15649] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1062.800754][T15649] do_mknodat+0x1a4/0x480 [ 1062.805122][T15649] ? do_file_open_root+0x3a0/0x3a0 [ 1062.810222][T15649] ? do_syscall_64+0x26/0x790 [ 1062.814898][T15649] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1062.820949][T15649] ? do_syscall_64+0x26/0x790 [ 1062.825619][T15649] __x64_sys_mknod+0x7b/0xb0 [ 1062.830328][T15649] do_syscall_64+0xfa/0x790 [ 1062.834867][T15649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1062.840747][T15649] RIP: 0033:0x45a639 [ 1062.844631][T15649] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1062.864268][T15649] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1062.872750][T15649] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1062.880825][T15649] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1062.888786][T15649] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1062.896746][T15649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1062.904707][T15649] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e651", 0x40}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000004, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400700, 0x0) 20:06:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xc0ed0000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20407400, 0x0) 20:06:47 executing program 4 (fault-call:8 fault-nth:6): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1064.881235][T15761] FAULT_INJECTION: forcing a failure. [ 1064.881235][T15761] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1064.894494][T15761] CPU: 1 PID: 15761 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1064.904400][T15761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.914635][T15761] Call Trace: [ 1064.917949][T15761] dump_stack+0x197/0x210 [ 1064.922311][T15761] should_fail.cold+0xa/0x15 [ 1064.926926][T15761] ? save_stack+0x5c/0x90 [ 1064.931295][T15761] ? fault_create_debugfs_attr+0x180/0x180 [ 1064.937274][T15761] ? p9_client_attach+0x170/0x6a0 [ 1064.942325][T15761] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1064.948054][T15761] ? v9fs_fid_lookup+0xd9/0x1d0 [ 1064.948074][T15761] ? v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1064.958387][T15761] ? v9fs_vfs_lookup+0x71/0x90 [ 1064.963159][T15761] ? __lookup_hash+0x11d/0x190 [ 1064.963173][T15761] ? filename_create+0x1a7/0x4f0 [ 1064.963186][T15761] ? do_mknodat+0x1a4/0x480 [ 1064.963209][T15761] should_fail_alloc_page+0x50/0x60 [ 1064.963227][T15761] __alloc_pages_nodemask+0x1a1/0x910 [ 1064.963242][T15761] ? arch_stack_walk+0x97/0xf0 [ 1064.963261][T15761] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1064.963286][T15761] ? fault_create_debugfs_attr+0x180/0x180 [ 1064.963307][T15761] cache_grow_begin+0x90/0xc60 [ 1064.963330][T15761] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1065.014604][T15761] ? trace_hardirqs_off+0x62/0x240 [ 1065.019744][T15761] kmem_cache_alloc+0x64e/0x710 [ 1065.024633][T15761] p9_fcall_init.isra.0+0x118/0x1d0 20:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20407a00, 0x0) [ 1065.029856][T15761] p9_client_prepare_req.part.0+0xa3/0x810 [ 1065.035690][T15761] p9_client_rpc+0x21c/0x12a0 [ 1065.040392][T15761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1065.046655][T15761] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1065.052748][T15761] ? __kasan_check_read+0x11/0x20 [ 1065.057796][T15761] ? mark_lock+0xc2/0x1220 [ 1065.062233][T15761] ? mark_held_locks+0xa4/0xf0 [ 1065.067029][T15761] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1065.072329][T15761] ? trace_hardirqs_on+0x67/0x240 [ 1065.077388][T15761] p9_client_attach+0x170/0x6a0 20:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040f5ff, 0x0) [ 1065.082262][T15761] ? v9fs_fid_find+0x1dd/0x260 [ 1065.087044][T15761] ? p9_client_readlink+0x400/0x400 [ 1065.092258][T15761] ? v9fs_session_init.cold+0x73/0x73 [ 1065.097649][T15761] ? __lockdep_free_key_range+0x120/0x120 [ 1065.103400][T15761] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1065.108968][T15761] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1065.114715][T15761] v9fs_fid_lookup+0xd9/0x1d0 [ 1065.119409][T15761] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1065.124850][T15761] ? v9fs_vfs_create+0x120/0x120 [ 1065.129806][T15761] ? do_raw_spin_unlock+0x178/0x270 [ 1065.135168][T15761] v9fs_vfs_lookup+0x71/0x90 [ 1065.139784][T15761] __lookup_hash+0x11d/0x190 [ 1065.144390][T15761] filename_create+0x1a7/0x4f0 [ 1065.144407][T15761] ? kern_path_mountpoint+0x40/0x40 [ 1065.144423][T15761] ? strncpy_from_user+0x2b4/0x400 [ 1065.144442][T15761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1065.144455][T15761] ? getname_flags+0x277/0x5b0 [ 1065.144467][T15761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1065.144485][T15761] do_mknodat+0x1a4/0x480 [ 1065.144506][T15761] ? do_file_open_root+0x3a0/0x3a0 [ 1065.154640][T15761] ? do_syscall_64+0x26/0x790 [ 1065.154659][T15761] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.154673][T15761] ? do_syscall_64+0x26/0x790 [ 1065.154695][T15761] __x64_sys_mknod+0x7b/0xb0 [ 1065.154712][T15761] do_syscall_64+0xfa/0x790 [ 1065.154731][T15761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.154743][T15761] RIP: 0033:0x45a639 [ 1065.154759][T15761] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1065.154766][T15761] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1065.154779][T15761] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1065.154787][T15761] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1065.154801][T15761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1065.273224][T15761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 20:06:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400a00, 0x0) [ 1065.281306][T15761] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d6", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2040fff5, 0x0) 20:06:47 executing program 4 (fault-call:8 fault-nth:7): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000005, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xf6ffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20401200, 0x0) [ 1065.705493][T16499] FAULT_INJECTION: forcing a failure. [ 1065.705493][T16499] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.725840][T16499] CPU: 1 PID: 16499 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1065.735770][T16499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1065.745835][T16499] Call Trace: [ 1065.749149][T16499] dump_stack+0x197/0x210 20:06:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x2) [ 1065.753504][T16499] should_fail.cold+0xa/0x15 [ 1065.758115][T16499] ? fault_create_debugfs_attr+0x180/0x180 [ 1065.763935][T16499] ? ___might_sleep+0x163/0x2c0 [ 1065.768798][T16499] __should_failslab+0x121/0x190 [ 1065.773752][T16499] should_failslab+0x9/0x14 [ 1065.778267][T16499] kmem_cache_alloc+0x2aa/0x710 [ 1065.783138][T16499] p9_fcall_init.isra.0+0x118/0x1d0 [ 1065.788345][T16499] p9_client_prepare_req.part.0+0x142/0x810 [ 1065.794252][T16499] p9_client_rpc+0x21c/0x12a0 [ 1065.798943][T16499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:06:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xff000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1065.805192][T16499] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1065.811272][T16499] ? __kasan_check_read+0x11/0x20 [ 1065.816305][T16499] ? mark_lock+0xc2/0x1220 [ 1065.820743][T16499] ? mark_held_locks+0xa4/0xf0 [ 1065.825516][T16499] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1065.830811][T16499] ? trace_hardirqs_on+0x67/0x240 [ 1065.835860][T16499] p9_client_attach+0x170/0x6a0 [ 1065.840719][T16499] ? v9fs_fid_find+0x1dd/0x260 [ 1065.845493][T16499] ? p9_client_readlink+0x400/0x400 [ 1065.850698][T16499] ? v9fs_session_init.cold+0x73/0x73 [ 1065.856076][T16499] ? __lockdep_free_key_range+0x120/0x120 [ 1065.861808][T16499] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1065.867357][T16499] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1065.873087][T16499] v9fs_fid_lookup+0xd9/0x1d0 [ 1065.877774][T16499] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1065.883068][T16499] ? v9fs_vfs_create+0x120/0x120 [ 1065.888017][T16499] ? do_raw_spin_unlock+0x178/0x270 [ 1065.893227][T16499] v9fs_vfs_lookup+0x71/0x90 [ 1065.897826][T16499] __lookup_hash+0x11d/0x190 [ 1065.902433][T16499] filename_create+0x1a7/0x4f0 [ 1065.907217][T16499] ? kern_path_mountpoint+0x40/0x40 [ 1065.912424][T16499] ? strncpy_from_user+0x2b4/0x400 [ 1065.917553][T16499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1065.923803][T16499] ? getname_flags+0x277/0x5b0 [ 1065.928574][T16499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1065.934827][T16499] do_mknodat+0x1a4/0x480 [ 1065.939171][T16499] ? do_file_open_root+0x3a0/0x3a0 [ 1065.944289][T16499] ? do_syscall_64+0x26/0x790 [ 1065.948973][T16499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:06:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20402d00, 0x0) [ 1065.955045][T16499] ? do_syscall_64+0x26/0x790 [ 1065.959736][T16499] __x64_sys_mknod+0x7b/0xb0 [ 1065.964335][T16499] do_syscall_64+0xfa/0x790 [ 1065.968854][T16499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.974747][T16499] RIP: 0033:0x45a639 [ 1065.978644][T16499] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1065.998255][T16499] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 20:06:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x3) [ 1066.006677][T16499] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1066.014655][T16499] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1066.022638][T16499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1066.030622][T16499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1066.038601][T16499] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xfffff000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000006, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:50 executing program 4 (fault-call:8 fault-nth:8): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20404000, 0x0) 20:06:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4) 20:06:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xffffff8c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d6", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000007, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20404800, 0x0) [ 1068.558203][T17288] FAULT_INJECTION: forcing a failure. [ 1068.558203][T17288] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1068.571460][T17288] CPU: 1 PID: 17288 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1068.581470][T17288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.591541][T17288] Call Trace: [ 1068.594848][T17288] dump_stack+0x197/0x210 [ 1068.599200][T17288] should_fail.cold+0xa/0x15 [ 1068.603802][T17288] ? p9_client_rpc+0x21c/0x12a0 [ 1068.608670][T17288] ? fault_create_debugfs_attr+0x180/0x180 [ 1068.614475][T17288] ? filename_create+0x1a7/0x4f0 [ 1068.614489][T17288] ? do_mknodat+0x1a4/0x480 [ 1068.614502][T17288] ? __x64_sys_mknod+0x7b/0xb0 [ 1068.614520][T17288] ? do_syscall_64+0xfa/0x790 [ 1068.614536][T17288] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.614560][T17288] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1068.639449][T17288] should_fail_alloc_page+0x50/0x60 [ 1068.639467][T17288] __alloc_pages_nodemask+0x1a1/0x910 [ 1068.639481][T17288] ? cache_grow_end+0xa4/0x190 [ 1068.639505][T17288] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1068.666580][T17288] ? __kasan_check_read+0x11/0x20 [ 1068.671619][T17288] ? fault_create_debugfs_attr+0x180/0x180 [ 1068.677438][T17288] cache_grow_begin+0x90/0xc60 [ 1068.682219][T17288] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1068.687602][T17288] ? trace_hardirqs_off+0x62/0x240 [ 1068.692729][T17288] kmem_cache_alloc+0x64e/0x710 [ 1068.697600][T17288] p9_fcall_init.isra.0+0x118/0x1d0 [ 1068.702816][T17288] p9_client_prepare_req.part.0+0x142/0x810 [ 1068.708728][T17288] p9_client_rpc+0x21c/0x12a0 [ 1068.713419][T17288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1068.719673][T17288] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1068.725749][T17288] ? __kasan_check_read+0x11/0x20 [ 1068.730784][T17288] ? mark_lock+0xc2/0x1220 [ 1068.735222][T17288] ? mark_held_locks+0xa4/0xf0 [ 1068.740001][T17288] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1068.745299][T17288] ? trace_hardirqs_on+0x67/0x240 [ 1068.750344][T17288] p9_client_attach+0x170/0x6a0 20:06:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20404c00, 0x0) [ 1068.755213][T17288] ? v9fs_fid_find+0x1dd/0x260 [ 1068.759989][T17288] ? p9_client_readlink+0x400/0x400 [ 1068.765194][T17288] ? v9fs_session_init.cold+0x73/0x73 [ 1068.770579][T17288] ? __lockdep_free_key_range+0x120/0x120 [ 1068.776316][T17288] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1068.781873][T17288] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1068.787600][T17288] v9fs_fid_lookup+0xd9/0x1d0 [ 1068.792268][T17288] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1068.792285][T17288] ? v9fs_vfs_create+0x120/0x120 [ 1068.792303][T17288] ? do_raw_spin_unlock+0x178/0x270 [ 1068.792322][T17288] v9fs_vfs_lookup+0x71/0x90 [ 1068.792338][T17288] __lookup_hash+0x11d/0x190 [ 1068.792360][T17288] filename_create+0x1a7/0x4f0 [ 1068.821638][T17288] ? kern_path_mountpoint+0x40/0x40 [ 1068.826849][T17288] ? strncpy_from_user+0x2b4/0x400 [ 1068.831972][T17288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1068.838222][T17288] ? getname_flags+0x277/0x5b0 [ 1068.842997][T17288] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1068.849249][T17288] do_mknodat+0x1a4/0x480 [ 1068.853587][T17288] ? do_file_open_root+0x3a0/0x3a0 [ 1068.858705][T17288] ? do_syscall_64+0x26/0x790 [ 1068.863384][T17288] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.869459][T17288] ? do_syscall_64+0x26/0x790 [ 1068.874149][T17288] __x64_sys_mknod+0x7b/0xb0 [ 1068.878738][T17288] do_syscall_64+0xfa/0x790 [ 1068.883240][T17288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.889134][T17288] RIP: 0033:0x45a639 20:06:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20406800, 0x0) [ 1068.893033][T17288] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.912635][T17288] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1068.921111][T17288] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1068.929074][T17288] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1068.937040][T17288] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1068.945003][T17288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 20:06:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xfffffff6, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x5) [ 1068.945011][T17288] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:51 executing program 4 (fault-call:8 fault-nth:9): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6) 20:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000008, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xedc000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20406c00, 0x0) [ 1069.439095][T18193] FAULT_INJECTION: forcing a failure. [ 1069.439095][T18193] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.452101][T18193] CPU: 1 PID: 18193 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1069.461996][T18193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.472058][T18193] Call Trace: [ 1069.475356][T18193] dump_stack+0x197/0x210 [ 1069.479712][T18193] should_fail.cold+0xa/0x15 [ 1069.484329][T18193] ? fault_create_debugfs_attr+0x180/0x180 [ 1069.490165][T18193] __should_failslab+0x121/0x190 [ 1069.495132][T18193] should_failslab+0x9/0x14 [ 1069.499649][T18193] kmem_cache_alloc+0x47/0x710 [ 1069.504430][T18193] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1069.509813][T18193] ? p9_client_prepare_req.part.0+0x142/0x810 [ 1069.515901][T18193] ? p9_client_rpc+0x21c/0x12a0 [ 1069.520762][T18193] ? p9_client_attach+0x170/0x6a0 [ 1069.525795][T18193] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1069.531523][T18193] ? v9fs_fid_lookup+0xd9/0x1d0 [ 1069.536384][T18193] ? v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1069.541840][T18193] ? v9fs_vfs_lookup+0x71/0x90 [ 1069.546616][T18193] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1069.552960][T18193] idr_get_free+0x4a6/0x8d0 [ 1069.557487][T18193] idr_alloc_u32+0x19e/0x330 [ 1069.562081][T18193] ? __fprop_inc_percpu_max+0x230/0x230 [ 1069.562105][T18193] ? mark_held_locks+0xf0/0xf0 [ 1069.562123][T18193] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1069.562141][T18193] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1069.562158][T18193] idr_alloc+0xe5/0x150 [ 1069.562174][T18193] ? idr_alloc_u32+0x330/0x330 [ 1069.562202][T18193] p9_client_prepare_req.part.0+0x28e/0x810 [ 1069.562225][T18193] p9_client_rpc+0x21c/0x12a0 [ 1069.562243][T18193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1069.562262][T18193] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1069.616006][T18193] ? __kasan_check_read+0x11/0x20 [ 1069.621044][T18193] ? mark_lock+0xc2/0x1220 [ 1069.625483][T18193] ? mark_held_locks+0xa4/0xf0 [ 1069.630247][T18193] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1069.635517][T18193] ? trace_hardirqs_on+0x67/0x240 [ 1069.640648][T18193] p9_client_attach+0x170/0x6a0 [ 1069.645507][T18193] ? v9fs_fid_find+0x1dd/0x260 [ 1069.650273][T18193] ? p9_client_readlink+0x400/0x400 [ 1069.655478][T18193] ? v9fs_session_init.cold+0x73/0x73 [ 1069.660858][T18193] ? __lockdep_free_key_range+0x120/0x120 [ 1069.666593][T18193] v9fs_fid_lookup_with_uid+0x683/0x900 [ 1069.672144][T18193] ? v9fs_fid_lookup_with_uid+0x683/0x900 [ 1069.677908][T18193] v9fs_fid_lookup+0xd9/0x1d0 [ 1069.682595][T18193] v9fs_vfs_lookup.part.0+0xe7/0x3e0 [ 1069.687895][T18193] ? v9fs_vfs_create+0x120/0x120 [ 1069.692847][T18193] ? do_raw_spin_unlock+0x178/0x270 [ 1069.698057][T18193] v9fs_vfs_lookup+0x71/0x90 [ 1069.702760][T18193] __lookup_hash+0x11d/0x190 [ 1069.707364][T18193] filename_create+0x1a7/0x4f0 [ 1069.712140][T18193] ? kern_path_mountpoint+0x40/0x40 [ 1069.717346][T18193] ? strncpy_from_user+0x2b4/0x400 [ 1069.722477][T18193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1069.728712][T18193] ? getname_flags+0x277/0x5b0 [ 1069.733468][T18193] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1069.739723][T18193] do_mknodat+0x1a4/0x480 [ 1069.744051][T18193] ? do_file_open_root+0x3a0/0x3a0 [ 1069.749159][T18193] ? do_syscall_64+0x26/0x790 [ 1069.753836][T18193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.759910][T18193] ? do_syscall_64+0x26/0x790 [ 1069.764600][T18193] __x64_sys_mknod+0x7b/0xb0 [ 1069.769209][T18193] do_syscall_64+0xfa/0x790 [ 1069.773717][T18193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.779616][T18193] RIP: 0033:0x45a639 [ 1069.783515][T18193] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.803124][T18193] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1069.811536][T18193] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1069.819493][T18193] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1069.827451][T18193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1069.835526][T18193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1069.843504][T18193] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d6", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7) 20:06:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xf0ffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:53 executing program 4 (fault-call:8 fault-nth:10): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20407400, 0x0) 20:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000009, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1071.627137][T18450] FAULT_INJECTION: forcing a failure. [ 1071.627137][T18450] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.667670][T18450] CPU: 1 PID: 18450 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1071.677686][T18450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.687764][T18450] Call Trace: [ 1071.691068][T18450] dump_stack+0x197/0x210 [ 1071.695847][T18450] should_fail.cold+0xa/0x15 [ 1071.700454][T18450] ? fault_create_debugfs_attr+0x180/0x180 [ 1071.706274][T18450] ? ___might_sleep+0x163/0x2c0 [ 1071.711134][T18450] __should_failslab+0x121/0x190 20:06:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x8) 20:06:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x100000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1071.716083][T18450] should_failslab+0x9/0x14 [ 1071.720594][T18450] kmem_cache_alloc_trace+0x2d3/0x790 [ 1071.725989][T18450] ? lock_downgrade+0x920/0x920 [ 1071.730855][T18450] ? rwlock_bug.part.0+0x90/0x90 [ 1071.735818][T18450] p9_fid_create+0x48/0x2b0 [ 1071.740334][T18450] p9_client_walk+0xdf/0x890 [ 1071.744930][T18450] ? v9fs_fid_add+0xfa/0x150 [ 1071.749514][T18450] ? p9_client_clunk+0x150/0x150 [ 1071.754459][T18450] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1071.760110][T18450] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1071.765489][T18450] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1071.771039][T18450] ? v9fs_vfs_create+0x120/0x120 [ 1071.775991][T18450] ? do_raw_spin_unlock+0x178/0x270 [ 1071.781206][T18450] v9fs_vfs_lookup+0x71/0x90 [ 1071.785806][T18450] __lookup_hash+0x11d/0x190 [ 1071.790411][T18450] filename_create+0x1a7/0x4f0 [ 1071.795185][T18450] ? kern_path_mountpoint+0x40/0x40 [ 1071.800388][T18450] ? strncpy_from_user+0x2b4/0x400 [ 1071.805512][T18450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1071.811754][T18450] ? getname_flags+0x277/0x5b0 [ 1071.816530][T18450] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1071.822781][T18450] do_mknodat+0x1a4/0x480 [ 1071.827121][T18450] ? do_file_open_root+0x3a0/0x3a0 [ 1071.832244][T18450] ? do_syscall_64+0x26/0x790 [ 1071.837050][T18450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.843124][T18450] ? do_syscall_64+0x26/0x790 [ 1071.847818][T18450] __x64_sys_mknod+0x7b/0xb0 [ 1071.852427][T18450] do_syscall_64+0xfa/0x790 [ 1071.856945][T18450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.862848][T18450] RIP: 0033:0x45a639 [ 1071.866754][T18450] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.886362][T18450] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1071.894785][T18450] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1071.902766][T18450] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1071.910745][T18450] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:06:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xa) 20:06:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20407a00, 0x0) [ 1071.918720][T18450] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1071.926699][T18450] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x200000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:54 executing program 4 (fault-call:8 fault-nth:11): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1072.360941][T19299] FAULT_INJECTION: forcing a failure. [ 1072.360941][T19299] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.381289][T19299] CPU: 1 PID: 19299 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1072.391210][T19299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.401296][T19299] Call Trace: [ 1072.404631][T19299] dump_stack+0x197/0x210 [ 1072.408950][T19299] should_fail.cold+0xa/0x15 [ 1072.413558][T19299] ? fault_create_debugfs_attr+0x180/0x180 [ 1072.419350][T19299] ? ___might_sleep+0x163/0x2c0 [ 1072.424189][T19299] __should_failslab+0x121/0x190 [ 1072.429108][T19299] should_failslab+0x9/0x14 [ 1072.433590][T19299] kmem_cache_alloc+0x2aa/0x710 [ 1072.438429][T19299] ? do_syscall_64+0xfa/0x790 [ 1072.443094][T19299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.449148][T19299] ? perf_trace_lock+0xeb/0x4c0 [ 1072.453988][T19299] p9_client_prepare_req.part.0+0x3d/0x810 [ 1072.459776][T19299] ? debug_smp_processor_id+0x33/0x18a [ 1072.465215][T19299] ? perf_trace_lock+0xeb/0x4c0 [ 1072.470106][T19299] p9_client_rpc+0x21c/0x12a0 [ 1072.474774][T19299] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1072.480845][T19299] ? __kasan_check_read+0x11/0x20 [ 1072.485848][T19299] ? mark_lock+0xc2/0x1220 [ 1072.490260][T19299] ? mark_held_locks+0xa4/0xf0 [ 1072.495006][T19299] ? _raw_spin_unlock_irq+0x23/0x80 [ 1072.500299][T19299] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1072.505581][T19299] ? trace_hardirqs_on+0x67/0x240 [ 1072.510612][T19299] p9_client_walk+0x1c2/0x890 [ 1072.515283][T19299] ? v9fs_fid_add+0xfa/0x150 [ 1072.519856][T19299] ? p9_client_clunk+0x150/0x150 [ 1072.524789][T19299] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1072.530422][T19299] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1072.535781][T19299] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1072.541332][T19299] ? v9fs_vfs_create+0x120/0x120 [ 1072.546253][T19299] ? do_raw_spin_unlock+0x178/0x270 [ 1072.551438][T19299] v9fs_vfs_lookup+0x71/0x90 [ 1072.556009][T19299] __lookup_hash+0x11d/0x190 [ 1072.560580][T19299] filename_create+0x1a7/0x4f0 [ 1072.565326][T19299] ? kern_path_mountpoint+0x40/0x40 [ 1072.570508][T19299] ? strncpy_from_user+0x2b4/0x400 [ 1072.575607][T19299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1072.581831][T19299] ? getname_flags+0x277/0x5b0 [ 1072.586575][T19299] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1072.592799][T19299] do_mknodat+0x1a4/0x480 [ 1072.597116][T19299] ? do_file_open_root+0x3a0/0x3a0 [ 1072.602221][T19299] ? do_syscall_64+0x26/0x790 [ 1072.606877][T19299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.612926][T19299] ? do_syscall_64+0x26/0x790 [ 1072.617681][T19299] __x64_sys_mknod+0x7b/0xb0 [ 1072.622258][T19299] do_syscall_64+0xfa/0x790 [ 1072.626742][T19299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.632612][T19299] RIP: 0033:0x45a639 [ 1072.636493][T19299] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.656094][T19299] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1072.664489][T19299] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1072.672459][T19299] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1072.680416][T19299] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1072.688369][T19299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1072.696321][T19299] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb5345556", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:06:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x10) 20:06:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000000a, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040f5ff, 0x0) 20:06:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x300000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:57 executing program 4 (fault-call:8 fault-nth:12): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1074.699986][T19307] FAULT_INJECTION: forcing a failure. [ 1074.699986][T19307] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.759076][T19307] CPU: 1 PID: 19307 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1074.769004][T19307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.779071][T19307] Call Trace: [ 1074.782378][T19307] dump_stack+0x197/0x210 [ 1074.786732][T19307] should_fail.cold+0xa/0x15 [ 1074.791344][T19307] ? fault_create_debugfs_attr+0x180/0x180 [ 1074.797165][T19307] ? ___might_sleep+0x163/0x2c0 [ 1074.802029][T19307] __should_failslab+0x121/0x190 [ 1074.806978][T19307] should_failslab+0x9/0x14 [ 1074.811492][T19307] kmem_cache_alloc+0x2aa/0x710 [ 1074.816357][T19307] ? kmem_cache_alloc+0x364/0x710 [ 1074.821388][T19307] ? do_syscall_64+0xfa/0x790 [ 1074.826076][T19307] p9_fcall_init.isra.0+0x118/0x1d0 [ 1074.831287][T19307] p9_client_prepare_req.part.0+0xa3/0x810 [ 1074.837112][T19307] p9_client_rpc+0x21c/0x12a0 [ 1074.841803][T19307] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1074.847877][T19307] ? __kasan_check_read+0x11/0x20 [ 1074.852913][T19307] ? mark_lock+0xc2/0x1220 [ 1074.857344][T19307] ? mark_held_locks+0xa4/0xf0 [ 1074.862117][T19307] ? _raw_spin_unlock_irq+0x23/0x80 [ 1074.867326][T19307] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1074.872613][T19307] ? trace_hardirqs_on+0x67/0x240 [ 1074.877663][T19307] p9_client_walk+0x1c2/0x890 [ 1074.882354][T19307] ? v9fs_fid_add+0xfa/0x150 [ 1074.886946][T19307] ? p9_client_clunk+0x150/0x150 [ 1074.891891][T19307] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1074.897538][T19307] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1074.902913][T19307] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1074.908473][T19307] ? v9fs_vfs_create+0x120/0x120 [ 1074.913416][T19307] ? do_raw_spin_unlock+0x178/0x270 [ 1074.918621][T19307] v9fs_vfs_lookup+0x71/0x90 [ 1074.923214][T19307] __lookup_hash+0x11d/0x190 [ 1074.927808][T19307] filename_create+0x1a7/0x4f0 [ 1074.932575][T19307] ? kern_path_mountpoint+0x40/0x40 [ 1074.937775][T19307] ? strncpy_from_user+0x2b4/0x400 [ 1074.942894][T19307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1074.949128][T19307] ? getname_flags+0x277/0x5b0 [ 1074.953889][T19307] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1074.960122][T19307] do_mknodat+0x1a4/0x480 [ 1074.964438][T19307] ? do_file_open_root+0x3a0/0x3a0 [ 1074.969545][T19307] ? do_syscall_64+0x26/0x790 [ 1074.974216][T19307] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.980275][T19307] ? do_syscall_64+0x26/0x790 [ 1074.984939][T19307] __x64_sys_mknod+0x7b/0xb0 [ 1074.989510][T19307] do_syscall_64+0xfa/0x790 [ 1074.994008][T19307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.999891][T19307] RIP: 0033:0x45a639 [ 1075.003765][T19307] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.023420][T19307] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1075.031846][T19307] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1075.039803][T19307] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1075.047755][T19307] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:06:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x400000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:06:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x2040fff5, 0x0) 20:06:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x12) [ 1075.055728][T19307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1075.063732][T19307] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:06:57 executing program 4 (fault-call:8 fault-nth:13): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:06:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000000b, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:06:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x500000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1075.491461][T19949] FAULT_INJECTION: forcing a failure. [ 1075.491461][T19949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.504703][T19949] CPU: 1 PID: 19949 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1075.514596][T19949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.524672][T19949] Call Trace: [ 1075.527989][T19949] dump_stack+0x197/0x210 [ 1075.532345][T19949] should_fail.cold+0xa/0x15 [ 1075.536954][T19949] ? save_stack+0x5c/0x90 [ 1075.541306][T19949] ? fault_create_debugfs_attr+0x180/0x180 [ 1075.547128][T19949] ? p9_client_walk+0x1c2/0x890 [ 1075.551992][T19949] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1075.557548][T19949] ? v9fs_vfs_lookup+0x71/0x90 [ 1075.562324][T19949] ? __lookup_hash+0x11d/0x190 [ 1075.567097][T19949] ? filename_create+0x1a7/0x4f0 [ 1075.572045][T19949] ? do_mknodat+0x1a4/0x480 [ 1075.576558][T19949] ? __x64_sys_mknod+0x7b/0xb0 [ 1075.581333][T19949] ? do_syscall_64+0xfa/0x790 [ 1075.586027][T19949] should_fail_alloc_page+0x50/0x60 [ 1075.591234][T19949] __alloc_pages_nodemask+0x1a1/0x910 [ 1075.596624][T19949] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1075.602376][T19949] ? fault_create_debugfs_attr+0x180/0x180 [ 1075.608198][T19949] cache_grow_begin+0x90/0xc60 [ 1075.612974][T19949] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1075.618359][T19949] ? trace_hardirqs_off+0x62/0x240 [ 1075.623487][T19949] kmem_cache_alloc+0x64e/0x710 [ 1075.628358][T19949] p9_fcall_init.isra.0+0x118/0x1d0 [ 1075.633585][T19949] p9_client_prepare_req.part.0+0xa3/0x810 [ 1075.639417][T19949] p9_client_rpc+0x21c/0x12a0 [ 1075.644116][T19949] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1075.650193][T19949] ? __kasan_check_read+0x11/0x20 [ 1075.655285][T19949] ? mark_lock+0xc2/0x1220 [ 1075.659706][T19949] ? mark_held_locks+0xa4/0xf0 [ 1075.664581][T19949] ? _raw_spin_unlock_irq+0x23/0x80 [ 1075.669777][T19949] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1075.675062][T19949] ? trace_hardirqs_on+0x67/0x240 [ 1075.680077][T19949] p9_client_walk+0x1c2/0x890 [ 1075.684790][T19949] ? v9fs_fid_add+0xfa/0x150 [ 1075.689433][T19949] ? p9_client_clunk+0x150/0x150 [ 1075.694378][T19949] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1075.700011][T19949] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1075.705369][T19949] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1075.710921][T19949] ? v9fs_vfs_create+0x120/0x120 [ 1075.715863][T19949] ? do_raw_spin_unlock+0x178/0x270 [ 1075.721193][T19949] v9fs_vfs_lookup+0x71/0x90 [ 1075.725807][T19949] __lookup_hash+0x11d/0x190 [ 1075.730385][T19949] filename_create+0x1a7/0x4f0 [ 1075.735137][T19949] ? kern_path_mountpoint+0x40/0x40 [ 1075.740319][T19949] ? strncpy_from_user+0x2b4/0x400 [ 1075.745420][T19949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1075.751664][T19949] ? getname_flags+0x277/0x5b0 [ 1075.756426][T19949] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1075.762686][T19949] do_mknodat+0x1a4/0x480 [ 1075.767022][T19949] ? do_file_open_root+0x3a0/0x3a0 [ 1075.772128][T19949] ? do_syscall_64+0x26/0x790 [ 1075.776798][T19949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.782862][T19949] ? do_syscall_64+0x26/0x790 [ 1075.787538][T19949] __x64_sys_mknod+0x7b/0xb0 [ 1075.792121][T19949] do_syscall_64+0xfa/0x790 [ 1075.796626][T19949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.802508][T19949] RIP: 0033:0x45a639 [ 1075.806393][T19949] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.825989][T19949] RSP: 002b:00007f7f6e791c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1075.834407][T19949] RAX: ffffffffffffffda RBX: 00007f7f6e791c90 RCX: 000000000045a639 [ 1075.842383][T19949] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1075.850344][T19949] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1075.858299][T19949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7926d4 [ 1075.866251][T19949] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x2d) 20:07:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x2) 20:07:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x600000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:00 executing program 4 (fault-call:8 fault-nth:14): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb5345556", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000000c, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1077.819311][T20156] FAULT_INJECTION: forcing a failure. [ 1077.819311][T20156] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.844117][T20156] CPU: 0 PID: 20156 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1077.854068][T20156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.864133][T20156] Call Trace: [ 1077.867440][T20156] dump_stack+0x197/0x210 [ 1077.871800][T20156] should_fail.cold+0xa/0x15 [ 1077.876405][T20156] ? fault_create_debugfs_attr+0x180/0x180 [ 1077.882227][T20156] ? ___might_sleep+0x163/0x2c0 [ 1077.887089][T20156] __should_failslab+0x121/0x190 [ 1077.892037][T20156] should_failslab+0x9/0x14 [ 1077.896552][T20156] kmem_cache_alloc+0x2aa/0x710 [ 1077.901422][T20156] p9_fcall_init.isra.0+0x118/0x1d0 [ 1077.906637][T20156] p9_client_prepare_req.part.0+0x142/0x810 [ 1077.912543][T20156] p9_client_rpc+0x21c/0x12a0 [ 1077.917221][T20156] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1077.923298][T20156] ? __kasan_check_read+0x11/0x20 [ 1077.928326][T20156] ? mark_lock+0xc2/0x1220 [ 1077.932745][T20156] ? mark_held_locks+0xa4/0xf0 [ 1077.932761][T20156] ? _raw_spin_unlock_irq+0x23/0x80 [ 1077.932776][T20156] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1077.932795][T20156] ? trace_hardirqs_on+0x67/0x240 [ 1077.953024][T20156] p9_client_walk+0x1c2/0x890 [ 1077.957717][T20156] ? v9fs_fid_add+0xfa/0x150 [ 1077.962326][T20156] ? p9_client_clunk+0x150/0x150 20:07:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x48) 20:07:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x3) [ 1077.967278][T20156] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1077.972933][T20156] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1077.978324][T20156] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1077.983889][T20156] ? v9fs_vfs_create+0x120/0x120 [ 1077.988846][T20156] ? do_raw_spin_unlock+0x178/0x270 [ 1077.994069][T20156] v9fs_vfs_lookup+0x71/0x90 [ 1077.998676][T20156] __lookup_hash+0x11d/0x190 [ 1078.003282][T20156] filename_create+0x1a7/0x4f0 [ 1078.008060][T20156] ? kern_path_mountpoint+0x40/0x40 [ 1078.013269][T20156] ? strncpy_from_user+0x2b4/0x400 [ 1078.018392][T20156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1078.025597][T20156] ? getname_flags+0x277/0x5b0 [ 1078.030372][T20156] do_mknodat+0x1a4/0x480 [ 1078.034710][T20156] ? do_file_open_root+0x3a0/0x3a0 [ 1078.039831][T20156] ? do_syscall_64+0x26/0x790 [ 1078.044514][T20156] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.050592][T20156] ? do_syscall_64+0x26/0x790 [ 1078.055286][T20156] __x64_sys_mknod+0x7b/0xb0 [ 1078.059888][T20156] do_syscall_64+0xfa/0x790 [ 1078.064410][T20156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.070304][T20156] RIP: 0033:0x45a639 [ 1078.074204][T20156] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.093816][T20156] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1078.102246][T20156] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1078.110230][T20156] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 20:07:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x700000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1078.118215][T20156] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1078.126196][T20156] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1078.134181][T20156] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4c) 20:07:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4) 20:07:00 executing program 4 (fault-call:8 fault-nth:15): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x800000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000000d, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x5) 20:07:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x68) [ 1078.706353][T21042] FAULT_INJECTION: forcing a failure. [ 1078.706353][T21042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1078.719602][T21042] CPU: 1 PID: 21042 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1078.729500][T21042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.739569][T21042] Call Trace: [ 1078.743083][T21042] dump_stack+0x197/0x210 [ 1078.747437][T21042] should_fail.cold+0xa/0x15 [ 1078.752065][T21042] ? p9_client_rpc+0x21c/0x12a0 [ 1078.756937][T21042] ? fault_create_debugfs_attr+0x180/0x180 [ 1078.762764][T21042] ? __x64_sys_mknod+0x7b/0xb0 [ 1078.767547][T21042] ? do_syscall_64+0xfa/0x790 [ 1078.772246][T21042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.778342][T21042] should_fail_alloc_page+0x50/0x60 [ 1078.783559][T21042] __alloc_pages_nodemask+0x1a1/0x910 [ 1078.788945][T21042] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1078.794245][T21042] ? retint_kernel+0x2b/0x2b [ 1078.798855][T21042] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1078.804604][T21042] ? fault_create_debugfs_attr+0x180/0x180 [ 1078.810430][T21042] cache_grow_begin+0x90/0xc60 [ 1078.815214][T21042] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1078.820946][T21042] ? trace_hardirqs_off+0x62/0x240 [ 1078.826071][T21042] kmem_cache_alloc+0x64e/0x710 [ 1078.826096][T21042] p9_fcall_init.isra.0+0x118/0x1d0 [ 1078.826115][T21042] p9_client_prepare_req.part.0+0x142/0x810 [ 1078.826136][T21042] p9_client_rpc+0x21c/0x12a0 [ 1078.826158][T21042] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1078.826174][T21042] ? __kasan_check_read+0x11/0x20 [ 1078.826191][T21042] ? mark_lock+0xc2/0x1220 [ 1078.826214][T21042] ? mark_held_locks+0xa4/0xf0 [ 1078.826230][T21042] ? _raw_spin_unlock_irq+0x23/0x80 [ 1078.826246][T21042] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1078.826259][T21042] ? trace_hardirqs_on+0x67/0x240 [ 1078.826288][T21042] p9_client_walk+0x1c2/0x890 [ 1078.887274][T21042] ? v9fs_fid_add+0xfa/0x150 [ 1078.891873][T21042] ? p9_client_clunk+0x150/0x150 [ 1078.896807][T21042] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1078.902439][T21042] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1078.907805][T21042] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1078.913355][T21042] ? v9fs_vfs_create+0x120/0x120 [ 1078.918298][T21042] ? do_raw_spin_unlock+0x178/0x270 [ 1078.923503][T21042] v9fs_vfs_lookup+0x71/0x90 [ 1078.928076][T21042] __lookup_hash+0x11d/0x190 [ 1078.932659][T21042] filename_create+0x1a7/0x4f0 [ 1078.937427][T21042] ? kern_path_mountpoint+0x40/0x40 [ 1078.942618][T21042] ? strncpy_from_user+0x2b4/0x400 [ 1078.947713][T21042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1078.953945][T21042] ? getname_flags+0x277/0x5b0 [ 1078.958710][T21042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1078.964945][T21042] do_mknodat+0x1a4/0x480 [ 1078.969270][T21042] ? do_file_open_root+0x3a0/0x3a0 [ 1078.974386][T21042] ? do_syscall_64+0x26/0x790 [ 1078.979062][T21042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.985116][T21042] ? do_syscall_64+0x26/0x790 [ 1078.989775][T21042] __x64_sys_mknod+0x7b/0xb0 [ 1078.994359][T21042] do_syscall_64+0xfa/0x790 [ 1078.998865][T21042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1079.004736][T21042] RIP: 0033:0x45a639 [ 1079.008621][T21042] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1079.028220][T21042] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1079.036620][T21042] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1079.044585][T21042] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1079.052722][T21042] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1079.060685][T21042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1079.068635][T21042] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb5345556", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x1000000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6c) 20:07:03 executing program 4 (fault-call:8 fault-nth:16): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6) 20:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000000e, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1080.922413][T21505] FAULT_INJECTION: forcing a failure. [ 1080.922413][T21505] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.935079][T21505] CPU: 1 PID: 21505 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1080.944983][T21505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.955056][T21505] Call Trace: [ 1080.958364][T21505] dump_stack+0x197/0x210 [ 1080.962721][T21505] should_fail.cold+0xa/0x15 20:07:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7) 20:07:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x74) 20:07:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x2000000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 1080.967360][T21505] ? fault_create_debugfs_attr+0x180/0x180 [ 1080.973202][T21505] __should_failslab+0x121/0x190 [ 1080.978164][T21505] should_failslab+0x9/0x14 [ 1080.982697][T21505] kmem_cache_alloc+0x47/0x710 [ 1080.987487][T21505] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1080.992885][T21505] ? p9_client_prepare_req.part.0+0x142/0x810 [ 1080.998972][T21505] ? p9_client_rpc+0x21c/0x12a0 [ 1081.003846][T21505] ? p9_client_walk+0x1c2/0x890 [ 1081.008710][T21505] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1081.014268][T21505] ? v9fs_vfs_lookup+0x71/0x90 [ 1081.019046][T21505] ? __lookup_hash+0x11d/0x190 [ 1081.023873][T21505] ? filename_create+0x1a7/0x4f0 [ 1081.028835][T21505] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1081.035208][T21505] idr_get_free+0x4a6/0x8d0 [ 1081.039741][T21505] idr_alloc_u32+0x19e/0x330 [ 1081.044352][T21505] ? __fprop_inc_percpu_max+0x230/0x230 [ 1081.049920][T21505] ? mark_held_locks+0xf0/0xf0 [ 1081.054690][T21505] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1081.060665][T21505] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1081.066491][T21505] idr_alloc+0xe5/0x150 [ 1081.066507][T21505] ? idr_alloc_u32+0x330/0x330 [ 1081.066532][T21505] p9_client_prepare_req.part.0+0x28e/0x810 [ 1081.066553][T21505] p9_client_rpc+0x21c/0x12a0 [ 1081.066574][T21505] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1081.066591][T21505] ? __kasan_check_read+0x11/0x20 [ 1081.066608][T21505] ? mark_lock+0xc2/0x1220 [ 1081.066630][T21505] ? mark_held_locks+0xa4/0xf0 [ 1081.066677][T21505] ? _raw_spin_unlock_irq+0x23/0x80 [ 1081.111535][T21505] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1081.116849][T21505] ? trace_hardirqs_on+0x67/0x240 [ 1081.121914][T21505] p9_client_walk+0x1c2/0x890 [ 1081.126607][T21505] ? v9fs_fid_add+0xfa/0x150 [ 1081.131213][T21505] ? p9_client_clunk+0x150/0x150 [ 1081.136161][T21505] ? v9fs_fid_lookup_with_uid+0xb8/0x900 [ 1081.141819][T21505] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1081.147205][T21505] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1081.152766][T21505] ? v9fs_vfs_create+0x120/0x120 [ 1081.157722][T21505] ? do_raw_spin_unlock+0x178/0x270 [ 1081.162939][T21505] v9fs_vfs_lookup+0x71/0x90 [ 1081.167539][T21505] __lookup_hash+0x11d/0x190 [ 1081.172145][T21505] filename_create+0x1a7/0x4f0 [ 1081.176935][T21505] ? kern_path_mountpoint+0x40/0x40 [ 1081.182147][T21505] ? strncpy_from_user+0x2b4/0x400 [ 1081.187275][T21505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.193529][T21505] ? getname_flags+0x277/0x5b0 [ 1081.198307][T21505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1081.204573][T21505] do_mknodat+0x1a4/0x480 [ 1081.208926][T21505] ? do_file_open_root+0x3a0/0x3a0 [ 1081.214061][T21505] ? do_syscall_64+0x26/0x790 [ 1081.218751][T21505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.224836][T21505] ? do_syscall_64+0x26/0x790 [ 1081.229533][T21505] __x64_sys_mknod+0x7b/0xb0 [ 1081.234142][T21505] do_syscall_64+0xfa/0x790 [ 1081.238669][T21505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.244583][T21505] RIP: 0033:0x45a639 [ 1081.248487][T21505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:07:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x8) 20:07:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7a) [ 1081.268104][T21505] RSP: 002b:00007f7f6e791c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1081.276539][T21505] RAX: ffffffffffffffda RBX: 00007f7f6e791c90 RCX: 000000000045a639 [ 1081.284528][T21505] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1081.292512][T21505] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1081.300504][T21505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7926d4 [ 1081.308498][T21505] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x2010000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa9", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:06 executing program 4 (fault-call:8 fault-nth:17): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xa) 20:07:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xf5) 20:07:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x3f00000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000000f, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1083.873202][T22197] FAULT_INJECTION: forcing a failure. [ 1083.873202][T22197] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.906547][T22197] CPU: 1 PID: 22197 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1083.916484][T22197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.926555][T22197] Call Trace: [ 1083.929860][T22197] dump_stack+0x197/0x210 [ 1083.934209][T22197] should_fail.cold+0xa/0x15 [ 1083.938823][T22197] ? fault_create_debugfs_attr+0x180/0x180 [ 1083.944645][T22197] ? ___might_sleep+0x163/0x2c0 [ 1083.949518][T22197] __should_failslab+0x121/0x190 [ 1083.954483][T22197] should_failslab+0x9/0x14 [ 1083.959004][T22197] kmem_cache_alloc+0x2aa/0x710 [ 1083.963865][T22197] ? perf_trace_lock+0xeb/0x4c0 [ 1083.968733][T22197] ? __kasan_check_read+0x11/0x20 [ 1083.973782][T22197] p9_client_prepare_req.part.0+0x3d/0x810 [ 1083.980040][T22197] ? debug_check_no_obj_freed+0x20a/0x43f [ 1083.985789][T22197] p9_client_rpc+0x21c/0x12a0 [ 1083.990491][T22197] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1083.996583][T22197] ? __kasan_check_read+0x11/0x20 [ 1084.001634][T22197] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1084.007809][T22197] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1084.013978][T22197] ? p9_client_walk+0x296/0x890 [ 1084.018848][T22197] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1084.024410][T22197] p9_client_clunk+0x95/0x150 [ 1084.029105][T22197] p9_client_walk+0x29e/0x890 [ 1084.033798][T22197] ? p9_client_clunk+0x150/0x150 [ 1084.038748][T22197] ? v9fs_stat2inode_dotl+0x620/0xe10 [ 1084.044145][T22197] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1084.049537][T22197] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1084.055275][T22197] ? v9fs_vfs_create+0x120/0x120 [ 1084.060228][T22197] ? do_raw_spin_unlock+0x178/0x270 [ 1084.065452][T22197] v9fs_vfs_lookup+0x71/0x90 [ 1084.070052][T22197] __lookup_hash+0x11d/0x190 [ 1084.074659][T22197] filename_create+0x1a7/0x4f0 [ 1084.079443][T22197] ? kern_path_mountpoint+0x40/0x40 [ 1084.084649][T22197] ? strncpy_from_user+0x2b4/0x400 [ 1084.089776][T22197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.096026][T22197] ? getname_flags+0x277/0x5b0 [ 1084.100804][T22197] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1084.107085][T22197] do_mknodat+0x1a4/0x480 [ 1084.111436][T22197] ? do_file_open_root+0x3a0/0x3a0 [ 1084.116563][T22197] ? do_syscall_64+0x26/0x790 [ 1084.121251][T22197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.127322][T22197] ? do_syscall_64+0x26/0x790 [ 1084.132015][T22197] __x64_sys_mknod+0x7b/0xb0 [ 1084.136616][T22197] do_syscall_64+0xfa/0x790 [ 1084.141154][T22197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.147058][T22197] RIP: 0033:0x45a639 [ 1084.150965][T22197] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:07:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x4000000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x300) [ 1084.170583][T22197] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1084.179014][T22197] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1084.187004][T22197] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1084.194995][T22197] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1084.202986][T22197] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1084.202995][T22197] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x500) 20:07:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x10) 20:07:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x8cffffff00000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x4) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa9", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:09 executing program 4 (fault-call:8 fault-nth:18): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x12) 20:07:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x600) 20:07:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xf6ffffff00000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x5) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1087.041888][T23062] FAULT_INJECTION: forcing a failure. [ 1087.041888][T23062] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.106013][T23062] CPU: 1 PID: 23062 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1087.115944][T23062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.126013][T23062] Call Trace: [ 1087.129325][T23062] dump_stack+0x197/0x210 [ 1087.133689][T23062] should_fail.cold+0xa/0x15 [ 1087.138304][T23062] ? fault_create_debugfs_attr+0x180/0x180 [ 1087.144133][T23062] ? ___might_sleep+0x163/0x2c0 [ 1087.149006][T23062] __should_failslab+0x121/0x190 [ 1087.153959][T23062] should_failslab+0x9/0x14 [ 1087.158481][T23062] kmem_cache_alloc+0x2aa/0x710 [ 1087.163342][T23062] ? kmem_cache_alloc+0x364/0x710 [ 1087.168370][T23062] ? perf_trace_lock+0xeb/0x4c0 [ 1087.173227][T23062] p9_fcall_init.isra.0+0x118/0x1d0 [ 1087.178435][T23062] p9_client_prepare_req.part.0+0xa3/0x810 [ 1087.184258][T23062] p9_client_rpc+0x21c/0x12a0 [ 1087.188956][T23062] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1087.195039][T23062] ? __kasan_check_read+0x11/0x20 [ 1087.200086][T23062] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1087.206253][T23062] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1087.212421][T23062] ? p9_client_walk+0x296/0x890 [ 1087.217282][T23062] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1087.222855][T23062] p9_client_clunk+0x95/0x150 [ 1087.227550][T23062] p9_client_walk+0x29e/0x890 [ 1087.232246][T23062] ? p9_client_clunk+0x150/0x150 [ 1087.237188][T23062] ? v9fs_stat2inode_dotl+0x620/0xe10 [ 1087.242578][T23062] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1087.247955][T23062] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1087.253520][T23062] ? v9fs_vfs_create+0x120/0x120 [ 1087.258470][T23062] ? do_raw_spin_unlock+0x178/0x270 [ 1087.263693][T23062] v9fs_vfs_lookup+0x71/0x90 [ 1087.268294][T23062] __lookup_hash+0x11d/0x190 [ 1087.272899][T23062] filename_create+0x1a7/0x4f0 [ 1087.277683][T23062] ? kern_path_mountpoint+0x40/0x40 [ 1087.282899][T23062] ? strncpy_from_user+0x2b4/0x400 [ 1087.288023][T23062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.294270][T23062] ? getname_flags+0x277/0x5b0 [ 1087.299046][T23062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1087.305303][T23062] do_mknodat+0x1a4/0x480 [ 1087.309646][T23062] ? do_file_open_root+0x3a0/0x3a0 [ 1087.314783][T23062] ? do_syscall_64+0x26/0x790 [ 1087.319470][T23062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.325545][T23062] ? do_syscall_64+0x26/0x790 [ 1087.330239][T23062] __x64_sys_mknod+0x7b/0xb0 [ 1087.334842][T23062] do_syscall_64+0xfa/0x790 [ 1087.339361][T23062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.345263][T23062] RIP: 0033:0x45a639 [ 1087.349165][T23062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1087.368778][T23062] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1087.377205][T23062] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1087.385191][T23062] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1087.393322][T23062] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:07:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xff00000000000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x2d) 20:07:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0xfffffffffffff000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:07:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x48) 20:07:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x700) [ 1087.401316][T23062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1087.409564][T23062] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='%use.', 0x0, 0x0) 20:07:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa9", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x7) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:12 executing program 4 (fault-call:8 fault-nth:19): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xa00) 20:07:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4c) 20:07:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='.use.', 0x0, 0x0) 20:07:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x68) 20:07:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x1200) [ 1090.268886][T24294] FAULT_INJECTION: forcing a failure. [ 1090.268886][T24294] name failslab, interval 1, probability 0, space 0, times 0 20:07:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='/use.', 0x0, 0x0) [ 1090.311855][T24294] CPU: 1 PID: 24294 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1090.321785][T24294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.332108][T24294] Call Trace: [ 1090.335414][T24294] dump_stack+0x197/0x210 [ 1090.339772][T24294] should_fail.cold+0xa/0x15 [ 1090.344397][T24294] ? fault_create_debugfs_attr+0x180/0x180 [ 1090.350219][T24294] ? ___might_sleep+0x163/0x2c0 [ 1090.355088][T24294] __should_failslab+0x121/0x190 [ 1090.360053][T24294] should_failslab+0x9/0x14 [ 1090.364572][T24294] kmem_cache_alloc+0x2aa/0x710 [ 1090.369462][T24294] p9_fcall_init.isra.0+0x118/0x1d0 [ 1090.374689][T24294] p9_client_prepare_req.part.0+0x142/0x810 [ 1090.380609][T24294] p9_client_rpc+0x21c/0x12a0 [ 1090.385315][T24294] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1090.391405][T24294] ? __kasan_check_read+0x11/0x20 [ 1090.396457][T24294] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1090.402633][T24294] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1090.408817][T24294] ? p9_client_walk+0x296/0x890 [ 1090.413686][T24294] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1090.419255][T24294] p9_client_clunk+0x95/0x150 [ 1090.423955][T24294] p9_client_walk+0x29e/0x890 [ 1090.428655][T24294] ? p9_client_clunk+0x150/0x150 [ 1090.433614][T24294] ? v9fs_stat2inode_dotl+0x620/0xe10 [ 1090.439008][T24294] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1090.444406][T24294] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1090.449968][T24294] ? v9fs_vfs_create+0x120/0x120 [ 1090.454925][T24294] ? do_raw_spin_unlock+0x178/0x270 20:07:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6c) 20:07:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x2d00) [ 1090.460146][T24294] v9fs_vfs_lookup+0x71/0x90 [ 1090.464841][T24294] __lookup_hash+0x11d/0x190 [ 1090.469476][T24294] filename_create+0x1a7/0x4f0 [ 1090.474262][T24294] ? kern_path_mountpoint+0x40/0x40 [ 1090.479512][T24294] ? strncpy_from_user+0x2b4/0x400 [ 1090.484641][T24294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1090.490877][T24294] ? getname_flags+0x277/0x5b0 [ 1090.495635][T24294] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.495654][T24294] do_mknodat+0x1a4/0x480 [ 1090.495671][T24294] ? do_file_open_root+0x3a0/0x3a0 [ 1090.495689][T24294] ? do_syscall_64+0x26/0x790 [ 1090.495704][T24294] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.495716][T24294] ? do_syscall_64+0x26/0x790 [ 1090.495733][T24294] __x64_sys_mknod+0x7b/0xb0 [ 1090.495750][T24294] do_syscall_64+0xfa/0x790 [ 1090.495770][T24294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.541794][T24294] RIP: 0033:0x45a639 [ 1090.545708][T24294] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.565332][T24294] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1090.573778][T24294] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1090.581761][T24294] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1090.589762][T24294] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1090.597761][T24294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1090.605745][T24294] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:13 executing program 4 (fault-call:8 fault-nth:20): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1090.878548][T24844] FAULT_INJECTION: forcing a failure. [ 1090.878548][T24844] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.891404][T24844] CPU: 0 PID: 24844 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1090.901296][T24844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.911339][T24844] Call Trace: [ 1090.914623][T24844] dump_stack+0x197/0x210 [ 1090.918943][T24844] should_fail.cold+0xa/0x15 [ 1090.923536][T24844] ? fault_create_debugfs_attr+0x180/0x180 [ 1090.929337][T24844] ? ___might_sleep+0x163/0x2c0 [ 1090.934209][T24844] __should_failslab+0x121/0x190 [ 1090.939131][T24844] should_failslab+0x9/0x14 [ 1090.943617][T24844] kmem_cache_alloc+0x2aa/0x710 [ 1090.948459][T24844] p9_fcall_init.isra.0+0x118/0x1d0 [ 1090.953705][T24844] p9_client_prepare_req.part.0+0x142/0x810 [ 1090.959617][T24844] p9_client_rpc+0x21c/0x12a0 [ 1090.964316][T24844] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1090.970387][T24844] ? __kasan_check_read+0x11/0x20 [ 1090.975435][T24844] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1090.981585][T24844] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1090.988000][T24844] ? p9_client_walk+0x296/0x890 [ 1090.992984][T24844] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1090.999058][T24844] p9_client_clunk+0x95/0x150 [ 1091.003735][T24844] p9_client_walk+0x29e/0x890 [ 1091.008401][T24844] ? p9_client_clunk+0x150/0x150 [ 1091.013324][T24844] ? v9fs_stat2inode_dotl+0x620/0xe10 [ 1091.018684][T24844] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1091.024037][T24844] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1091.029565][T24844] ? v9fs_vfs_create+0x120/0x120 [ 1091.034488][T24844] ? do_raw_spin_unlock+0x178/0x270 [ 1091.039683][T24844] v9fs_vfs_lookup+0x71/0x90 [ 1091.044266][T24844] __lookup_hash+0x11d/0x190 [ 1091.048843][T24844] filename_create+0x1a7/0x4f0 [ 1091.053601][T24844] ? kern_path_mountpoint+0x40/0x40 [ 1091.058779][T24844] ? strncpy_from_user+0x2b4/0x400 [ 1091.063877][T24844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.070097][T24844] ? getname_flags+0x277/0x5b0 [ 1091.074844][T24844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.081186][T24844] do_mknodat+0x1a4/0x480 [ 1091.085505][T24844] ? do_file_open_root+0x3a0/0x3a0 [ 1091.090689][T24844] ? do_syscall_64+0x26/0x790 [ 1091.095350][T24844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.101951][T24844] ? do_syscall_64+0x26/0x790 [ 1091.106636][T24844] __x64_sys_mknod+0x7b/0xb0 [ 1091.111226][T24844] do_syscall_64+0xfa/0x790 [ 1091.115750][T24844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.121631][T24844] RIP: 0033:0x45a639 [ 1091.125510][T24844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.145097][T24844] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1091.153500][T24844] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1091.161461][T24844] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1091.169415][T24844] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1091.177373][T24844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1091.185331][T24844] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='\\use.', 0x0, 0x0) 20:07:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x9) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x74) 20:07:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4000) 20:07:15 executing program 4 (fault-call:8 fault-nth:21): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1093.196555][T24854] FAULT_INJECTION: forcing a failure. [ 1093.196555][T24854] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.209197][T24854] CPU: 0 PID: 24854 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1093.219091][T24854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.229324][T24854] Call Trace: [ 1093.232631][T24854] dump_stack+0x197/0x210 [ 1093.237007][T24854] should_fail.cold+0xa/0x15 [ 1093.241626][T24854] ? fault_create_debugfs_attr+0x180/0x180 [ 1093.247453][T24854] __should_failslab+0x121/0x190 [ 1093.252406][T24854] should_failslab+0x9/0x14 [ 1093.256925][T24854] kmem_cache_alloc+0x47/0x710 [ 1093.261704][T24854] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1093.267097][T24854] ? p9_client_prepare_req.part.0+0x142/0x810 [ 1093.273348][T24854] ? p9_client_rpc+0x21c/0x12a0 [ 1093.278213][T24854] ? p9_client_clunk+0x95/0x150 [ 1093.283082][T24854] ? p9_client_walk+0x29e/0x890 [ 1093.287958][T24854] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1093.293517][T24854] ? v9fs_vfs_lookup+0x71/0x90 [ 1093.298317][T24854] ? __lookup_hash+0x11d/0x190 [ 1093.303100][T24854] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1093.309453][T24854] idr_get_free+0x4a6/0x8d0 [ 1093.313989][T24854] idr_alloc_u32+0x19e/0x330 [ 1093.318598][T24854] ? __fprop_inc_percpu_max+0x230/0x230 [ 1093.324165][T24854] ? mark_held_locks+0xf0/0xf0 [ 1093.328942][T24854] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1093.334940][T24854] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1093.340769][T24854] idr_alloc+0xe5/0x150 [ 1093.344939][T24854] ? idr_alloc_u32+0x330/0x330 [ 1093.349728][T24854] p9_client_prepare_req.part.0+0x28e/0x810 [ 1093.355644][T24854] p9_client_rpc+0x21c/0x12a0 [ 1093.360348][T24854] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1093.366435][T24854] ? __kasan_check_read+0x11/0x20 [ 1093.371485][T24854] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1093.377662][T24854] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1093.383832][T24854] ? p9_client_walk+0x296/0x890 [ 1093.388711][T24854] ? rcu_read_lock_sched_held+0x9c/0xd0 20:07:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='f%se.', 0x0, 0x0) [ 1093.394284][T24854] p9_client_clunk+0x95/0x150 [ 1093.398988][T24854] p9_client_walk+0x29e/0x890 [ 1093.403691][T24854] ? p9_client_clunk+0x150/0x150 [ 1093.408647][T24854] ? v9fs_stat2inode_dotl+0x620/0xe10 [ 1093.414054][T24854] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1093.419449][T24854] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1093.425024][T24854] ? v9fs_vfs_create+0x120/0x120 [ 1093.429989][T24854] ? do_raw_spin_unlock+0x178/0x270 [ 1093.435220][T24854] v9fs_vfs_lookup+0x71/0x90 [ 1093.439843][T24854] __lookup_hash+0x11d/0x190 20:07:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='f\\se.', 0x0, 0x0) [ 1093.444560][T24854] filename_create+0x1a7/0x4f0 [ 1093.449350][T24854] ? kern_path_mountpoint+0x40/0x40 [ 1093.454572][T24854] ? strncpy_from_user+0x2b4/0x400 [ 1093.459699][T24854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1093.465956][T24854] ? getname_flags+0x277/0x5b0 [ 1093.470739][T24854] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1093.477004][T24854] do_mknodat+0x1a4/0x480 [ 1093.481359][T24854] ? do_file_open_root+0x3a0/0x3a0 [ 1093.486480][T24854] ? do_syscall_64+0x26/0x790 [ 1093.491191][T24854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.497273][T24854] ? do_syscall_64+0x26/0x790 [ 1093.501976][T24854] __x64_sys_mknod+0x7b/0xb0 [ 1093.506587][T24854] do_syscall_64+0xfa/0x790 [ 1093.511201][T24854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.517290][T24854] RIP: 0033:0x45a639 [ 1093.521200][T24854] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:07:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu#e.', 0x0, 0x0) [ 1093.540933][T24854] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1093.549461][T24854] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1093.557452][T24854] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1093.565434][T24854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1093.573501][T24854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1093.581483][T24854] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7a) 20:07:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4020) 20:07:16 executing program 4 (fault-call:8 fault-nth:22): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1094.020695][T25695] FAULT_INJECTION: forcing a failure. [ 1094.020695][T25695] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.034204][T25695] CPU: 1 PID: 25695 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1094.044089][T25695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.054170][T25695] Call Trace: [ 1094.057472][T25695] dump_stack+0x197/0x210 [ 1094.061794][T25695] should_fail.cold+0xa/0x15 [ 1094.066380][T25695] ? fault_create_debugfs_attr+0x180/0x180 [ 1094.072184][T25695] __should_failslab+0x121/0x190 [ 1094.077120][T25695] should_failslab+0x9/0x14 [ 1094.081621][T25695] kmem_cache_alloc+0x47/0x710 [ 1094.086381][T25695] ? p9_fcall_init.isra.0+0x118/0x1d0 [ 1094.091753][T25695] ? p9_client_prepare_req.part.0+0x142/0x810 [ 1094.097808][T25695] ? p9_client_rpc+0x21c/0x12a0 [ 1094.102649][T25695] ? p9_client_clunk+0x95/0x150 [ 1094.107480][T25695] ? p9_client_walk+0x29e/0x890 [ 1094.112322][T25695] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1094.117868][T25695] ? v9fs_vfs_lookup+0x71/0x90 [ 1094.122611][T25695] ? __lookup_hash+0x11d/0x190 [ 1094.127366][T25695] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1094.133676][T25695] idr_get_free+0x4a6/0x8d0 [ 1094.138172][T25695] idr_alloc_u32+0x19e/0x330 [ 1094.142760][T25695] ? __fprop_inc_percpu_max+0x230/0x230 [ 1094.148294][T25695] ? mark_held_locks+0xf0/0xf0 [ 1094.153042][T25695] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1094.159000][T25695] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1094.164796][T25695] idr_alloc+0xe5/0x150 [ 1094.168934][T25695] ? idr_alloc_u32+0x330/0x330 [ 1094.173685][T25695] p9_client_prepare_req.part.0+0x28e/0x810 [ 1094.179710][T25695] p9_client_rpc+0x21c/0x12a0 [ 1094.184376][T25695] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1094.190436][T25695] ? __kasan_check_read+0x11/0x20 [ 1094.195450][T25695] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1094.201934][T25695] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1094.208100][T25695] ? p9_client_walk+0x296/0x890 [ 1094.212945][T25695] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1094.218474][T25695] p9_client_clunk+0x95/0x150 [ 1094.223135][T25695] p9_client_walk+0x29e/0x890 [ 1094.227795][T25695] ? p9_client_clunk+0x150/0x150 [ 1094.232712][T25695] ? v9fs_stat2inode_dotl+0x620/0xe10 [ 1094.238071][T25695] v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1094.243423][T25695] ? v9fs_vfs_lookup.part.0+0x148/0x3e0 [ 1094.248947][T25695] ? v9fs_vfs_create+0x120/0x120 [ 1094.253877][T25695] ? do_raw_spin_unlock+0x178/0x270 [ 1094.259056][T25695] v9fs_vfs_lookup+0x71/0x90 [ 1094.263640][T25695] __lookup_hash+0x11d/0x190 [ 1094.268212][T25695] filename_create+0x1a7/0x4f0 [ 1094.272959][T25695] ? kern_path_mountpoint+0x40/0x40 [ 1094.278137][T25695] ? strncpy_from_user+0x2b4/0x400 [ 1094.283402][T25695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1094.289619][T25695] ? getname_flags+0x277/0x5b0 [ 1094.294374][T25695] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1094.300599][T25695] do_mknodat+0x1a4/0x480 [ 1094.304929][T25695] ? do_file_open_root+0x3a0/0x3a0 [ 1094.310036][T25695] ? do_syscall_64+0x26/0x790 [ 1094.314698][T25695] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1094.320752][T25695] ? do_syscall_64+0x26/0x790 [ 1094.325413][T25695] __x64_sys_mknod+0x7b/0xb0 [ 1094.329986][T25695] do_syscall_64+0xfa/0x790 [ 1094.334474][T25695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1094.340349][T25695] RIP: 0033:0x45a639 [ 1094.344227][T25695] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1094.363806][T25695] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1094.372200][T25695] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1094.380167][T25695] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1094.388127][T25695] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1094.396094][T25695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1094.404066][T25695] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x57) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4800) 20:07:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu%e.', 0x0, 0x0) 20:07:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xf5) 20:07:18 executing program 4 (fault-call:8 fault-nth:23): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1096.256396][T25704] FAULT_INJECTION: forcing a failure. [ 1096.256396][T25704] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.333306][T25704] CPU: 1 PID: 25704 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1096.343235][T25704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.353297][T25704] Call Trace: [ 1096.356602][T25704] dump_stack+0x197/0x210 [ 1096.360962][T25704] should_fail.cold+0xa/0x15 [ 1096.365586][T25704] ? fault_create_debugfs_attr+0x180/0x180 [ 1096.371421][T25704] ? ___might_sleep+0x163/0x2c0 [ 1096.376305][T25704] __should_failslab+0x121/0x190 [ 1096.381259][T25704] should_failslab+0x9/0x14 [ 1096.385775][T25704] __kmalloc+0x2e0/0x770 [ 1096.390035][T25704] ? mark_held_locks+0xf0/0xf0 [ 1096.394822][T25704] ? stack_trace_save+0xac/0xe0 [ 1096.399689][T25704] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1096.405420][T25704] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1096.410979][T25704] ? tomoyo_path_number_perm+0x193/0x520 [ 1096.416635][T25704] tomoyo_path_number_perm+0x1dd/0x520 [ 1096.422108][T25704] ? tomoyo_path_number_perm+0x193/0x520 [ 1096.427752][T25704] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1096.433565][T25704] ? debug_check_no_obj_freed+0x20a/0x43f [ 1096.439327][T25704] ? putname+0xef/0x130 [ 1096.443499][T25704] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1096.449060][T25704] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1096.455054][T25704] ? trace_hardirqs_on+0x67/0x240 [ 1096.460096][T25704] ? kmem_cache_free+0x26b/0x320 [ 1096.465053][T25704] tomoyo_path_mknod+0x12d/0x1b0 [ 1096.470005][T25704] ? tomoyo_path_chown+0x1c0/0x1c0 [ 1096.475130][T25704] ? kern_path_mountpoint+0x40/0x40 [ 1096.480352][T25704] ? strncpy_from_user+0x2b4/0x400 [ 1096.485480][T25704] security_path_mknod+0x119/0x180 [ 1096.490608][T25704] do_mknodat+0x255/0x480 [ 1096.494952][T25704] ? do_file_open_root+0x3a0/0x3a0 [ 1096.500082][T25704] ? do_syscall_64+0x26/0x790 [ 1096.504767][T25704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.510846][T25704] ? do_syscall_64+0x26/0x790 [ 1096.515541][T25704] __x64_sys_mknod+0x7b/0xb0 [ 1096.520175][T25704] do_syscall_64+0xfa/0x790 [ 1096.524698][T25704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.530599][T25704] RIP: 0033:0x45a639 [ 1096.534501][T25704] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1096.554110][T25704] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1096.562555][T25704] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1096.570537][T25704] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 20:07:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu*e.', 0x0, 0x0) 20:07:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4c00) 20:07:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6800) 20:07:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x300) [ 1096.578519][T25704] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1096.586500][T25704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1096.594482][T25704] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu+e.', 0x0, 0x0) [ 1096.663094][T25704] ERROR: Out of memory at tomoyo_realpath_from_path. 20:07:19 executing program 4 (fault-call:8 fault-nth:24): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1097.035779][T26484] FAULT_INJECTION: forcing a failure. [ 1097.035779][T26484] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.050075][T26484] CPU: 0 PID: 26484 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1097.059995][T26484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.070055][T26484] Call Trace: [ 1097.073352][T26484] dump_stack+0x197/0x210 [ 1097.077703][T26484] should_fail.cold+0xa/0x15 [ 1097.082320][T26484] ? fault_create_debugfs_attr+0x180/0x180 [ 1097.088129][T26484] ? ___might_sleep+0x163/0x2c0 [ 1097.093099][T26484] __should_failslab+0x121/0x190 [ 1097.098287][T26484] should_failslab+0x9/0x14 [ 1097.102798][T26484] __kmalloc+0x2e0/0x770 [ 1097.107035][T26484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1097.113277][T26484] ? d_absolute_path+0x11b/0x170 [ 1097.118205][T26484] ? __d_path+0x140/0x140 [ 1097.122531][T26484] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1097.127898][T26484] tomoyo_encode2.part.0+0xf5/0x400 [ 1097.133094][T26484] tomoyo_encode+0x2b/0x50 [ 1097.137501][T26484] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1097.143157][T26484] tomoyo_path_number_perm+0x1dd/0x520 [ 1097.148624][T26484] ? tomoyo_path_number_perm+0x193/0x520 [ 1097.154267][T26484] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1097.160172][T26484] ? debug_check_no_obj_freed+0x20a/0x43f [ 1097.165968][T26484] ? putname+0xef/0x130 [ 1097.170122][T26484] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1097.175744][T26484] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1097.181802][T26484] ? trace_hardirqs_on+0x67/0x240 [ 1097.186821][T26484] ? kmem_cache_free+0x26b/0x320 [ 1097.191742][T26484] tomoyo_path_mknod+0x12d/0x1b0 [ 1097.196753][T26484] ? tomoyo_path_chown+0x1c0/0x1c0 [ 1097.201865][T26484] ? kern_path_mountpoint+0x40/0x40 [ 1097.207115][T26484] ? strncpy_from_user+0x2b4/0x400 [ 1097.212232][T26484] security_path_mknod+0x119/0x180 [ 1097.217360][T26484] do_mknodat+0x255/0x480 [ 1097.221682][T26484] ? do_file_open_root+0x3a0/0x3a0 [ 1097.226778][T26484] ? do_syscall_64+0x26/0x790 [ 1097.231440][T26484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.237927][T26484] ? do_syscall_64+0x26/0x790 [ 1097.242607][T26484] __x64_sys_mknod+0x7b/0xb0 [ 1097.247381][T26484] do_syscall_64+0xfa/0x790 [ 1097.251868][T26484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.257758][T26484] RIP: 0033:0x45a639 [ 1097.261643][T26484] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1097.281439][T26484] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1097.289841][T26484] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1097.297803][T26484] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1097.305769][T26484] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1097.313744][T26484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1097.321737][T26484] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 [ 1097.342088][T26484] ERROR: Out of memory at tomoyo_realpath_from_path. 20:07:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x500) 20:07:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6c00) 20:07:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xf0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu-e.', 0x0, 0x0) 20:07:21 executing program 4 (fault-call:8 fault-nth:25): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1099.436851][T26560] FAULT_INJECTION: forcing a failure. [ 1099.436851][T26560] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.477783][T26560] CPU: 0 PID: 26560 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1099.487892][T26560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.497963][T26560] Call Trace: [ 1099.501281][T26560] dump_stack+0x197/0x210 [ 1099.505648][T26560] should_fail.cold+0xa/0x15 [ 1099.510280][T26560] ? fault_create_debugfs_attr+0x180/0x180 [ 1099.516115][T26560] ? ___might_sleep+0x163/0x2c0 [ 1099.520984][T26560] __should_failslab+0x121/0x190 [ 1099.525938][T26560] should_failslab+0x9/0x14 [ 1099.530459][T26560] __kmalloc+0x2e0/0x770 [ 1099.534714][T26560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1099.540969][T26560] ? d_absolute_path+0x11b/0x170 [ 1099.545922][T26560] ? __d_path+0x140/0x140 [ 1099.550274][T26560] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1099.555665][T26560] tomoyo_encode2.part.0+0xf5/0x400 [ 1099.560882][T26560] tomoyo_encode+0x2b/0x50 [ 1099.565313][T26560] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1099.570962][T26560] tomoyo_path_number_perm+0x1dd/0x520 [ 1099.576438][T26560] ? tomoyo_path_number_perm+0x193/0x520 [ 1099.582087][T26560] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1099.587903][T26560] ? debug_check_no_obj_freed+0x20a/0x43f [ 1099.587964][T26560] ? putname+0xef/0x130 [ 1099.597895][T26560] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1099.603461][T26560] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1099.609447][T26560] ? trace_hardirqs_on+0x67/0x240 [ 1099.614493][T26560] ? kmem_cache_free+0x26b/0x320 [ 1099.619454][T26560] tomoyo_path_mknod+0x12d/0x1b0 20:07:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7400) 20:07:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x600) [ 1099.624410][T26560] ? tomoyo_path_chown+0x1c0/0x1c0 [ 1099.629538][T26560] ? kern_path_mountpoint+0x40/0x40 [ 1099.634746][T26560] ? strncpy_from_user+0x2b4/0x400 [ 1099.639878][T26560] security_path_mknod+0x119/0x180 [ 1099.645009][T26560] do_mknodat+0x255/0x480 [ 1099.649358][T26560] ? do_file_open_root+0x3a0/0x3a0 [ 1099.654486][T26560] ? do_syscall_64+0x26/0x790 [ 1099.659180][T26560] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.665269][T26560] ? do_syscall_64+0x26/0x790 [ 1099.669971][T26560] __x64_sys_mknod+0x7b/0xb0 [ 1099.674584][T26560] do_syscall_64+0xfa/0x790 [ 1099.679117][T26560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.685017][T26560] RIP: 0033:0x45a639 [ 1099.688907][T26560] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1099.708515][T26560] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1099.716960][T26560] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 20:07:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu.e.', 0x0, 0x0) [ 1099.724950][T26560] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1099.732938][T26560] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1099.740932][T26560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1099.748919][T26560] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x700) [ 1099.788690][T26560] ERROR: Out of memory at tomoyo_realpath_from_path. 20:07:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7a00) 20:07:22 executing program 4 (fault-call:8 fault-nth:26): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1100.210717][T27400] FAULT_INJECTION: forcing a failure. [ 1100.210717][T27400] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.230554][T27400] CPU: 0 PID: 27400 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1100.240484][T27400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.250547][T27400] Call Trace: [ 1100.253855][T27400] dump_stack+0x197/0x210 [ 1100.258188][T27400] should_fail.cold+0xa/0x15 [ 1100.262802][T27400] ? fault_create_debugfs_attr+0x180/0x180 [ 1100.268589][T27400] ? ___might_sleep+0x163/0x2c0 [ 1100.273438][T27400] __should_failslab+0x121/0x190 [ 1100.278371][T27400] should_failslab+0x9/0x14 [ 1100.282854][T27400] kmem_cache_alloc+0x2aa/0x710 [ 1100.287685][T27400] ? mark_lock+0xc2/0x1220 [ 1100.292086][T27400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.298327][T27400] ? debug_smp_processor_id+0x33/0x18a [ 1100.303786][T27400] p9_client_prepare_req.part.0+0x3d/0x810 [ 1100.309589][T27400] ? __lockdep_free_key_range+0x120/0x120 [ 1100.315333][T27400] p9_client_rpc+0x21c/0x12a0 [ 1100.320004][T27400] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1100.326061][T27400] ? lock_downgrade+0x920/0x920 [ 1100.330898][T27400] ? rcu_read_lock_held+0x9c/0xb0 [ 1100.335906][T27400] ? __kasan_check_read+0x11/0x20 [ 1100.340912][T27400] ? get_cached_acl+0x305/0x390 [ 1100.345745][T27400] ? current_umask+0xa/0x70 [ 1100.350232][T27400] p9_client_mknod_dotl+0xa4/0x460 [ 1100.355326][T27400] v9fs_vfs_mknod_dotl+0x245/0x5a0 [ 1100.360414][T27400] ? map_id_up+0x19c/0x320 [ 1100.364810][T27400] ? v9fs_vfs_symlink_dotl+0x4a0/0x4a0 [ 1100.370248][T27400] ? common_perm_create.constprop.0+0x18c/0x290 [ 1100.376474][T27400] ? kmem_cache_free+0x26b/0x320 [ 1100.381392][T27400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.387698][T27400] ? security_inode_permission+0xcb/0x100 [ 1100.393421][T27400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.399933][T27400] ? security_inode_mknod+0xea/0x120 [ 1100.405202][T27400] vfs_mknod+0x42a/0x720 [ 1100.409435][T27400] do_mknodat+0x374/0x480 [ 1100.413746][T27400] ? do_file_open_root+0x3a0/0x3a0 [ 1100.418838][T27400] ? do_syscall_64+0x26/0x790 [ 1100.423498][T27400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.429540][T27400] ? do_syscall_64+0x26/0x790 [ 1100.434220][T27400] __x64_sys_mknod+0x7b/0xb0 [ 1100.438791][T27400] do_syscall_64+0xfa/0x790 [ 1100.443281][T27400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.449148][T27400] RIP: 0033:0x45a639 [ 1100.453024][T27400] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1100.472606][T27400] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1100.480998][T27400] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1100.488948][T27400] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1100.497382][T27400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1100.505337][T27400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1100.513298][T27400] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x500) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xa00) 20:07:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu0e.', 0x0, 0x0) 20:07:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xf5ff) 20:07:24 executing program 4 (fault-call:8 fault-nth:27): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1102.453198][T27408] FAULT_INJECTION: forcing a failure. [ 1102.453198][T27408] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.522379][T27408] CPU: 1 PID: 27408 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1102.532317][T27408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.542382][T27408] Call Trace: [ 1102.545692][T27408] dump_stack+0x197/0x210 [ 1102.550046][T27408] should_fail.cold+0xa/0x15 [ 1102.554660][T27408] ? fault_create_debugfs_attr+0x180/0x180 [ 1102.560484][T27408] ? ___might_sleep+0x163/0x2c0 [ 1102.565353][T27408] __should_failslab+0x121/0x190 [ 1102.570310][T27408] should_failslab+0x9/0x14 [ 1102.574827][T27408] kmem_cache_alloc+0x2aa/0x710 [ 1102.579709][T27408] ? kmem_cache_alloc+0x364/0x710 [ 1102.584749][T27408] ? mark_lock+0xc2/0x1220 [ 1102.589185][T27408] p9_fcall_init.isra.0+0x118/0x1d0 [ 1102.594390][T27408] p9_client_prepare_req.part.0+0xa3/0x810 [ 1102.600225][T27408] p9_client_rpc+0x21c/0x12a0 [ 1102.604922][T27408] ? p9_client_prepare_req.part.0+0x810/0x810 [ 1102.611010][T27408] ? lock_downgrade+0x920/0x920 [ 1102.616227][T27408] ? rcu_read_lock_held+0x9c/0xb0 [ 1102.621261][T27408] ? __kasan_check_read+0x11/0x20 [ 1102.626308][T27408] ? get_cached_acl+0x305/0x390 [ 1102.631174][T27408] ? current_umask+0xa/0x70 [ 1102.635704][T27408] p9_client_mknod_dotl+0xa4/0x460 [ 1102.640841][T27408] v9fs_vfs_mknod_dotl+0x245/0x5a0 [ 1102.645965][T27408] ? map_id_up+0x19c/0x320 [ 1102.650401][T27408] ? v9fs_vfs_symlink_dotl+0x4a0/0x4a0 [ 1102.655873][T27408] ? common_perm_create.constprop.0+0x18c/0x290 [ 1102.662117][T27408] ? kmem_cache_free+0x26b/0x320 20:07:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuXe.', 0x0, 0x0) [ 1102.667109][T27408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.673356][T27408] ? security_inode_permission+0xcb/0x100 [ 1102.679088][T27408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.685342][T27408] ? security_inode_mknod+0xea/0x120 [ 1102.690646][T27408] vfs_mknod+0x42a/0x720 [ 1102.694908][T27408] do_mknodat+0x374/0x480 [ 1102.699258][T27408] ? do_file_open_root+0x3a0/0x3a0 [ 1102.704383][T27408] ? do_syscall_64+0x26/0x790 [ 1102.709073][T27408] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.715146][T27408] ? do_syscall_64+0x26/0x790 20:07:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fu\\e.', 0x0, 0x0) [ 1102.719845][T27408] __x64_sys_mknod+0x7b/0xb0 [ 1102.724451][T27408] do_syscall_64+0xfa/0x790 [ 1102.728973][T27408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.734866][T27408] RIP: 0033:0x45a639 [ 1102.738765][T27408] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1102.758375][T27408] RSP: 002b:00007f7f6e7b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 20:07:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x1200) [ 1102.766795][T27408] RAX: ffffffffffffffda RBX: 00007f7f6e7b2c90 RCX: 000000000045a639 [ 1102.774783][T27408] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1102.782777][T27408] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1102.790764][T27408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7b36d4 [ 1102.798749][T27408] R13: 00000000004c7033 R14: 00000000004dc780 R15: 0000000000000006 20:07:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xfff5) 20:07:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x582) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:25 executing program 4 (fault-call:8 fault-nth:28): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x2d00) 20:07:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuce.', 0x0, 0x0) 20:07:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x100000) 20:07:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4000) 20:07:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x5aa) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fude.', 0x0, 0x0) 20:07:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x1000000) 20:07:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuie.', 0x0, 0x0) 20:07:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4020) 20:07:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x2000, 0x0) 20:07:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x2000000) 20:07:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x700) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x4000, 0x0) 20:07:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x3000000) 20:07:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4800) 20:07:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fule.', 0x0, 0x0) 20:07:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x900) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4000000) 20:07:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4c00) 20:07:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuoe.', 0x0, 0x0) 20:07:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x5000000) 20:07:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x6000, 0x0) 20:07:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x2000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6000000) 20:07:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffff2000, 0x0) 20:07:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6800) 20:07:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fupe.', 0x0, 0x0) 20:07:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7000000) 20:07:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x3f00) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6c00) 20:07:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuue.', 0x0, 0x0) 20:07:34 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffff8000, 0x0) 20:07:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x8000000) 20:07:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x4000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:34 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffa000, 0x0) 20:07:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7400) 20:07:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xa000000) 20:07:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuxe.', 0x0, 0x0) 20:07:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7a00) 20:07:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x12000000) 20:07:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x5700) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:37 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc002, 0x0) 20:07:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fus%.', 0x0, 0x0) 20:07:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xf5ff) 20:07:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x20400000) 20:07:37 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc003, 0x0) 20:07:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x2d000000) 20:07:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xfff5) 20:07:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fus\\.', 0x0, 0x0) 20:07:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x8205) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x100000) 20:07:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x40000000) 20:07:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse/', 0x0, 0x0) 20:07:40 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc004, 0x0) 20:07:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x1000000) 20:07:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xaa05) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x48000000) 20:07:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x2000000) 20:07:41 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc005, 0x0) 20:07:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse<', 0x0, 0x0) 20:07:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x3000000) 20:07:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4c000000) 20:07:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xf000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\\', 0x0, 0x0) 20:07:41 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc006, 0x0) 20:07:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4000000) 20:07:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x68000000) 20:07:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x5000000) 20:07:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2, 0x0) 20:07:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6c000000) 20:07:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x40000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc007, 0x0) 20:07:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6000000) 20:07:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3, 0x0) 20:07:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x74000000) 20:07:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7000000) 20:07:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xf0ffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4, 0x0) 20:07:44 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc008, 0x0) 20:07:44 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffff00, 0x0) 20:07:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x5, 0x0) 20:07:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x8000000) 20:07:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7a000000) 20:07:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x1000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xf5ffffff) 20:07:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xa000000) 20:07:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6, 0x0) 20:07:47 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = inotify_init() io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[r3, r5, 0xffffffffffffffff]}, 0x3) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 20:07:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xfeffffff) 20:07:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x4000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:47 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {0x0, 0x2}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x12000000) 20:07:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xfffffff5) 20:07:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7, 0x0) 20:07:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8, 0x0) 20:07:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x5000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xfffffffe) 20:07:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x20400000) 20:07:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_ON(r5, 0x7001) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10, 0x0) 20:07:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x7000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="74729d92607fa0646e592a94787420358060819af7097831843e4c5af915f45ace5b899df3dc7532a3c3ae8b6817158fdec43214d9db88195cd1bd5494066c9f17050000000000e3feda83d39a13d525e43a764bad860f937db3960c5492f38addb6970b04fe8af2b484c609d0c7ce136de7a3e38171a5c8427824ad14ecc97d95cb267844ec5fecc8c0a409e813", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x2d000000) 20:07:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x402000000000) 20:07:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf0, 0x0) 20:07:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x40000000) 20:07:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x9000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x10000000000000) 20:07:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x300, 0x0) 20:07:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec915614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r3, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r5}]}, 0x44}}, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='overlay\x00', 0x4, &(0x7f0000000180)={[{@xino_on='xino=on'}], [{@uid_eq={'uid', 0x3d, r5}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@obj_type={'obj_type', 0x3d, ',!!*keyring&.vmnet1{{loGPL#[cgroup'}}]}) 20:07:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x100000000000000) 20:07:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x500, 0x0) 20:07:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x48000000) 20:07:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:52 executing program 4: ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000340)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r3, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r5}]}, 0x44}}, 0x0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x905e, 0x3, &(0x7f00000007c0)=[{&(0x7f00000004c0)="5e9945a4a1e5eb484e63a24c776db1df56bab76adb49248605002bfbf0c890eaba03509448de67592d25e5eaf9ddf4425180aae2202ffa01341f8a7790d5780db5fe02e72c65698df69b971f", 0x4c, 0x3}, {&(0x7f0000000540)="109ce95d0337dfb34563ff81b9a2a30a5a107b2575a4af7c84e5ab805bd73b86803c961433e46525b154f3fc0ee8eb943ad6eaffb6c07f0fd102b5afa2ae488bbffa4498b0f4211b215e3ed7a1709fe23f8601", 0x53, 0x9}, {&(0x7f00000006c0)="6a3569b6f18fcfbe214aab757de4457a4a18fe9d89602b6cbc427da7702b540a963342c16656454901d4572cad7cf99f6313db3801290239becb7a65b52f41a99da02589713440f03a9bfe02e0437886e24b69a10f43040a2962e5ba627c305789aecbfd8c47107bd5bb49fb4d144c1bd5f4074dfe853127b4378d0e7b7d0e6d990ca800765f4e2999fcb5c8ad835c003bacea0c572e04d3be669c90209887db3a4ea35f13c16ffb9c55b0414e4c77043aabf0212814faf98f057556094c371f4b82b27844a13c8965522f20458fb52bf487c332e88b5a718f", 0xd9, 0x8}], 0x0, &(0x7f0000000840)={[{@quota_account='quota=account'}, {@noquota='noquota'}], [{@euid_eq={'euid', 0x3d, r5}}, {@smackfsfloor={'smackfsfloor'}}, {@obj_type={'obj_type', 0x3d, 'losystemselinux'}}]}) r6 = fcntl$dupfd(r1, 0x0, r2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000080)={0x8000, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_PARM(r6, 0xc0cc5616, &(0x7f0000000140)={0xa, @capture={0x800, 0x1, {0x7fff, 0x6680161b}, 0x40, 0x3}}) r10 = dup(r0) write$FUSE_BMAP(r10, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r10, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r10, &(0x7f00000000c0)={0x14c}, 0x137) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x20000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x200000000000000) 20:07:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4c000000) [ 1129.711006][ T4204] cgroup: fork rejected by pids controller in /syz2 20:07:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x600, 0x0) 20:07:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x68000000) 20:07:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x300000000000000) 20:07:52 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$apparmor_exec(r2, &(0x7f0000000080)={'stack ', '9p\x00'}, 0x9) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x3f000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x700, 0x0) 20:07:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6c000000) 20:07:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x400000000000000) 20:07:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cdbda775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FLAG(r5, 0x0, &(0x7f0000000080)='sync\x00', 0x0, 0x0) 20:07:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1020, 0x0) 20:07:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x74000000) 20:07:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x500000000000000) 20:07:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x40000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2000, 0x0) 20:07:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7a000000) 20:07:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x600000000000000) 20:07:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1580000008003950157c9f83217f13e515640cf8bc693f5ec9154a614f040000000000000001c63ee98844eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfffad9d8b02e3e50fb3ec77c89bb4157cedead64744617581"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x12ac880, &(0x7f00000005c0)=ANY=[]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xf5ffffff) 20:07:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2010, 0x0) 20:07:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x700000000000000) 20:07:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x57000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xfeffffff) 20:07:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3f00, 0x0) 20:07:54 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)=ANY=[@ANYBLOB='\\`\"', @ANYRES16=r2, @ANYBLOB="05000000000000000000010000000000000009410000004c00180000000062726f6164636173742d6c696e6b00"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x27de}}, [""]}, 0x24}}, 0x4040140) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r5 = dup(r4) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r5, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rgdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) mknod$loop(&(0x7f0000000340)='./file0/file0\x00', 0x200, 0x0) 20:07:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x800000000000000) 20:07:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1132.171297][ T6133] 9pnet: Insufficient options for proto=fd 20:07:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xfffffff5) [ 1132.245124][ T6285] 9pnet: Insufficient options for proto=fd 20:07:54 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRES16, @ANYRESHEX=r2]) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/76) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) recvmsg$can_raw(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)=""/245, 0xf5}, {&(0x7f00000006c0)=""/251, 0xfb}, {&(0x7f0000000340)=""/149, 0x95}, {&(0x7f0000000080)}], 0x4, &(0x7f00000007c0)=""/147, 0x93}, 0x2021) fcntl$dupfd(r3, 0x0, r4) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4000, 0x0) 20:07:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xa00000000000000) 20:07:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x82050000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xfffffffe) [ 1132.559617][ T6536] 9pnet: Insufficient options for proto=fd 20:07:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1132.638573][ T6536] 9pnet: Insufficient options for proto=fd 20:07:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xedc0, 0x0) 20:07:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x1200000000000000) 20:07:55 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r7, 0x0, r8) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket(0x10, 0x80002, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket(0x10, 0x80002, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r17, 0x0, r18) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) r20 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r19, 0x0, r20) r21 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r22 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r22, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r21, 0x2405, r22) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYPTR64=&(0x7f00000001c0)=ANY=[], @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX=r3, @ANYPTR64, @ANYRESOCT=r1, @ANYRESDEC=r0, @ANYPTR, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESHEX=r5, @ANYPTR64, @ANYRES64=r16, @ANYRESDEC=r1, @ANYRES16], @ANYRESHEX=r22], @ANYRESOCT=r6, @ANYPTR], @ANYBLOB="9136c9ef777ec1e8a7cea9ba49a55c55424afe0122242df05575d648ed26acbbb4780500", @ANYRESOCT=r7, @ANYPTR64, @ANYBLOB="2eddc9ce21ff703a14031d34ce7ed7d8a7da8dfae138db8ab90f8db5", @ANYRESDEC=r14, @ANYRES32=r2, @ANYRESDEC=r17, @ANYRES32=r20, @ANYPTR], @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x402000000000) 20:07:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf000, 0x0) [ 1133.013839][ T6882] 9pnet: Insufficient options for proto=fd 20:07:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x2d00000000000000) [ 1133.076991][ T7057] 9pnet: Insufficient options for proto=fd 20:07:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x8dffffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xff00, 0x0) 20:07:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x10000000000000) 20:07:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4000000000000000) 20:07:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4800000000000000) 20:07:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x100000000000000) 20:07:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf0ffff, 0x0) 20:07:56 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r3) geteuid() r4 = fanotify_init(0x11, 0x800) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r6 = geteuid() r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r7, 0x0, r8) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x2000, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r10, 0x0, r11) r12 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r13, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r12, 0x2405, r13) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r14, 0x0, r15) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r17, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r16, 0x2405, r17) r18 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r19 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r19, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r18, 0x2405, r19) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) r21 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r20, 0x0, r21) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r22, 0x40086602, 0x400007) r23 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x5}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r23, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r22, 0x0, 0xe, &(0x7f0000000140)='memory.events\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001480)=':[\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000002c0)='9p\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) r28 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r28, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) r31 = socket(0x10, 0x80002, 0x0) r32 = fcntl$dupfd(r30, 0x0, r31) ioctl$PERF_EVENT_IOC_ENABLE(r32, 0x8912, 0x400200) r33 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r34 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r34, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r33, 0x2405, r34) r35 = socket$inet6_tcp(0xa, 0x1, 0x0) r36 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r35, 0x0, r36) r37 = socket$inet6_tcp(0xa, 0x1, 0x0) r38 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r37, 0x0, r38) r39 = socket$inet6_tcp(0xa, 0x1, 0x0) r40 = socket(0x10, 0x80002, 0x0) r41 = fcntl$dupfd(r39, 0x0, r40) ioctl$PERF_EVENT_IOC_ENABLE(r41, 0x8912, 0x400200) r42 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r43 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r43, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r42, 0x2405, r43) r44 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x2, 0x0) r45 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r46 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r46, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r45, 0x2405, r46) r47 = getpgid(0x0) r48 = socket(0x10, 0x2, 0x0) r49 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r48, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=ANY=[@ANYBLOB="440000001800030900000000000000001d010000180004000000000000000000ef536879610900000000000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=0x0, @ANYBLOB="08000e00", @ANYRES32=r50], 0x44}}, 0x0) r51 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r52 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r52, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r51, 0x2405, r52) fstat(r51, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r54 = socket$inet6_tcp(0xa, 0x1, 0x0) r55 = socket(0x10, 0x80002, 0x0) r56 = fcntl$dupfd(r54, 0x0, r55) ioctl$PERF_EVENT_IOC_ENABLE(r56, 0x8912, 0x400200) r57 = socket$inet6_tcp(0xa, 0x1, 0x0) r58 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r57, 0x0, r58) r59 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r60 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002040), 0x3}, 0x110}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r60, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r59, 0x2405, r60) r61 = socket$inet6_tcp(0xa, 0x1, 0x0) r62 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r61, 0x0, r62) r63 = socket(0x10, 0x2, 0x0) r64 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r64, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r63, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r65}]}, 0x44}}, 0x0) r66 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r66, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r67, 0x0) r68 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r68, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r69, 0x0) getgroups(0x3, &(0x7f0000002080)=[r67, r69, 0xffffffffffffffff]) r71 = socket$inet6_tcp(0xa, 0x1, 0x0) r72 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r71, 0x0, r72) r73 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000002280)={0x4, &(0x7f0000002240)=[{0xfff9, 0x2, 0x81, 0xfffffffa}, {0x7fff, 0x0, 0x4, 0x4}, {0x731, 0x7f, 0x1, 0x9}, {0x779, 0x6, 0x40, 0x101}]}) r74 = socket$inet6_tcp(0xa, 0x1, 0x0) r75 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r74, 0x0, r75) r76 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000024c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000002440)=""/124, 0x17d, 0x7c, 0x1}, 0x20) r77 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002500)='/dev/dlm_plock\x00', 0xac80, 0x0) sendmsg$netlink(r3, &(0x7f0000002000)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfc, 0x1a08010}, 0xc, &(0x7f0000000180), 0x0, &(0x7f0000002540)=[@rights={{0x20, 0x1, 0x1, [r0, r4, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6}}}, @rights={{0x18, 0x1, 0x1, [r8, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r9, r11, r12, r15, r60, r19, r21, r0]}}, @cred={{0x1c, 0x1, 0x2, {r26, r27, r29}}}, @cred={{0x1c, 0x1, 0x2, {r25, r65, r70}}}, @rights={{0x38, 0x1, 0x1, [r0, r33, r36, 0xffffffffffffffff, r38, r1, 0xffffffffffffffff, r41, r42, r44]}}, @rights={{0x28, 0x1, 0x1, [r72, r40, r73, r75, r76, r77]}}, @cred={{0x1c, 0x1, 0x2, {r47, r50, r53}}}, @rights={{0x30, 0x1, 0x1, [r56, 0xffffffffffffffff, r0, r57, r1, r60, r62, r1]}}], 0x178, 0x20000100}, 0x4000888) r78 = dup(r1) write$FUSE_BMAP(r78, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r78, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r78, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r78]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xaa050000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x4c00000000000000) 20:07:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1000000, 0x0) 20:07:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:56 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYRES64], 0x8) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x4}}, 0x30) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r9 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r9, r8) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r11, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f00000000c0)={r11, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={r11, 0x5, 0x1ff, 0xec3}, 0x10) fcntl$dupfd(r6, 0x0, r7) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000080)=0x80, 0x4) ioctl$sock_bt_hci(r5, 0x800448d7, &(0x7f0000000280)="9dcf099d79890d39c31747b7800a1ddd7d4e636f90a7f125cd1f58a45cc0c29d44f00cf2f043ba5e1a89c499fe38d85ce794655cefbe4fc81ce555caa59c74c99c16bf66acdc0f3f9f85f48b72a803116d825d1ea1f1070f4b6fa26d5e936f7e3a9aab6fa64621c5") mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="b27766646e6f3dcb850d9377b77b2913377547fdc04a2b272a053a71c2330d514c107f7515b31cdb9807348e219cef364cd078732f654e7a1401a213ec2a4b77b1362a", @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) 20:07:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x200000000000000) 20:07:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6800000000000000) 20:07:57 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="152228b4080400000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d91"], 0x15) r2 = dup(r1) flock(r0, 0x5) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18, 0x0, 0x3, {0x2}}, 0x15) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000080)={0x1}) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e23, 0x9, @local}, 0x1c) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}}}}, 0xa0) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000140)=0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket(0x10, 0x80002, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(r11, 0x8008563f, &(0x7f0000000340)=0x0) ioctl$VIDIOC_S_STD(r8, 0x40085618, &(0x7f0000000380)=r12) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[]) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r13, 0x0, r14) r15 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r16 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r16, r15) r17 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r17, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="d97ea9ee784762556160e7b7d13c01179d6d46514a97d9cffe5e01c76ffa2224332e9559", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r18, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r16, 0x84, 0x6f, &(0x7f00000000c0)={r18, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r14, 0x84, 0x7b, &(0x7f0000000200)={r18}, &(0x7f0000000280)=0x8) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x300000000000000) 20:07:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2000000, 0x0) 20:07:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xeffdffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x6c00000000000000) 20:07:57 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYPTR], 0xfffffffffffffce3) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) move_mount(r2, &(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x10) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:07:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x400000000000000) 20:07:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3000000, 0x0) 20:07:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 20:07:57 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15642cf8bc693f5ec9154a614f0700000000000000016598578744eceed1a85ca910af816429f33c047f88127d19a042b3e8f99ffba7009e9ef678f666f1f7f4270ba9867067b74515bab0db5fc04e810303210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff2fca6227d85318052b02654b184a11f3800392b6cc9b0eeac473934a6eceb4fab7938c8d63e3b61fa495b0bdd2a4a56b21f9b166be54afac9db12ec6cc9dcc9852d0ec41fa50133564e65d8cfdb7018ce67ec629fed16f401cbaeed10203c3de0e7314031c6e3252c12a015e7e04e9f8865efc187f8f6d92eceafc452f85376a370000000000"], 0x91) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x200) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0x9c, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x1}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) socket$rxrpc(0x21, 0x2, 0x2) 20:07:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7400000000000000) 20:07:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xf5ffffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4000000, 0x0) 20:07:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 20:07:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x500000000000000) 20:07:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x7a00000000000000) 20:07:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 20:07:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xf5ffffffffffffff) 20:07:58 executing program 4: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = gettid() tkill(r3, 0x1000000000013) capset(&(0x7f0000000080)={0x19980330, r3}, &(0x7f0000000140)={0x80000001, 0x1f, 0x8001, 0x1, 0x5, 0x3}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000040)) 20:07:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x600000000000000) 20:07:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 20:07:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x5000000, 0x0) 20:07:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfcffffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:07:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x700000000000000) 20:07:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 20:07:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xfeffffff00000000) 20:07:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x800000000000000) 20:07:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6000000, 0x0) 20:07:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 20:07:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0xfffffffffffffff5) 20:08:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xffff0000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 20:08:01 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x4}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xa00000000000000) 20:08:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7000000, 0x0) 20:08:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x74, r8, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xfc}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1b}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2ba40000, 0xfff, 0x1, 0x9, 0x4]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x7]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20088810}, 0x4000004) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80008408}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r6, 0x800, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001001) lseek(r0, 0x20400000, 0x0) 20:08:01 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73aaefcb284007829ed3a011000000009b00890014aae3da0f48d9961e0eeaae2c08f5f9fff2ff2b9ae9d4cf0010649e39bb4d0068a453a83d0dad6a8b288a62dca69ab04ccd24eb1dec7153c70a0cced744cf69"], 0x54) close(r2) socket$netlink(0x10, 0x3, 0x14) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 20:08:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$FUSE_INIT(r9, &(0x7f00000000c0)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x46, 0x108102, 0x8, 0xbe, 0x4, 0x4}}, 0x50) ioctl$KVM_GET_CPUID2(r6, 0xc008ae91, &(0x7f0000000000)={0x1, 0x0, [{}]}) lseek(r0, 0x20400000, 0x0) 20:08:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x1200000000000000) 20:08:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8000000, 0x0) 20:08:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x20000, &(0x7f00000005c0)=ANY=[]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vga_arbiter\x00', 0x1058c0, 0x0) ioctl$sock_x25_SIOCADDRT(r6, 0x890b, &(0x7f0000000980)={@remote={[], 0x3}, 0x6, 'veth1_to_hsr\x00'}) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r8, 0x0, r9) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f00000006c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='9p\x00', 0x10000, &(0x7f0000000d00)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r10}}, {@privport='privport'}, {@access_uid={'access', 0x3d, r11}}, {@access_client='access=client'}, {@dfltgid={'dfltgid'}}, {@aname={'aname', 0x3d, 'mime_type,'}}], [{@measure='measure'}, {@uid_gt={'uid>', r11}}, {@uid_lt={'uid<'}}, {@obj_role={'obj_role', 0x3d, 'nodevsecurity{!/-)system'}}, {@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@obj_role={'obj_role', 0x3d, '/dev/cuse\x00'}}]}}) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket(0x10, 0x80002, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r14, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x6, 0x100, 0x20}}, 0x30) 20:08:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd", 0x4f}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe19, 0x0, 0xfffffffffffffdf2, 0x0, 0xfffffffffffffd4f}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:08:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfffff000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x2d00000000000000) 20:08:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(r9, 0x80024321, &(0x7f0000000040)) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r10, 0x0, r11) r12 = socket(0x10, 0x2, 0x1) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r15 = socket(0x10, 0x2, 0x0) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r15, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001800030900000000000000001d010000180004000000000000000000ef535f6879f43d46e60400000008000a00", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32=0x0, @ANYBLOB="08000e00", @ANYRES32=r17], 0x44}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x40000, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r17}]}, 0x44}}, 0x0) ioctl$SIOCAX25GETUID(r11, 0x89e0, &(0x7f0000000000)={0x3, @null, r14}) 20:08:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10000000, 0x0) 20:08:02 executing program 2: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$FUSE(r1, &(0x7f0000001680), 0x1000) sendfile(r0, r1, 0x0, 0x88001) 20:08:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4000000000000000) 20:08:02 executing program 1: r0 = gettid() tkill(r0, 0x1000000000013) getpgid(r0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip6_tables_matches\x00') r2 = gettid() tkill(r2, 0x1000000000013) ptrace$getregset(0x4204, r2, 0x6, &(0x7f0000000040)={&(0x7f0000000100)=""/245, 0xf5}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000000)=@usbdevfs_disconnect={0x400}) lseek(r1, 0x20400000, 0x0) 20:08:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x20000000, 0x0) 20:08:02 executing program 2: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffcbd, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0010000000e8bd6efb120309000e000100030000ff050005001201", 0x2e}], 0x1}, 0x0) 20:08:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setregid(r6, r7) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4800000000000000) 20:08:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfffffdef) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 20:08:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x20100000, 0x0) 20:08:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x608}, "d72db0a2ca7b9c42", "77aa57b1f4e4d29b564f423f7d9a5ceb", "2a80eed1", "51896578a664c402"}, 0x28) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x30000, 0x0) ioctl$RTC_UIE_ON(r6, 0x7003) 20:08:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x4c00000000000000) 20:08:03 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x10997e, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="56f563"], 0x3) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 20:08:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xffffff7f) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6800000000000000) 20:08:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3f000000, 0x0) 20:08:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="74726158733d66642c7266646e6f3d0f0166ffbee32d83aa73640a33de74fb910807fc3af541b0147abb2e94bdc1abb5297341ea97004eb3025e6a0b8b27f128a0962279f2a500000a27efceae5f22f60000000000000000000000d770f34027e2cb4121f16bba56b1d55a4beb379d4138f7f7d4789992b1704a3877efe3b2de64281ac8df3a16182afe905dce0dcb9e958c9125776cce0666f590fbdf46baa97c616dc6a74713283b42b679", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004f40)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x1, 0x0) 20:08:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000000)=0x7fff, 0x4) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000480)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xffffff8d) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) creat(&(0x7f0000000680)='./bus\x00', 0x0) r0 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) flock(r0, 0x8) 20:08:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$void(r4, 0xa8a2) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0x20, 0x80000000, 0x6, 0x400}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x6c00000000000000) 20:08:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x40000000, 0x0) 20:08:06 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) lseek(r3, 0x20400000, 0x0) 20:08:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfffffff5) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8cffffff, 0x0) 20:08:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) r4 = gettid() tkill(r4, 0x1000000000013) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x29, 0x45dc13bab7b886e5, @tid=r4}, &(0x7f0000000100)=0x0) timer_settime(r5, 0x0, &(0x7f0000000140)={{}, {0x77359400}}, &(0x7f0000000180)) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7400000000000000) 20:08:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/46, 0x2e}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 20:08:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xc0ed0000, 0x0) 20:08:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x95, 0x10100) r7 = gettid() tkill(r7, 0x1000000000013) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket(0x10, 0x80002, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket(0x10, 0x2, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r11, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r13}]}, 0x44}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) r15 = getegid() r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r17, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r16, 0x2405, r17) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = socket(0x10, 0x80002, 0x0) r20 = fcntl$dupfd(r18, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) r21 = accept4$unix(0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000003c0)=0x6e, 0x40000) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) r23 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r22, 0x0, r23) r24 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r25, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r24, 0x2405, r25) r26 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r27, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r26, 0x2405, r27) r28 = open(&(0x7f0000001dc0)='./file1\x00', 0x0, 0x10) r29 = socket$inet6_tcp(0xa, 0x1, 0x0) r30 = socket(0x10, 0x80002, 0x0) r31 = fcntl$dupfd(r29, 0x0, r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) r32 = gettid() tkill(r32, 0x1000000000013) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) r34 = socket(0x10, 0x80002, 0x0) r35 = fcntl$dupfd(r33, 0x0, r34) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000001e00)={0x0, 0x0}, &(0x7f0000001e40)=0xc) r37 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r37, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r38, 0x0) r39 = gettid() tkill(r39, 0x1000000000013) fstat(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r42 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r43 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r44 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r44, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r43, 0x2405, r44) r45 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r45, 0x40086602, 0x400007) r46 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x5}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r46, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r47}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r45, 0x0, 0xe, &(0x7f0000000140)='memory.events\x00', r47}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001480)=':[\x00', r47}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001fc0)={0xffffffffffffffff, r43, 0x0, 0xb, &(0x7f0000001f80)='&^selinux+\x00', r47}, 0x30) r49 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$netlink(r5, &(0x7f0000002100)={&(0x7f0000000080), 0xc, &(0x7f0000000280)=[{&(0x7f00000006c0)={0x1304, 0x1b, 0x400, 0x70bd26, 0x25dfdbfb, "", [@nested={0x125c, 0x40, [@generic="338353dd7c52442a0b99a23642f31c7a023cd01788b6e1d8c08152598970865c93247bd1889a228c38738d60a39b0350c2aa1f67da00a507a14e266a2dea47f8b8c406420b4dbf341ece06e1c933eee3cd039a595e1bd2de0fa7b831dd39be37f8115fe7bf876cb67c0bfda5c098110808cb20f30235488a9f384b5e6bb81e45cb23059093437459337357f566e050f2c135ca51ea62898854379d28cfe6ee813e03f966e1a6d6677dedc7ac2ca0bb58154b9336003ffeeeb3ec56e506fdef9c70068143bd30d8b24d3657196a8fbb40d6e2ed741446174cd5b80aef4569013c1d33f6c88c844c2191d807b0eb9e14a472745281", @generic="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", @typed={0x8, 0x88, @u32=0x9e6400}, @generic="00f406ebe873548ba55f024e5932692d8d9edcc9dfab8feb361375628e9d1dbdfc3f44cb871c859e8bae46933605adca9b86dd0d4292e5ae398df4963fc6a827d17771ccb5424ecb943bf12016696f84e0d8e83ec9dad7b9b9c8dd6ad3dfc453d8519fca30cedc29b765a82052965214f9d56e0de00616f7715f8ce00586f8b5793c1f0b876fb6391755ff88aa420697670d2b8937fb30d87c6309e5029422d5386faee94d1d", @typed={0x14, 0x1a, @ipv6=@dev={0xfe, 0x80, [], 0x2b}}, @generic="65053eae0c85884bc82a0be5f75cbbc6c1c0f78ba5aac1353ed7985c741e6947a01e7c004768d2e07d094874bd42caf69deb0ccae0242b06d9b28599c1e0acc4a846185ea91c8a29dacfbbb553c6a4ee73c6eb71bd910054c0c8c0c5df65078e71c933b413f87724086a99132db8b4218f2dce30b48a309fefd8117720c585d83b44c851e97a29cbdcbfe723b42937dcb4f503893f79b4b74db33584a118e1"]}, @nested={0x80, 0xc, [@typed={0x8, 0x42, @fd}, @generic="d3479469ba1b613fb2eff8eaba8dac08bed7c09293795c2ddb07b4b984d0b55b618815d8c2db8b001e30bc4bcdfb6e91a3c39f99618a6f95c233d5bc21f92d1e315ccf84518f8a49b5d58f84a07d7dcaa9a54e69a283e33686677a620e0f2fe683d070", @typed={0x8, 0x4, @fd=r6}, @typed={0x8, 0x32, @ipv4=@multicast1}]}, @typed={0x8, 0x1c, @pid=r7}, @typed={0x8, 0xa, @str='-\x00'}, @typed={0x8, 0x3a, @fd=r10}]}, 0x1304}, {&(0x7f0000001a00)={0x38c, 0x2b, 0x200, 0x70bd25, 0x25dfdbfd, "", [@nested={0x16c, 0x52, [@generic="9446edfb3073da414afc578f3e9d3f4de3f91debd6339358f6555e3823315477772d49b863e605d06ed4d04c2f89da6d6c78fc1decb764a30005cd205ba5bb77aaa73c6b44fd159c6baa9e5016e1124d353a433bbb9fb1745d96ef5264160f7db9c1b996c22154b267bf70e366858727c4d629fc71767fd01a2ab627fe", @typed={0x8, 0x8b, @str='9p\x00'}, @generic="9e67e9602c3de2ac32b08572fd828fab54d261ecab010e34e50841b4603f3607db03c06fb4c32928a131592efe38b9c3f1d0a0b09139ed7765d76b179ad70ac0c7e1a577b690de4b3b706dd5316882a3d0770b8a1bc6700fcae273c0c621d7b14012ff7d8f6f301dc3281494b61cc549c12f570941b08c78aeb365d598f148a092a611f2999511089dff0c038de1ef6ec7958fbcb8d10974aaa963d4568977ae2242ee6897d4e666096dfd5552ed493fae099f044b18f904b9b634dd243652748248147a7b6517e3dfc3c7cf8cc3ced303b6", @generic="d5e6adcc00dd2a54f131d24fbfca3b"]}, @nested={0x4, 0xa}, @nested={0x13c, 0x7f, [@typed={0x14, 0x29, @ipv6=@mcast2}, @generic="0a4b9363e91964d13149eb76daa9e80c6047dd449247b1649c94baba4200152e169dee8cb58549a3647e650222db679bf535e6ac75da07ef54dbf23c1d858b92a11579e33baeec7942c3c186b5fb4caa3d31983a7d27cb6dd27e7a8c83e657be8e20947618d919ff87070bb6666936712e8aa5a66501", @generic="d54b000e226673db0075cf2de81da1d32a4006ae170b080bed141b0587c9e14754b6e422e8de0e0cd246a370932a39a825f30e5e3cdec13b8f", @typed={0x8, 0x4f, @u32=0x7ff}, @generic="c0a724ad95e55f7037", @generic="a600dc5b6776968bbd210dc3271c016c135099e47dfaac194025f633888d156226c636f78555c2438d50a20f3517c05435612ec7bb0cb042108b5af88e9dccf246edb4f2cfce2d177a6e9df489c6f08bfa59", @typed={0x8, 0x1e, @uid=r13}, @typed={0x8, 0x1e, @str='9p\x00'}]}, @generic="8ee66c4deba5758723ae0e2486ae8ebd5f641dc75b9f414c951e4e6418cab33449f9845d7447f733343bf536e1fd80ba86add1ee95c292193cc2b7992087da1e2609bd1930a9f3526c70d5df4c8266f4c5714ecb801c3bacea280c038ee538a8b4785fa5496372cfd63a31dbefc510e556ea1c8e8c85feb834695f95d74f8544d412dcaf546a042086ae1835e82df00b41b55242e4167aa8bf75d511e95ca0d7ceae22858dd9aa7d795b1097585b14b3ca11c648d30e43f73d714c220fea5ea8ccf194882dcf41d67b9c32a80dd21152", @generic]}, 0x38c}, {&(0x7f0000000180)={0x58, 0x3b, 0x10, 0x70bd2a, 0x25dfdbff, "", [@generic="2d868480763a27a604b22bb4aa733841d7b51e83abda26751555a518c8d2f14789806dec1ff5de5a7a5ebe3cb90c60559efc0f5d6cde716fd899ac019f7cc66c0b6e58f8a4"]}, 0x58}], 0x3, &(0x7f0000002000)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14, r15}}}, @rights={{0x28, 0x1, 0x1, [r17, r0, r20, r21, r22, r25]}}, @rights={{0x28, 0x1, 0x1, [r2, r2, 0xffffffffffffffff, r26, r1, r28]}}, @rights={{0x14, 0x1, 0x1, [r31]}}, @cred={{0x1c, 0x1, 0x2, {r32, r36, r38}}}, @cred={{0x1c, 0x1, 0x2, {r39, r40, r41}}}, @rights={{0x20, 0x1, 0x1, [r42, r48, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [r49]}}], 0x100, 0x4000000}, 0xc084000) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x7a00000000000000) 20:08:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf6ffffff, 0x0) 20:08:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x0, &(0x7f0000ffe000/0x2000)=nil, 0xa) r6 = gettid() tkill(r6, 0x1000000000013) write$FUSE_LK(r5, &(0x7f0000000080)={0x28, 0xfffffffffffffff5, 0x5, {{0x4, 0xbcc, 0x3, r6}}}, 0x28) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e733d66642c4aa771346f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) set_tid_address(0x0) 20:08:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfffffffc) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 1144.374193][ T26] audit: type=1326 audit(1574366886.843:8646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13676 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 20:08:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xf5ffffffffffffff) 20:08:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xff000000, 0x0) [ 1145.163712][ T26] audit: type=1326 audit(1574366887.633:8647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13676 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 20:08:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r8, @ANYBLOB="0000ffff00e8ffff000000080c085665ecf5000004008000fbe641aba200000000"], 0x34}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local, 0x1, 0xfff, 0xff, 0x0, 0x1, 0x1000000, r8}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket(0x10, 0x80002, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$KVM_GET_TSC_KHZ(r11, 0xaea3) 20:08:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xfeffffff00000000) 20:08:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd7860c42c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xfffff000, 0x0) 20:08:09 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000010000104001000000000000002000000", @ANYRES32=r1, @ANYBLOB="00000000000000001c0012000c00010062726964676500000c000200080015"], 0x3}}, 0x0) io_setup(0x1fd, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 20:08:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xffffff8c, 0x0) 20:08:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0xfffffffffffffff5) [ 1147.121499][T13977] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 20:08:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x80000001, 0x18000) ioctl$TIOCSSERIAL(r3, 0x541f, &(0x7f0000000280)={0x7ff, 0x24, 0x5, 0xfffff000, 0x200, 0x0, 0x93a4, 0x1bc, 0x9, 0x81, 0x6, 0x3, 0x2, 0x80, &(0x7f0000000140)=""/95, 0x2, 0x7, 0x7fd0}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000006c80)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)='4\x15\x863\x04J\x03\xf6\x1ce\x04\xcb\xb1\x89\xd0\x8a'}, 0xfffffffffffffec3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') 20:08:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78b1df75) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xfffffff6, 0x0) 20:08:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:08:10 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg(r5, &(0x7f00000001c0)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000080)=[{&(0x7f00000004c0)=""/243, 0xf3}, {&(0x7f0000000280)=""/77, 0x4d}], 0x2, &(0x7f0000000340)=""/152, 0x98}, 0x2000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r8, 0x80045200, &(0x7f00000006c0)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1147.787626][ T26] audit: type=1326 audit(1574366890.253:8648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14855 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 20:08:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xedc000000000, 0x0) 20:08:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78ce6f14) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:10 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc613f5ec9154a614b0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da7753902c463516e62418dd84003d4dfd78374094d7ec878398ac0ef1ec6d050e438346c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000000)) 20:08:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf0ffffffffffff, 0x0) 20:08:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x100000000000000, 0x0) 20:08:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78dfd67a) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r3, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) connect$pptp(r4, &(0x7f0000000280)={0x18, 0x2, {0x0, @remote}}, 0x1e) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0xbd, 0x7f, 0x2, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x28a, 0x1, @perf_bp={&(0x7f00000001c0), 0x5}, 0x10000, 0x8, 0x80000000, 0xf, 0x5, 0x9}) 20:08:11 executing program 2: 20:08:11 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) creat(&(0x7f0000000380)='./file0/file0\x00', 0x102) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="49902991d18bd2bc", 0x8}, {&(0x7f00000004c0)="6ff9fc57e96f81817ac2caa2d6510e1e21caec223e07c0dfe85737855c2ad83a3fcdb424ef68ff83742fa0c74f180f5ead7342b959a888a97922453f3cd69ddf89bca7de23085f4402280683d17cee481f0cc781699e80b734c30e77072ffd77d2201c5ef4d5695b0760d51f6e77c37872903a47a78236db8e6a5247bf1a3196d8496a98446c535d18eeb3222183636049064912e090da0c4e69dfdb7c47d35e542cbbd1e529479fd87ff9a240a638621abee4a9231aa68848d4e6d31d5ea20c9eb77d6ec2ea4f27230a6cf6419496da153c8eeb690166fac77a131742be899443bd0701e7ed291469ef95b828ad93", 0xef}, {&(0x7f0000000140)="6c5c68f45e7d2fb534429ed3fbcf4e19a1ccac8a7e4eaa2f1aa3c31137b6ccebdaaa19e18c7f", 0x26}, {&(0x7f0000000180)="71806666834f4d460e49218af71989b3a2e08df7805e9d22c5dabcdc2d174241251ac61a595e54f8ff6f7bfd7daa93f1c8e63efed247e1b371f4b89d8f52313d919461e17cf72a070ba32d298657f70b01331b196374f98148", 0x59}], 0x4, &(0x7f00000002c0)=[@op={0x18}, @iv={0x28, 0x117, 0x2, 0x11, "e1dea6bee71b07c9ce1b51063253ae4745"}], 0x40, 0x66dc3d082aef4922}, 0x4000000) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x200000000000000, 0x0) 20:08:11 executing program 2: 20:08:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000000c0)={0xa6, "ac18e822db40bb3faa1d3e1150bf9d81648c20c9e014129d4c89f8c6c825a7b2", 0x80, 0x6, 0x9, 0x2, 0x4}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:11 executing program 2: 20:08:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) write$FUSE_LSEEK(r1, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x8, {0xce2e}}, 0x18) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f00000000c0)=""/133) lseek(r0, 0x20400000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x2000, 0xdc64}}, 0x18d}, 0x1, 0x0, 0x0, 0x40044}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r9, @ANYBLOB="0000ffff00e8ffff000000080c085665ecf5000004008000fbe641aba200000000"], 0x34}}, 0x0) bind$packet(r4, &(0x7f00000001c0)={0x11, 0x9, r9, 0x1, 0x7, 0x6, @local}, 0x14) 20:08:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x300000000000000, 0x0) 20:08:11 executing program 2: 20:08:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78e3c372) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:11 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x100}], 0x2, &(0x7f0000000180)={r2, r3+30000000}, &(0x7f00000001c0)={0x6}, 0x8) r4 = dup(r1) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:12 executing program 2: [ 1149.534750][T16021] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 20:08:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x400000000000000, 0x0) 20:08:12 executing program 2: 20:08:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000140)={0x40000001}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) sendto(r4, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0xff08}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) syz_open_procfs(0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:12 executing program 2: 20:08:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x500000000000000, 0x0) 20:08:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd7922e4ea) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:12 executing program 2: 20:08:12 executing program 2: 20:08:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x600000000000000, 0x0) 20:08:13 executing program 2: 20:08:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd7927db85) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x4000) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f00000000c0)=0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000100)={0x0, 0x7f, 0xfffffff9, 0xcc, 0x401, 0x98b2}) 20:08:13 executing program 2: 20:08:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000180)) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000140)=0xc) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdng=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x700000000000000, 0x0) 20:08:13 executing program 2: [ 1151.104160][T16757] 9pnet: Insufficient options for proto=fd 20:08:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x80) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r4, 0x20400000, 0x0) [ 1151.158960][T16757] 9pnet: Insufficient options for proto=fd 20:08:13 executing program 2: 20:08:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x800000000000000, 0x0) 20:08:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)=""/30, &(0x7f0000000140)=0x1e) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r3 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) 20:08:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000180)='\f', 0x2e7}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_pgetevents(r1, 0x1ff, 0x2, &(0x7f0000000000)=[{}, {}], 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x7fff}, 0x8}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r2, 0x20400000, 0x0) 20:08:13 executing program 2: 20:08:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd792bc31c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:14 executing program 2: 20:08:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1000000000000000, 0x0) 20:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 20:08:14 executing program 2: 20:08:14 executing program 2: 20:08:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2000000000000000, 0x0) 20:08:14 executing program 2: 20:08:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r2) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x2, 0x46, 0x3f, 0x10001}]}, 0x10) 20:08:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2010000000000000, 0x0) 20:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x2100, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000002c0)={@mcast2}, 0x14) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$unix(r3, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r6, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd796b3221) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:14 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() 20:08:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3f00000000000000, 0x0) 20:08:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400001, 0x0) openat$cgroup_type(r1, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:15 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffe4b) creat(&(0x7f0000000140)='./file0\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/46, 0x2e}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 20:08:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd797061e2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4000000000000000, 0x0) 20:08:15 executing program 5: r0 = gettid() tkill(r0, 0x1000000000013) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r3) fcntl$setlease(r2, 0x400, 0x3a9c3240dbc07b79) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x20400000, 0x0) 20:08:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='t=fd,rfdno=\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$P9_RREADLINK(r5, &(0x7f00000001c0)={0x16, 0x17, 0x2, {0xd, './file0/file0'}}, 0x16) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x2799, 0x20, 0x2, 0x3ff}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000180)={r6}, 0x8) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000000)) 20:08:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$alg(r1, &(0x7f00000036c0), 0x49247e0, 0x2c010919) 20:08:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8cffffff00000000, 0x0) 20:08:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf6ffffff00000000, 0x0) 20:08:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd79744707) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40000, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000140), 0x4) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065f4ff0180000008003950323030302e4c96ef15640cf8bc693f5ec94a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f427e7fdafbf4f3a0c6da00200480bc20ba9867067b74515bab0db5fc04e81ea03210a957dd42a1b475a6825ed0234cd3da775ef1ed78a9b13383400"/156], 0x15) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xff00000000000000, 0x0) 20:08:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0xfffffffc, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, 0x0, &(0x7f0000000380)) 20:08:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c776664b7b46af8c65a5f6e6f3d", @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0xfffffffffffff000, 0x0) [ 1153.797928][T18585] 9pnet: Insufficient options for proto=fd [ 1153.822641][T18585] 9pnet: Insufficient options for proto=fd 20:08:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') lseek(r0, 0x20400000, 0x0) 20:08:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd79a23cbb) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) unshare(0x4000000) 20:08:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) 20:08:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78ce6f14) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000140)={0x4, "b78f3d95c32c2f8ac22342651e2538e608067fe16412b0e997c3e8d4acbbedc5", 0xe78, 0x99d3, 0x7, 0x4, 0x3}) 20:08:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78ce6f14) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd78ce6f14) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd79a62f80) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x38, r3, 0x2, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x1c, 0x18, {0x3, @bearer=@l2={'V@\xf0\'-7\xe4\x14\x88V\"', 0x3a, 'erspan0\x00'}}}}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6413}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCX25GSUBSCRIP(r7, 0x89e0, &(0x7f0000000300)={'bridge_slave_0\x00', 0x5, 0x2}) lseek(r4, 0x20400000, 0xa2536dc2815b72c1) 20:08:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61017489d5d81965, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="fb3204c0327e67fab98f728a3e86718e9342ed9a78f1423f772cb062c0cf2f1ba180fb40137a64941e0a031611032b2fff208e888d93b4c20f9ebbd1dbc11f196b60bdd31c580b88ea1d5aa3476f11676f7dcc71ac1cf6865c3fb41e84cb1559bd03f9028889ce423f3e5b18407d637b42324a6488115c813c8267d8f095d585d076ce164b452d44bba2f76d9efd23565dd14d82431e05ecfba5601e63c771bda69c68f01041acc4dab3f89e127b842509fdf2457b7db5b8dc0571f0869001b332fa4d46880423ae210396aff50a64d5ca8edab6a7401f6143726d74749268506d62d42b8064ad560b7f1d1d38ed16e5eb"], 0x32, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000007f80)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000007fc0)={0x24, r2, 0x5c7ac9ca58403dbb, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100040c0}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x1bc, r2, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0xfffffffffffffd0e, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6c3f26d4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x931}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffe2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x5}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe5}, @TIPC_NLA_PROP_MTU={0x21b, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x20000}, 0x40000) 20:08:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setregid(r6, r7) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0xfffffffffffffeda, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x2) lseek(r0, 0x20400000, 0x0) shmget$private(0x0, 0x4000, 0x84, &(0x7f0000ff9000/0x4000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) rt_sigqueueinfo(r3, 0x11, &(0x7f0000000180)={0x8, 0x1, 0x8000}) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, &(0x7f00000000c0)={0x8, 0x1}) 20:08:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd79aa195e) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setregid(r6, r7) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3ea, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x100000000, 0x2) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000140)={0xbf, 0x6, 0x52}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x11004, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000180)=0xffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x1) 20:08:19 executing program 5: ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000000)={0x43, 0x80008, "04e454937c45112b194536ec2f910c1de15b00be4ec4d64e", {0xfffe, 0x5}, 0x6}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) accept4$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x1c, 0x3ee8f6c5636fff0c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r1, r4, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x408082, 0x0) connect$ax25(r5, &(0x7f00000001c0)={{0x3, @default, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000140)={0x9, "33591a02f991e5f42899e58bb1bde1d96325ab69d5731cc804de8b4ea8f7ffff", 0x3}) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2de9878937a88043, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x3f, 0x6, 0x6, 0x4, 0x0, 0xffffffff7fffffff, 0x28042, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xb4e, 0x2, @perf_config_ext={0x7, 0x2}, 0xa000, 0x1000, 0x10000, 0x5, 0x6, 0x2, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000240)={{0x3, 0x1, 0x9, 0x3, 0x5}, 0x0, 0xfffffffa, 'id0\x00', 'timer0\x00', 0x0, 0x40, 0x1, 0xd698, 0x800}) 20:08:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) r2 = dup2(r1, r0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={r4, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x0, @loopback, 0x61}]}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x869, 0xfffffd55, 0x3ff}, &(0x7f0000000140)=0x10) 20:08:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIONREAD(r5, 0x541b, &(0x7f0000000000)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') lseek(r6, 0x20400000, 0x0) 20:08:20 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setregid(r6, r7) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xfd79ead840) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0)=0x8, 0x4) pipe2$9p(&(0x7f0000000240), 0x81800) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10000, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@buf={0x33, &(0x7f00000002c0)="f2b0f7519e96db3404ceb154eda667c6436c7ba9c19aa88c0320922ed0bd126661454192ee36496784306029cbf7b7b3989cd2"}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000340)={0x0, 0x1, 0x1}) socket$key(0xf, 0x3, 0x2) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='overlay\x00', 0x4900008, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}], [{@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, 'fuse.'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'fuse.'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) 20:08:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r2, r1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={r4, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r4, 0x869, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x3, 0x8, 0x2, 0x7f, r5}, &(0x7f0000000140)=0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x0, 0x3f, 0x8, 0x1, 0x3, 0x854b8e2e6c72815f, 0xe66, 0x1b, 0x40, 0x22d, 0x3f, 0x81, 0x38, 0x2, 0x8020, 0x20, 0x2}, [{0x5, 0x2, 0x3, 0x3f, 0x7f, 0x0, 0x8, 0x40}, {0x2, 0x8, 0x7f, 0x400, 0x8, 0xff, 0x1, 0xffffffff}], "cdf9f5a6cfd837f2b25a28844915c0bdfd0870298803f23054490ca0852686671b799560904577198a949db31e104257f7b82cf61efaec25dbf760d8499415912fd54db5cffaa561be272199dc83914afbbf10fef034090730a877af3575a0e71efa17fc60d7ea17f8fa1d971beb357d818810776d70591cd48a0f81ae41c32385e7f5e56f1a5b572c25e717a027b54e520eebf90d4d6a38d9c0538b599dfd30951df8e921321edf604e1ee8e8011abc9c50bdcacafd1a886d595969d62949e23fa87b86d50d28c9dd993c40951ebee0c3ed44ca78fe565269e583aee4340a", [[], [], []]}, 0x48f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000000c0)='-[wlan0\'\x00') 20:08:20 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x1000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x4e20, @multicast2}}) 20:08:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file1\x00', 0x8, 0x2) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1ff, 0x709402) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000140)=0xfff) 20:08:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x100000002, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r2) connect$rose(r2, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x3, [@null, @bcast, @default, @null, @default, @bcast]}, 0x40) 20:08:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x4000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:21 executing program 0: setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f00000000c0)=0x6, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='\x00', r1}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x200000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x400, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50000}, 0x1000) 20:08:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='\x00\x00\x02\x10\x00', 0x0, 0x0) 20:08:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:22 executing program 5: setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x85}, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x20400000, 0x0) 20:08:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0xf0ffffffffffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f00000000c0)={0xfffffffc, @random="c0dc5ef212f7"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, r5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:22 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x300, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000140)={0x7, 0x4b, 0x2}, 0x7) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r2) fcntl$notify(r1, 0x402, 0x3946082b5a6ec293) 20:08:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x100000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x3, 0x4) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000100)={0x7, {0x101, 0x9, 0x600, 0x1}, {0xe7df, 0x6, 0x6, 0x9}, {0x80000000, 0x9}}) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = socket(0x10, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r3, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r5}]}, 0x44}}, 0x0) getresgid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) r7 = socket(0x10, 0x2, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r7, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001800100000000000000000001d010000180004000000000000000000ef536879f43d46e60400000008000a00", @ANYRES32=0x0, @ANYBLOB="1c09b977", @ANYRES32=0x0, @ANYBLOB="05a36aec000e00", @ANYRES32=r9], 0x44}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x7, &(0x7f0000000500)=[{&(0x7f00000001c0)="d5ff3726db7d2d99a7b5685016af08c78b84230d1d0d89772eb722d438eb467f8128df5ff0264b78771a59a47318b1810de9cea8a48da0ac45ebfb0f80e3ce2f17a423407f", 0x45, 0x7}, {&(0x7f0000000240)="70e0eae4f5e829127aa814bbaecd1d05cbe687c8e74fdec105f78ed8fdc4d84d5086b8955eaaf6413b1a5809a9ebcd1ce8e624bd637b7d4564e45b1ea7dd5348c3c360272ac867ca5885eeffdb2ba9aa2b8b650c6ba47c2eaec6b1aecbacb984cf2f63dc2f2851d0f319ce0bb221e8cade63f8c2fc9189303c9eab8a884d75cd38b96b0aed1487618c6a887b79d3d625ed19fb4fdf74c090dd7f0cdb9a", 0x9d, 0x6}, {&(0x7f0000000300), 0x0, 0x6}, {&(0x7f0000000340)="ddffc642d9a5fe15062f553c350e46d1a43a5307b476bbca3670a3251efddd26744a795b7e19", 0x26, 0x40}, {&(0x7f0000000380)="4115fadccc6e114ab307633f9d86d086ba056699601b975f7cadb678a5efc27ef32f3c9b81ca94d99b889bd5b9b9", 0x2e, 0x3}, {&(0x7f00000003c0)="0053a8f4146c48c0d308d65921b7cbad98509b69a2072e406599983539db3546c58ca55bcee4d88c20fee714b760bbbb4cd3f0ddb621ac6227854fd527920d3dd6f56a65e7b9dd81eaca0031ab24347a8b6c03ff5769fb986ef47e62008d9269690292258055c1fc8adca447fba3a74eca56445adb5305185ffda6215cafecfc45fa466b3777f78b9520fd4ad4ca005f5820e5712d9d9497229b4cea41ccba2c85c7ec04a89eb91d10368fd92510605768c142c4ff9a313bf662a1fcc4dec3191a05b0de91b4b843308ca53ee05b14127bb94193c0fb4c57f5736447891904e83856", 0xe2, 0x7}, {&(0x7f00000004c0)="126f8c868fe185e5077c9beb5cbe2bd1f2f6221ac456d8c2a1ba1e7187d2fc9536b576511386fc", 0x27, 0x9}], 0x81e821ddb5a9c66b, &(0x7f0000000680)={[{@uid={'uid', 0x3d, r5}}, {@map_off='map=off'}, {@gid={'gid', 0x3d, r6}}, {@check_strict='check=strict'}], [{@audit='audit'}, {@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r9}}]}) fchdir(r1) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000000c0)={0x2f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x3, 'fo\x00', 0x8, 0x8, 0x5f}, 0x2c) 20:08:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_int(r1, 0x0, 0x1c, &(0x7f00000000c0)=0x20, 0x4) 20:08:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x40, 0x0, 0xfffffffffffffffd, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0x80000, r3, 0x0) lseek(r0, 0x20400000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r4, 0xc0a, r5) getpriority(0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$kcm(0x11, 0x8000000002, 0x300) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r7, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0xfffffffffffffc96) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r8}, 0x44) socket$kcm(0x2b, 0x8000000000001, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r8}, 0xc) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00#\x7f\x80P=r\xc4\x17I~\x85\xadq\xd6\xde@\xb3\xd5\x9f2R\xa3Z\xd3\x9b\xbd\xa1\xa3/\xc0\x91J\x01!8#\x04\x0f\xc3\xb7\x95\xdc\xaa\x91\xfb\xa1]PVH\xaa\x19\x04\x80\x94\'\xc7\fL\xac\xcf:\x92N\x94\xde\x87\xc4\x9b\x87\xd2\xcc{X\xedVr\xecP\xf9&^I\x9f}3U?\x1a\r\x9d', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000940)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xac, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000, 0xd, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) socket$kcm(0xa, 0x2, 0x11) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_all\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x3, 0x0, r10}, 0x3c) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x161) 20:08:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x406, r2) r3 = dup2(r0, r1) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f00000000c0)=0x4, 0x4) 20:08:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x3, 0x3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10340, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r7, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f00000000c0)={r8}) 20:08:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYRES16=r1, @ANYRESHEX=r6, @ANYRES64=r0, @ANYRESDEC=r1]], 0x8) r7 = dup(r1) write$FUSE_BMAP(r7, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r7, &(0x7f0000000400)={0xa0}, 0xa0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r7, &(0x7f0000000140)="983fed0bb407157d5c14b6664ae98a8172cc7f0cc57e21533da7adfe413fd08b9754fa0d83429e174db655d76b7375664f2792dc9e538cead3545840ce98e32365662ad6313988672197c313c23cbc", &(0x7f0000000340)=""/105, 0x6}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) r8 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r8, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x6000000, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) accept4$inet6(r9, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c, 0x800) r10 = syz_open_dev$adsp(0x0, 0x100, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r10, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r9, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r10, 0xc010641d, &(0x7f0000000500)={r11, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r8, 0x4008642a, &(0x7f0000000300)={r11, 0x17}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r7, 0xc010641d, &(0x7f0000000080)={r11, &(0x7f00000004c0)=""/195}) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x400000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500dfff64ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9158f0e000000000000000000016598578744eceed1a85ca910af916488127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b7a715bab0db5fc04e81ea03210a957d01131b475a6825ed0234cd3da775ef1ed78a9b1338346c4a98691432b91d910f931ccfff0000000000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x200000d, 0x4000010, r0, 0x8000000) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket$rds(0x15, 0x5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r6, 0x0, r7) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000340)={r5, r7, 0x9, 0x76, &(0x7f0000000140)="6d44ab8bf19d23fef68b501cf8359206fae46175c47ea301146bb76ac359aebc3792927a6ec497b39f855989fac13a304efd095955a82c5d1885bf41c3ef21f39f2d0d0d9f410548675d30cdd5bdc09bf70f76f4334f0726d5cefb8c1ef7d340181813f2b38107d02ee76ba5357d3fe73bf0f975c023", 0x0, 0x9, 0x7, 0x8f5, 0x5f60, 0x0, 0x2, 'syz1\x00'}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket(0x10, 0x80002, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendto$isdn(r10, &(0x7f0000000080)={0x5, 0x7e1, "5ed08d1249e5"}, 0xe, 0xc000, &(0x7f00000001c0)={0x22, 0x40, 0xd, 0x0, 0x3}, 0x6) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3f, 0xdd2b60dd5781a72a) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000140)=0x1497c00) 20:08:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x40}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000000c0)={r7, 0x8, 0x3, [0x8, 0x800, 0x81]}, &(0x7f0000000100)=0xe) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket(0x10, 0x80002, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r10, 0x2) 20:08:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() socket$inet6_udp(0xa, 0x2, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x3}}, 0x30) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRES16=r4, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80000, 0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r6, 0x0, r7) lseek(r6, 0x6, 0x4) 20:08:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) fcntl$setpipe(r0, 0x407, 0x80000001) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x5, 0x10000) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x4, 0x7f, 0x1}}, 0x30) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x917c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x500000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:24 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) lseek(r0, 0x20400000, 0x0) 20:08:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x31, &(0x7f0000000280)={@rand_addr, @empty}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x20400000, 0x0) 20:08:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)=""/130, &(0x7f00000000c0)=0x82) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x9, 0x20002) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000240)={0x4, 0x5, 0x3f, 0x800, 0x4892, 0x4, 0xd}) 20:08:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180010008003950323030302e4c96ef15640cf8bc693f7dc9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7b715bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ec08a9b1338346c4aa5691432b91d910f931ccfff0000000000000000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:08:24 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) splice(r3, &(0x7f0000000000)=0x1, r1, &(0x7f0000000040)=0xffff, 0x5, 0x6) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f00000000c0)={0x0, 0x70, 0xffffffe1, 0x7, 0x6}) 20:08:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, 'm\r\'', "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"}}, 0x110) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x700000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f00000000c0)={0x0, 0x0, @pic={0x9, 0x20, 0x5, 0x4, 0x92, 0x7f, 0x20, 0x81, 0x9, 0x1f, 0x9, 0x7, 0x7f, 0x7f, 0x0, 0x80}}) 20:08:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0xf, 0x84) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x4, 0x7f, 0x101, 0xfff, 0x1ff}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000003c0)={r4, 0x2}, &(0x7f0000000400)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCGISO7816(r7, 0x80285442, &(0x7f0000000440)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r8, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRES16=r9, @ANYBLOB="00022bbd7000fddbdf25050000003400030014000600fe8000000000000000000000000000bb1400020076657468305f746f5f7465616d000000080004000700000008000400080000001400336c5ff2b6818f627327b2579a000800000008000600040000001c000300080300751ab89c98880200000008000800000000000800040000d00f00080004000500000008000400200000004c00030008000800070000001400060000000000000000000000ffffffffffff1400060000000000000000000000000000000000080007004e2400000800030000000000080004000700"/236], 0xec}, 0x1, 0x0, 0x0, 0x40}, 0x24008001) 20:08:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0x0, 0xfbff, 0x6be, 0x8}) 20:08:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, {0xa, 0x4e23, 0x80000001, @mcast1, 0x6}, r5, 0x10001}}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$unix(r6, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005b00)=[{{&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/139, 0x8b}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f0000001380)=""/199, 0xc7}, 0xd1}, {{&(0x7f0000001480)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000002680)=[{&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/24, 0x18}, {&(0x7f0000002540)=""/68, 0x44}, {&(0x7f00000025c0)=""/159, 0x9f}], 0x4, &(0x7f00000026c0)=""/146, 0x92}, 0x5}, {{&(0x7f0000002780)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002800)=""/193, 0xc1}, {&(0x7f0000002900)=""/75, 0x4b}, {&(0x7f0000002980)=""/180, 0xb4}, {&(0x7f0000002a40)=""/37, 0x25}, {&(0x7f0000002a80)=""/8, 0x8}, {&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/146, 0x92}, {&(0x7f0000003b80)=""/248, 0xf8}, {&(0x7f0000003c80)=""/185, 0xb9}], 0x9, &(0x7f0000003e00)=""/208, 0xd0}, 0x1}, {{&(0x7f0000003f00)=@can, 0x80, &(0x7f0000004480)=[{&(0x7f0000003f80)=""/192, 0xc0}, {&(0x7f0000004040)=""/232, 0xe8}, {&(0x7f0000004140)=""/249, 0xf9}, {&(0x7f0000004240)=""/68, 0x44}, {&(0x7f00000042c0)=""/246, 0xf6}, {&(0x7f00000043c0)=""/137, 0x89}], 0x6, &(0x7f0000004500)=""/135, 0x87}, 0xffff}, {{&(0x7f00000045c0)=@rc, 0x80, &(0x7f00000057c0)=[{&(0x7f0000004640)=""/128, 0x80}, {&(0x7f00000046c0)=""/193, 0xc1}, {&(0x7f00000047c0)=""/4096, 0x1000}], 0x3}, 0x1}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005800)=""/89, 0x59}], 0x1, &(0x7f00000058c0)=""/127, 0x7f}, 0x2}, {{&(0x7f0000005940)=@l2, 0x80, &(0x7f0000005a80)=[{&(0x7f00000059c0)=""/57, 0x39}, {&(0x7f0000005a00)=""/81, 0x51}], 0x2, &(0x7f0000005ac0)=""/58, 0x3a}, 0x1ff}], 0x7, 0x40030002, &(0x7f0000005cc0)={0x0, 0x989680}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000006280)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000005d00)=ANY=[@ANYBLOB="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"/1294], 0x510) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000006300)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000006380)={0x3ff, 0x4, 0x4, 0x4, {r2, r3/1000+30000}, {0x0, 0x1, 0x8, 0x99, 0xe1, 0x0, "c42dc89c"}, 0x9e, 0x1, @planes=&(0x7f0000006340)={0xfff, 0xffffffff, @mem_offset=0x5, 0x101}, 0x4}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x311000, 0x0) 20:08:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='mounts\x00') ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f00000003c0)) r5 = accept4$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x80c00) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='H\x00\x00\x00$\x00?\x00'/17, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000400)='threaded\x00', 0x9) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r11, @ANYBLOB="0000ffff00e8ffff000000080c085665ecf5000004008000fbe641aba200000000"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'\x00', r6}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x7477479fd000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = semget(0x3, 0x0, 0x2a1) semctl$IPC_RMID(r0, 0x0, 0x0) semget$private(0x0, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x3, 0x48200) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000280)={0x2, 0x3, 0x7, 0x6, 'syz1\x00', 0x4}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f0000000200)) fcntl$dupfd(r1, 0x0, r2) getsockname$llc(r2, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x10) 20:08:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xbf, 0x10100) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000140)={0x1b1, 0x0, 0x25b}) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:26 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f0000000080)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xff003642c43387d8, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000380)='./file0\x00') pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000400), &(0x7f0000000440)=0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x404002, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x18024}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x68dc}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6c3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffe}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x72, 0x6, 0x8a, "013a766cd2b64f35a09d1f2efe9678fa", "2d951185249ee2601e36f3b517b3110b4789ed800a16ecbfc58ff8f57a11d63b5dd90c0a73eb725c492f34d6b9c91021ace93ab8be9006e71cd8a941e7c2c71f4d82ee98951135f2663b69e94c12bd69dbf4e2aca1f1347ca89ae1c1ac"}, 0x72, 0x1) 20:08:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pread64(r1, &(0x7f00000000c0)=""/69, 0x45, 0x81) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') r4 = socket(0x11, 0x0, 0x81) bind(r4, &(0x7f0000000000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r5, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="5c000900000000000000c6617ea89e28840e55caf32b2a0ad5c24b", @ANYRES16=r5], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x101000, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket(0x10, 0x80002, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x834ff78be424c05f}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r12}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1ff}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x8) 20:08:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000000)) 20:08:26 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec91508024f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03ca1e1339d4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:26 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x900000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000100)='net/nets\x03\x00\x00\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r3, 0x20400000, 0x0) 20:08:26 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0xb2) r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x1, 0x84800) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x404a04) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xd, 0x21d312d08d201258, "b8eccf4640482b1b6417a1edef1db8eb02b493e3929937c79a2520b4d9b00a0b8143ab08bf244b50568a7a547b6bc538f9b604b7a1f4179f96ade9512d05a44d", "013e4240c0268478d199ad1fe99dbd1eec28e364b00971c86a8e593ff378a817", [0xffffffffffffff00, 0x7]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=""/32, 0x20) uname(&(0x7f0000000400)=""/64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0xfffffffe, 0x21d2, 0x1, 0x2, 0x6ffee705, 0x3, 0xf9, 0x0, 0x1, 0x101, 0x2, 0xcb97, 0x8000, 0x7f, 0x6, 0x1}}) 20:08:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000002f40)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002ec0)='/dev/sequencer2\x00', 0x5a00904288e6de42, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000002f00)=0x1, 0x4) r3 = socket(0x10, 0x3, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000080)={0x0, 0x9}) r4 = fcntl$dupfd(r1, 0x0, r3) sendmmsg$sock(r1, &(0x7f0000002d80)=[{{&(0x7f00000000c0)=@generic={0x9, "bf5e3a670b0c2f1f71be21c9709e422d053539b4e61bf58f067e05efacf25063ff0ab9d5ac5662f58ff719fe76b5f1da9db443975775c43e17c24aa1a160e5e1e2841afcd407bb0a25073f45b84900c7fe1535ecb26fa6b736c8fc8033914ee272b767b0b1f6191e49e17a9d231822c6d467fb001111c0ad722f2356e813"}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="16a0e209319db733c4811faaefa56b96eadfaf7dda2ecb0df87a5d292f633b53ae19b2e8c1f077c18bc823fecde3de5cf322487edd7d1cf1756b2a35e3e2d643ed80ad385345aaf4dc9d07765f3da9b465b168c993344cc6c3b4b1829ecbd97a78b93b5bdbff8dda787b47560b21385b8170aecc841871b07a6c817a2804bce2ff8dee3ea587eda2f2c39286db4d771b4467c70d0ca575193a7f07e0aeb945b56bd0d4d80a8123a45329ba85ecf95ed0cb3d2f68e360dc9c0ec4ee52a98971", 0xbf}, {&(0x7f0000000200)="719671116b276fac78df0dd0cab41ba6149cb169df1d54c5c987ac9534915e47d8e35bbc4c53716cb900208a7ca9f5c1f0bd73b0eac3fa788ec53e2c5cd4fc23f005df724d8508b14fdf961ad49ca7d846d2224dcd048ec34cccd4b72f635e71d1762a8e0b2f37941ffafc1563637bef2f431e73be5fb39feabd90611b77e30a6c9edac454df64e1d32b097030954e", 0x8f}], 0x2}}, {{&(0x7f0000000300)=@ax25={{0x3, @default, 0x8}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000380)="8e771387778527", 0x7}], 0x1, &(0x7f0000000400)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0x5f8}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x78}}, {{&(0x7f0000000480)=@nl=@unspec, 0x80, &(0x7f0000000940)=[{&(0x7f0000000500)="c0cb9698e53bb4a4163be90709ab5b98ac8fe3e459e17c5029fe5fa04b5c5a73f045036d25bd5745", 0x28}, {&(0x7f0000000540)="43623454c48bc282da9fc392714715a79e6b0a32c028d6340e6f8aa88df208f68ce2cfe9777a3d67ead9c13cff63bc1c002a4452554b23e54d6acae93aaf696863f370f42b71e82e1da2bdee27689630c11a34d171ae9350f8298c12bdd7c313cae9ed1c15ce1889adf38a8b62c8e3016cb37c141572094d8dffed5b82ccc2b191f85d1b88f5cb191009e7aac8785700cfe62f463531aaba9b65f1772f18ab4294c5bb8a9f674c8103816d505cd6d668b98b5a3c90c66f39759e31957e4c2d02205b4d53e543e361dbf29a6b5591fbbe2f18fda57b", 0xd5}, {&(0x7f0000000640)="3e87c548bed72a63a3c0a3936790895ecae5acfe685599d9b5e1832415d3076ae3723459f797800a80d8a7deca22bcc91cdfd638c4c6052cd9ff4433e2b2ca6709c842b65503cef0f516874f9a8735e2d98389c5", 0x54}, {&(0x7f00000006c0)="b7afd2973bba4c5347e90d7e1565bae9a9165efb0f9084b407462906d8ad280213f1d4918c839d08594089c92c9a9f48a3018bce5078854b44b9d846e1d8865f70a9ff7a4b64edb17345f946fbf81bc9038ce95c71d6052f7cfe77c3e7d3109200deeecd593f79faaa8b5d8ff05b1857ed1ba483d71e7b04cc08686a7f3a7ce47ffac42819fb70de770f0eb1a4e57bd0d27d1defd52cc00a8dac33fde5346809bd633cd2305e51e1be252fd2fe4c28bc042f5fad4b46057e7312f236be4811c68488427f5b610e6540be22c725aca1abe9e143", 0xd3}, {&(0x7f00000007c0)="8d592edbed285c882cd5fcfae19ba2434e7f927211c93cfe9e1346e692fa17c0e3aba73875e9116a5869e4e022ccaf0f651dcec814372ddc637edbc05b2e2fe74a3038a1ca89cf3f641989f572b96f00d588222d04814b63b2fd457525295617451fe3f9031b3a73af47e70f0cbd8f794eb959b44480d4d4e07dec5279e9f2c6a1559c4d0735465fb538ca2ed03bb2bdfaea7de6c861fe973d78f5f34ee2f8ca27a8184d484bb659f24918", 0xab}, {&(0x7f0000000880)="f485b1ccfdf6957b2757fe90af69e7e13de713fa8b6a9a9a136dc87c3d86fa310447360d978d9a8f7fb2f6199bb6c0585b25296bf2c80dda9a76a4288beb5fa5e37df1c019d9036965d6f3545b4a43cd1fc3ae9068c22c7323fb830964743b80ea5d1ac6cfcd0c83a6a9b52ef657473581e527b05b85", 0x76}, {&(0x7f0000000900)="cdf95d425ee33876978537ea2ffebea7e995bb0ca483b6344099c4e8b375", 0x1e}], 0x3}}, {{0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f00000009c0)="43804303eeb513aad5248167bf6e9a629c508491bd9fa401043c451268dfd744ba590b09e2ac29ab3bb9703e42a03cfe975b5717ae3193dc3d0aa869a7982dbeeab4a33f19e93eaacc1d9a00485f4e282ae0cb37720131a6eda10f2799506aca85da6596d381e8a11675e556a1954aa4d6a1ee79d0f685d53d7753aeb66f39aee433462b99873f84b196932f37cc0826e36c080977b20b0e5082639044f7f789831997d520d4f64f57fe36b2cd9244306e36c45f81bec9824383a4e1", 0xbc}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="fa3cdf01bd55a40e4196c029fb711755de5e1d783a4dd23f6f6519b01663fc34f809a36f3da1c6e256a7ba1b3fdde0c9a65e016bbd4293ac55fcbdc31e2440a588dd93d0ec0d4d9e182e26133473119880afba1f44f74ae2c21e566c44d7750cf118cf3055808fac4801da86d2832721a91c5b40e032cb76e0025c4dc77d7a6c3da642dcfdfd296eef6b91a9f36c89be1d03060a5c1effd5f7b8", 0x9a}, {&(0x7f0000001b40)="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", 0x1000}], 0x4, &(0x7f0000002b80)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}, {{&(0x7f0000002f80)=@generic={0x10, "f133830647bc0f43de83b28c730cad56c83553bedc9e09d48280d4f41e58930b464ae51572418494e6fbfced96a9721ad13d08185d25489fb93ba73d1e6b7fd67e48cb6efebb603309b5d71ffa5af0fbd11b99b998f6fb69d6b65bc870ff2a8df7f97146ace1510da2368d4cf56b94a9156b3030dc47c0da5a7fbbf4bcf3"}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002c40)="68f383e1b29af51c3480e787157490848aa7ef1e8f2cf37cd88ddffae00e021ba7c7236f4ab7b3fcb6a0150377821f6ac3d0454a09879d03de146d439472c991fa", 0x41}], 0x1, &(0x7f0000002d00)=[@mark={{0x14, 0x1, 0x24, 0xe2}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8000}}], 0x60}}], 0x5, 0x4040000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x80002, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x100000001}, 0x1c) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000002bc0)={0x81, 0x0, [0x1, 0x2400000, 0x33df, 0x1]}) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) flistxattr(r5, &(0x7f0000003000)=""/227, 0xe3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r7, 0x0, r8) fcntl$dupfd(r2, 0x0, r7) r9 = accept4(r5, 0x0, &(0x7f0000000000), 0x0) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @loopback, 0xc59}, 0x1c) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket(0x10, 0x80002, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VIDIOC_S_HW_FREQ_SEEK(r12, 0x40305652, &(0x7f0000003100)={0xc1, 0x1, 0x80, 0x6, 0x2, 0xc69df3b5, 0x80000001}) 20:08:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) fchown(r0, r1, r3) lseek(r0, 0x20400000, 0x0) time(&(0x7f0000000140)) 20:08:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r7, 0x0, r8) setsockopt$CAN_RAW_RECV_OWN_MSGS(r8, 0x65, 0x4, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000000)={0x100, 0x3f, 0x800, 0x8}) lseek(r0, 0x20400000, 0x0) 20:08:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x2000) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x2) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, 0x7ff, {0x1, 0x7, 0x4, 0x6, 0x3, 0x1}, 0x7, 0x8}, 0xe) ioctl$KDDELIO(r3, 0x4b35, 0x20) 20:08:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x3, 0x5, 0x0, {0x77359400}, 0x7, 0x401}) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={0xd6}, &(0x7f0000000100), 0x8) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000140)={0xfffffffffffffff8, 0x8, 0x0, [{0x5, 0xffffffffffff8001, 0x3ff, 0x3f, 0x4, 0x44, 0x5}, {0x4, 0x3, 0x1, 0x8, 0x6, 0x7e, 0xff}, {0x444d, 0x7, 0x6, 0x1, 0x9a, 0x7f, 0x2}, {0x8, 0x0, 0x9, 0x81, 0x5, 0x81, 0x29}, {0x2, 0x625, 0x401, 0x4, 0x6, 0x1, 0x1}, {0x5, 0xffff, 0x3, 0x2, 0x25, 0x6, 0x1}, {0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x8}, {0x8, 0x81e, 0x8, 0xff, 0x2, 0x4, 0x2}]}) 20:08:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x146fce78fd000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) getrandom(&(0x7f0000000180)=""/40, 0x9db3ff6336c4215d, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f0000000000)=0x1f) socket$inet_udplite(0x2, 0x2, 0x88) inotify_init1(0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = socket(0x10, 0x2, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_route(r7, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)=@can_newroute={0x44, 0x18, 0x903, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "ef536879f43d46e6"}, 0x4}}, @CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, r9}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4e24, 0xff, 0x4e24, 0x4, 0xd26e555ac48470ac, 0x80, 0x0, 0x2b, 0x0, r9}, {0x6, 0x1, 0xc10, 0x9, 0x8, 0x800, 0x0, 0x4}, {0x0, 0x800, 0x60b, 0x1}, 0x6, 0x6e6bb0, 0x0, 0x0, 0x0, 0x6}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x33}, 0x2, @in6=@remote, 0x3504, 0x1, 0x89733ed645d4a8db, 0x40, 0x200, 0xffff, 0x5}}, 0xe8) lseek(r0, 0x20400000, 0x0) 20:08:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f00000001c0)={0x3, 0x2, "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"}) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000140)={0x1f, [0x8000, 0xdb, 0x5, 0x3f, 0xff00, 0x0, 0x390, 0xb425, 0x600, 0x4, 0x7, 0x3, 0x0, 0x3, 0x8001, 0xf76, 0x1, 0x3, 0x4, 0x20, 0x6, 0x2, 0x8, 0x81, 0x9, 0x6, 0x3f, 0xf3f3, 0x80, 0x7f, 0x3f, 0x4, 0x1000, 0xfd, 0xffff, 0x3, 0xff, 0x1, 0x100, 0x4, 0x7f, 0x2, 0x3, 0x4, 0x3, 0x2000, 0x80, 0x8], 0x5}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xa1, 0x5, 0x0, {0x0, 0x0, 0x0, 0x3}}, 0x30) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766647ec345f287960eec26a26e6f3d", @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x84900, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x7, 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$RTC_ALM_READ(r6, 0x80247008, &(0x7f00000001c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r7, 0x20400000, 0x0) 20:08:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1e}, 0x0, 0x0, 0x0, 0x0, 0x438}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x1cc32b79fd000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x80002, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x6a00, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_BASE(r9, 0x4008af04, &(0x7f0000000040)) uname(&(0x7f00000001c0)=""/223) lseek(r0, 0x20400000, 0x0) 20:08:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000}, r1, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 20:08:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) [ 1165.737003][T25786] 9pnet: Insufficient options for proto=fd 20:08:28 executing program 5: setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f0000000000)=0x200, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$inet_tcp_buf(r2, 0x6, 0x17, &(0x7f00000000c0)="fb29b58b22b5e1183fc19377a9b3a57f171a89d711351873e0e959be9d4808d829fab24a7908faab3b5736450a43a925f51adb45a2a8313178a4144b64b31017f88fe452762bd2a82a011e51d9bf18db6e31dfd03d712272e4fb168092defc0a732ca3bbc7a2b84d8c614113f8701a33af382425cb70df2989", 0x79) lseek(r0, 0x20400000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NBD_SET_BLKSIZE(r6, 0xab01, 0x1) r7 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x800) mkdirat(r7, &(0x7f0000000180)='./file0\x00', 0xd) [ 1165.780941][T25786] 9pnet: Insufficient options for proto=fd 20:08:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c000000fb51b11f0c2170202bd515c9b72c59d0663ade36888bd031532188c1f215f454b524bf4d0518f526cb6454fdabc9536c47f7f96d45d3aea62005c9a85256ab0943d6cf4cb6405d364a4370d977d9e7305b847b3f0416415cd6b9ef1a3867035c947e1a42cd84dcd9", @ANYRES16=r2, @ANYBLOB="447928bd7000fddbdf250100000000000000022e52c0af41410000001000137564703a73797a6eb6d113"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x40080) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x40010, r0, 0x10000000) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000340)={0x0, 0xfff7, 0x1, 0x0, 0x5, 0x3ff, 0x74d9, 0x80000000, r4}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x7c00, 0xfff, 0x6, 0x4, 0x81, 0x7fffffff, 0x101, 0x80000001, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f00000001c0)={r8, @in6={{0xa, 0x4e21, 0x0, @remote, 0x2}}, 0xffffffff, 0x40, 0x1, 0x7, 0x3f1c}, &(0x7f0000000280)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) read$alg(r7, &(0x7f0000000140), 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000b63fe4), 0x1c) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) prctl$PR_SET_ENDIAN(0x14, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000, 0x1}, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) 20:08:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x2000000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x40240, 0x0) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, 0x0, 0x0, 0x100000001}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00', &(0x7f0000000340)=""/181, 0xb5) 20:08:28 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x72) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = geteuid() quotactl(0x48, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000340)="8c4875f6853f6cc9eccb8e639d2df9083e4947692de2842f149041a9ab9dec05d813d75cd2d04ab335b806a50d3f78a056d5e49a3c44") ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = getuid() r8 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r8, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r9, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x18) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000140)={0xb0, 0x0, 0x7, [{{0x5, 0x1, 0x0, 0x8001, 0x0, 0x7, {0x6, 0x5, 0x5, 0xffffffffffff587b, 0x1, 0x3, 0x4, 0xff, 0x9, 0x6, 0x0, r7, r9, 0x6, 0x200}}, {0x0, 0xffff, 0x5, 0x5, 'aead\x00'}}]}, 0xb0) r10 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x4, 0x8000) ioctl$BLKRRPART(r11, 0x125f, 0x0) bind$alg(r10, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000200)="8a3e1b150e1404fcbf31cbf2b712c0f9a4c6d4ee7b336674ed2625d2253dd9ee4188") lseek(r0, 0x20400000, 0x0) 20:08:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80, 0xa8080) ioctl$TCGETX(r1, 0x5432, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r3) pwrite64(r2, &(0x7f0000000140)="d17402d79d063f380f27590cdfb92c2d77de32fb292d60549b48bb344e2e132012d4fb3f8948ad604963b554143c1f2e36296d7a4ca25f145e2d3834709c5a2060e9bb4cde3b3701721d699dfd2bfa98d61c13a39b175f02a23f18eb5b5eca814246c9efada7a7d61c67f24b81e67a6956d50bc702ca97fd803ce2300e8e6c1f71c8f4e22e80c22d15e3c65da96980e476609065098cfc75fbbf075dd441af23fc2d69c4d7a7690e1aca4fa9a06dddf354363cef1f42a3eb9479", 0xba, 0x5) fdatasync(r1) lseek(r0, 0x20400000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000100)) 20:08:28 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="8960c642079b9db12bf107", 0xb, 0xfffffffffffffffa) lseek(r0, 0x20400001, 0x3) 20:08:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() tkill(r4, 0x1000000000013) fcntl$setownex(r3, 0xf, &(0x7f0000000000)={0x3, r4}) lseek(r0, 0x20400000, 0x0) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000140), 0x4) r5 = gettid() tkill(r5, 0x1000000000013) migrate_pages(r5, 0x5, &(0x7f00000000c0)=0x6, &(0x7f0000000100)=0x4000) 20:08:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000000140)={0xfff, "abb8538de5553a656d16814ece1e36acb6f2f83607b74c205e793f797b8bbce2", 0x2, 0x7, 0x7, 0x327dca, 0x2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) sendmsg$inet6(r3, &(0x7f0000000780)={&(0x7f00000001c0)={0xa, 0x4e20, 0xbbc5, @mcast2, 0x7}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000200)="410efad9b9a04aea9b0b25f6cea6b698cb7ee540ae74cd2cfe4f9d1fa88441c2071ebdb168f3ed53183002a453ee729a6784ede81041e33d1e4e4d608182e9c14295528a5e10f3c9b2558abc1cb9235bf5972970daf59a74d761048dd04e7c54db429da0", 0x64}, {&(0x7f0000000280)="9df5725747de5e4449ef265c7f6c9d0e00e6e6261205e0012d18e111b99459bfa4109ec8fe87ba32a81002870d41c852017398554e5ed5f5d5ed46e30b05d2ce8f6c685a747246425ce4f0a1cf1f0448b0bbd5c483fa5ea7ee7afb9e1611f495278d7ab1db9a5f876076b8e8e16393140c81ae", 0x73}, {&(0x7f0000000300)="72a3934fd20707e05927ecd31941d7e6424c85bb9f5b8d12dd98b8f7c01ed06232b3267332532a0265f9e5c06d6f35bffe9b94027eb754a57f39673e7944c5a31c3bf10906c083969ed09f604096a4fa5a30ce228c61297504a78e066c90e55b40ec68072aafe50bf647d13de780ce8b0cd9b1168cba6afa2a42c076b8ad1cbb8195bb2c09971c97091fe265f43881e29e1aa39bdd76171c30c178e6af8209d7ea9d864e993b6aa43e2d2603ee877a0b7f5deb393fc0345101db2f99b83f9bd0e74b7d8ab9aa1fa8fed1eb0f41d2dce23e9c5e5e6599983093a8d75ba8e2faa3a341e3f5d0cd23ea2177fe4e2c704e897f67f9bce0", 0xf5}, {&(0x7f0000000400)="1e78f9f8872558c8fe0a40b3049d3e1cc9012b8ed07d7a17a129958c85dabe5300b7a12c4d94cd93c9dc7c1abe44e142da10348b386b44fd38ab696ddc5e6492b42805d3dfb4f3cf01486dc6c89c09a97e1f4fa71b30bbbb1af233d8cfd41365786618493a36bfe7c39ce0101bd38a33ddea3a2fb57251ee8239cc4360c9d0d390260dd2d70fc6587e701bc0", 0x8c}, {&(0x7f00000004c0)="0b4515ddcc9caf7cc37119613a1249469165351e320214e105246021c1598fdf0b0984daa9e853d6f74984040a3c824cab877c4c74504f08fdf5419f818cc91f4445cb8d8523755b55f3424015b42985144373a84c14cfa32a5f9378a0fc06b332a4319d49b3efc059e7ec300a525039c0f921", 0x73}], 0x5, &(0x7f00000005c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x100}}, @tclass={{0x14, 0x29, 0x43, 0x7f}}, @hopopts_2292={{0x40, 0x29, 0x36, {0x3a, 0x4, [], [@ra={0x5, 0x2, 0xfffc}, @hao={0xc9, 0x10, @rand_addr="1edb4f0d7717dc6f91e091228f240986"}, @pad1, @enc_lim, @jumbo={0xc2, 0x4, 0x7}]}}}, @dstopts={{0xe8, 0x29, 0x37, {0x3c, 0x19, [], [@calipso={0x7, 0x30, {0x7, 0xa, 0x4, 0x4, [0x5115, 0x8, 0x1, 0x1, 0x5]}}, @jumbo={0xc2, 0x4, 0xff}, @pad1, @jumbo={0xc2, 0x4, 0x2}, @generic={0x5f, 0x85, "d484a2a8acfe968acb36cc75e77b420ccec4f312739977650af244ac535710625398fe632367fa95e0e46204965ec8a70f3b36f382ae228304e3b2978a4639cdaf16e4b18c2eb9218d42f359b933f51eda14d6a7572c3bf7c44986054146334030ddebaf6f4aacd0c08e3426d99d8495b14144032f55171322e4f31c174ccbbcc6aaf66d3b"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @flowinfo={{0x14, 0x29, 0xb, 0x7f}}], 0x188}, 0xb8376d01f4a6b603) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) 20:08:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ff7f0180000008003950323030302e4c96ef0000000000000009c9154a614f0400000000000000016598578760eceed1a85ca910af917b29f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d91a5881ccfff"], 0x90) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r4, r3) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x10, 0x80002, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$inet_sctp(r9, &(0x7f0000000a40)={&(0x7f0000000340)=@in6={0xa, 0x4e22, 0x5, @local, 0x8}, 0x1c, &(0x7f00000008c0)=[{&(0x7f0000000380)="b8abc9fa45d2b642bd99987d88a95da9e605c3a64be6487d543a9f0889d5d16832acba70c1e4c5e1d3c732f1830a9505f6c1e104a44f83f62ebed9d5469c379b73220459a9992dc441ac0885ec92af", 0x4f}, {&(0x7f0000000a80)="a2bcdf68927c35ac3a9a97f8a3b70cbedfd3fd529061dd8d091910ea925195c31ccc330b98a139b4ce8963a774dc7f33ff5cfb372235a3cf00a20e6bb9c4131a8f5ac841cbcbfaf2adb146d02c5cec6f2a11293bb0be5d467bf95e571fe75ec8f1165c52b48371e1f20a68d37af2bcb2086734b9d4166fc6a9693d0977dd930dbe435b174475a55656174867", 0x8c}, {&(0x7f00000006c0)="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", 0xfd}, {&(0x7f0000000500)="86e864072ac2fa30a0fbfeef2e872905506ba2a5b740703f40fd421b03bc8ee86d7d52e5f0e34947bd9673d24cac7bc58f80e7ae5c47b83f453cb26614df3069f17e444a7a9ce4fff8d7b12e9fb8bfcd051fa9f2d4a0c8af32124584e48ed69f475829d78096fa5eb40251f68dd5a80a573eb7010e032759d6064d30b34cbcebdd318501eb222f2239f361453b02642102052074f68336e0b62c8776c97de9336e1843e7feb719fafdb5c39ec772ca27aa87c6bd1cd13319437c02c489fd0a", 0xbf}, {&(0x7f00000007c0)="69e46867a6253767e51dea6d338ed7d1ac5feca85f60981e53f80a2d22c45a3f9fcb9e2f0ccdfa2c92d0ee1e1d7faac0f7f8bde884561fa367d9aabe2c1de65af75d544d8d61b2ef5d996af6659613c1886c90ff9363634db66fb1134d0ad9189e9329c2d6763602de47c0533f84162b56272c8d1ae5bbe09acd7ce6da3f073c886d9aeef7d82457de6f467c71ac9e9db8dfe1733f9c0bb7b784419cb60eed6f27a2933265b5420bf76ba2e918204b6f1e39fe0060c5a9f647a117e55c5a863e77936a2475daa94766c1c298", 0xcc}], 0x5, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0x18, 0x80}, 0x9000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r6, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000000c0)={r6, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={r6, 0x7}, &(0x7f0000000140)=0x8) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket(0x10, 0x80002, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$TIOCSETD(r13, 0x5423, &(0x7f00000004c0)=0xa) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000180)={r10, 0x1, 0x0, 0x2, 0x800}, &(0x7f00000001c0)=0x18) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x21326b79fd000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0x0, 0x2}, 0x18832, 0x0, 0x0, 0x2, 0x0, 0x6a6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/33, 0x21}], 0x1, 0x9) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) 20:08:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000140)={0x3, 0x95, "01bc49e52066ecf926b015cf56147617dff67362050ded16ab73569192316a806c3fd3147175969bd5445621577f10c25f9cc98d1eaa7e346ace5f77dc3fd3450e56c81000a3ecc57db244598d51be61bfe1ac76ab9d2f5cb3b63ab62466b3ae6a067884d8362c12e3a380d4c2e75ebd28dc7cdedd473d49aafd8326b7d8ca1cd03feab5cef0275da6ca2f953423f3f32be30b6ae6"}) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video36\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='.\x00', 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000840)='/dev/adsp#\x00', 0x96b0, 0x80001) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000880)=""/199) syz_mount_image$erofs(&(0x7f0000000100)='erofs\x00', &(0x7f0000000180)='./file0\x00', 0x20, 0x7, &(0x7f0000000700)=[{&(0x7f00000001c0)="fd726efe5280a6ee8639ea60ae630cd2832a3966a5d6439ebcadda4c9785c46de173a072a7bb6f4e36f1cfd0938b7ab19f885cca505bba94c352ef7ef477da50d6a2f2349212adfd8f56cc213f6ed2a859c1304d4449371848cd6b7c0b9e1d20a42933774a430a72d6cd3528335670207bcb54455b1452cc807f873232cc8687e5351dcc14b391576baef97d1ace381ccaf07b87bd85acd9e1b18ac31c2f976f4767158278b0e815c58e0f5ed9fcaf8b76c4c1c292517c6e9d11806a6bf98bdecd9ca147b5b2bbe240494802051bb3e41774d7c42a59b22183c1a2d0c92414e70ce9d9d1c4", 0xe5, 0x7}, {&(0x7f00000002c0)="c1bb293299dad55bd6ae6e88947689c4e68f59326b4e04cc34ea0433bfe7119cf946e93bb6be00a3252b1d2a83387a2e63ddb923e6a50e2d83bd230f5a8358d0bad2500b2ad6ec8e91cd08dc3f81e75c467a4b15b389658c45ab9d92f01ae74df8254cc7aa9180ca8d6cc943bd9071b88d16ec48b01c35694730152399ad78c037273056ff1eaf9001233b86111cb340c7165c1c27f95926", 0x98, 0x4}, {&(0x7f0000000380)="e4ca488f4974abfebbb62d250bd48076517254961abbf5a5a1b54f0c72318797687480465cbc33288d839aca4ea7499b3f6aee840c8794441f94da18aca479e28ccb4435c15fdc25b4db092144ae5eb6d334410eeff213cc223e782947a912947ae7ccc39694c3cba7be8b32ce8a8b810849b6a722bd8ef83f5c023fb1440ccf0fb54df8ebe16d57633006c9fae2c38908e9e3c87d2d18e4c4f67d07cf911e0e1b9428669e1a04d276fc49bdc3b10e9387cb33499d9d9252e1c82543a5512dc01f893eeed6d0f9b80e4b452b54", 0xcd, 0xfffffffffffffff8}, {&(0x7f0000000480)="391990d24b335a4f7ca7f11f1c9ae86f72ea83da408aced2d174fa0f45fb9512ca9f90574c71727277e1ed46cc41c7fca483c4a98121c3164a9982c15ca49966ec67df91ce632bb462a1", 0x4a, 0x2000000000000}, {&(0x7f0000000500)="ec6855409c03a30791a1ea85f0ab72d08e0ca11bdd71ce96da0fffd7dbdaa034e7a7992c2bac145852cc1bf77ca83a686c618df2a8dcd1a16d5dd8e06e9b8aa7ea510bf833d6b1aa7e3b0afea9464358a7a0f85c9ae95a04f8421ee67e508b90d971ddc3c4773b08402cc68783b50d16ece909432ac58f239dc8e0f104dd0f1ea89f8a9033eed740a9107387f3d6966910488c1269a75542f565e37873ee299036aed81cdbf1a7afe3705924d5c5edf85079ea3cd63f5e05d5c2c1083abdb6fe685ede88f6d655fdd5bdce1480180697639a29552945b5e19607bfe8b62d2224554eb2f35f3d33c11857", 0xea, 0x7fff}, {&(0x7f0000000600)="3032e67be6a86b44f76c316dfd98a7e845d35a2fccac8dae0c11548a1a00100203b85c3aca37e7a0083581ad960c141ebecf1d39e5f3f736f9310242d086de519cf910765de89b41c6f5385e688d78360d69f94e25388718cd861050dab45d8293909c4a32f0daf83e2637c9de23f54841f7da54498804c9b22b9ee565a8861656a55143803d028ba2ad37901737309868fafef9d0318dbaf3be271c8747ef489d25aed6a3033fa536539b95229bded3189472f0", 0xb4, 0x8000000000000}, {&(0x7f00000006c0)="cfe8f2e4ebeaa6f5a7ce52c77c38f6f4c14a5cadc6df2842ce52efd9edfeb4330538f0fc96126b7d6373d8d3", 0x2c, 0x74}], 0x40004, &(0x7f00000007c0)={[{@fault_injection={'fault_injection', 0x3d, 0x3}}], [{@hash='hash'}, {@dont_hash='dont_hash'}]}) 20:08:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x40) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x0, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r8, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000240)}}, 0xfffffc70) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x3) 20:08:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2, 0x1) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x5, "639337f012be62fef7e4aba8f7d6ddb430be18720696cb8dc08b875cf67e3a4d", 0x466883b3db038e08, 0x0, 0x1, 0xdb97fb, 0x10000, 0x4}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 20:08:32 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xf18acad9ce83154, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0xff, 0x0, 0x0, 0x40002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, @perf_config_ext, 0x0, 0x0, 0x10001}, 0x0, 0x0, r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x2cc46078fd000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f00000004c0)=""/156) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$nfc_llcp(r5, 0x118, 0x0, &(0x7f0000000080)=""/34, 0x22) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/15, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x10, 0x80002, 0x0) write$FUSE_IOCTL(r2, &(0x7f00000003c0)={0x20, 0x0, 0x8, {0x5fba, 0x2, 0x482, 0x363}}, 0x20) fcntl$dupfd(r6, 0x0, r7) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r9 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r9, r8) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={r11, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7, 0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f00000000c0)={r11, 0x3c, &(0x7f00000002c0)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x61}]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={r11, @in={{0x2, 0x4e23, @loopback}}, 0x239, 0x8}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000002c0)={r12, 0x51a}, &(0x7f0000000340)=0x8) 20:08:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:32 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x9, 0x0, 0x7) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x1) 20:08:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000140)="db0935a58ef09ccb64e808ba963bb08a", 0x10) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000080)={0x2, 0xffffffffffffffff, 0x1}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:32 executing program 0: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f00000000c0)={0x3af3, 0x4, [{0xa, 0x1}, {0x4}, {0xe}, {0x2}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f00000002c0)={0x3, @pix={0x7, 0x5, 0x30324c4a, 0x9, 0x5, 0xd6, 0x7, 0x7, 0x1, 0x8, 0x2, 0x3}}) name_to_handle_at(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0xe8, 0x8, "6edf4404cb144aabfe0b29ce08f2a42bc2bc3b59ff73efab304c99cba10cfdc231f73cae90b2808806eed6268ad303c5b3120e7456b41d2687c9aa81a5067c8fbd3d5c2a57b05860ef517ddfc3962603470b18f0a77608d13bc7a385029abdd92dcf00ad1f2f463b60a1b6b9cf96f6b74ce978ed7b420cdfeb3435455da680f45ae6b79c0cf94c504709041ddc4cec07500ce81cfb5f50cb1d12216f53ed0c81d2234e603519a70ae20bf776b58a796d0d0ca15b7c732686b804248598a3ea7f58b975c6e30a022fafbd5d226a909bfc98bd5c14f9ec1879be6cf504b9e2c782"}, &(0x7f0000000280), 0x400) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x10, 0x0) 20:08:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f115bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff8e9e8ececfab057d722b13b67f6bc146ca7a1241f2076e8a81e5fb30a1335b9e1b52ed29d32ee5db8eb342a4bb5a045905b4af7d30f72a38b5b0dd66729e0ee8d9d043653c4f78e79bc602c4d5b18d0a5371a106eb333e35dbdb1fdc59b7b2a43c826be0ee03b0be671fca205d70840fe35cd1249d23770d283bb630d622bfee625e33b7552876c0ea3d8092995a9cb3cecf44815c1a46ff163f1820629f476ee465f31b029a5e08214abb1a9ed14bdc37e5ed3d3bd4850496ac08c3b3c2e19979613aca29f3d55076cef98f39b7c32216240af4da3dd5249db307bc1ad249a7f1345ffc2393fa009b39e96dc949d8a149bd7c523745f7e688d424f19397f20d38254c16f01af9bd"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fff, 0x480440) 20:08:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="02070003020000000000000000000000437adfb1eff6a84a8edbaacae3a40a9d8230057d4ae59af95d78a0b0d3acc96aa828e8297d3775dcfb137e8e7d0829dd5bd8bc2d140def68725c1f8898c090b67ddc2ed945f0f5afdd1ec7cfa2d469c6b94a284ced76c0c80b21805911ce9557564c3e4d6b7100cfd1f9960029027b02c1042a6bb1edb0c901f78d475f880b1bdd0a54eaa3111bf748489bed991f9e8eba7883c86d3216897e088715e4159ea897a6cdf9c45d9c93aa5fdbfc43bfc7cddfe9fb74dbe1108634b9ad72a47447d0ca4f735f8ddc7781c37e1a86ded7c332b355e8111dafa773f00381c29432e48da14f1bc304786e78d6fc153e575f51f70ee15ff90e13e521d01efb4e3e0c4c1040a1810399882ca5f52fb1dd833678e5236c135ce400353b5fecd47bb211b20aaa64050fc711a46085f662b1ce29a46f1f3476d32a36fcf675010cf969f83dd980d3745de80eb59510b7701b706ec868aae1b9652e72492b504e19659f1a3ba6b97b516e594914253278c1f6c7fd18be684a854f42a7558c8d8f3459fe374dcf8496e2f73df9318dd5cde0dc237c816909408c9288e4e5ab686fab41bd1c1c69f0134900a6e5b627d7358de02ecb67c8b4c3e85039ab68b8acc15bafa9d7e0db69bfeb1411ab8bedc185d5328cc7cbe653b859306e1e5711"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x3f00000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x5, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@gettaction={0xbc, 0x32, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x9}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x5}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x64, 0x1, [{0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x16, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x8, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0xecb0}}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4008000}, 0x80) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000280)="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") 20:08:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000140)=0x4) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = gettid() r9 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x10001, 0x725505) ioctl$PPPIOCGUNIT(r9, 0x80047456, &(0x7f0000000280)) tkill(r8, 0x1000000000013) write$cgroup_pid(r7, &(0x7f0000000180)=r8, 0x12) 20:08:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x29, 0x0, 0x4000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000000)) lseek(r0, 0x20400000, 0x0) 20:08:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:33 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000180)={r3, 0x0, 0x4, 0xffffffff, 0x2}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r6, 0x9, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket(0x10, 0x80002, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000040)='system_u:object_r:lirc_device_t:s0\x00', 0x23) openat(r10, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1) bind$nfc_llcp(r9, &(0x7f0000001280)={0x27, 0x400, 0x2, 0x7, 0x22, 0x3, "9f676c87a5627cf4847325bed1e79d541bed5e1f54fbd3faadf3753fc2f25f536ddaef4b3eb93d2a074fc89d56a89565708b696ba98ea2a89bb1fc35b979c5", 0x8}, 0x2cb) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket(0x10, 0x80002, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket(0x10, 0x80002, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPCONNADD(r13, 0x400448c8, &(0x7f00000011c0)={r16, r4, 0x1, 0x1000, &(0x7f00000001c0)="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", 0xb2, 0x0, 0xfffa, 0x1, 0x1, 0x5, 0x6, 'syz1\x00'}) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x54b) lseek(r4, 0x20400000, 0x0) 20:08:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1800e0, 0x0) 20:08:33 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744eceed1a85ca910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78a9b1338346c4aa5691432b91d910f931ccfff"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c, 0x5, 0x0, {0x0, 0x0, 0x0, 0x7}}, 0x33) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x40, 0x155) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0xc6a, 0x7fff}}, 0x30) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) r4 = accept4$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000140)=0x1c, 0x80800) dup2(r4, r2) 20:08:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) 20:08:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xffffffff, 0x45b5}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x4000000000000000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 20:08:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_RESET(r0, 0x5514) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000000)={0x0, 0x0, {0x9dd, 0x6, 0x80000000, 0x8}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) lseek(r7, 0x9, 0x2) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket(0x10, 0x80002, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r11, 0x28, 0x6, &(0x7f0000000180)={0x77359400}, 0x10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket(0x10, 0x80002, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$TIPC_CONN_TIMEOUT(r14, 0x10f, 0x82, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 20:08:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 20:08:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = accept4(r0, &(0x7f0000000280), &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={0x0, 0xfff, 0x10, 0x4, 0xfff}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e21, @rand_addr=0x8}}}, &(0x7f0000000480)=0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0x4f64491ca6ef3d80, 0x2, 0x3) fcntl$dupfd(r6, 0x0, r7) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xffffffff, @loopback, 0x1ff}}, [0x1, 0x20, 0x1, 0x5d8, 0x7, 0x0, 0x9, 0x7ff, 0x2, 0x6, 0x0, 0x5, 0x6, 0x401, 0x9]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={r8, 0x5, 0x8, 0x6, 0x6, 0xfffffff9}, 0x14) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket(0x10, 0x80002, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket(0x10, 0x80002, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) setsockopt$inet6_dccp_int(r14, 0x21, 0x1, &(0x7f00000004c0)=0x800, 0x4) ioctl$PPPIOCSDEBUG(r11, 0x40047440, &(0x7f0000000000)=0x8001) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = socket(0x10, 0x80002, 0x0) r17 = fcntl$dupfd(r15, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) ioctl$GIO_FONT(r17, 0x4b60, &(0x7f0000000240)=""/19) lseek(r0, 0x20400000, 0x0) 20:08:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket(0x10, 0x80002, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0xffffc000, 0x0) 20:08:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000000)={0x5, 0x0, 0x8, 0xc3}, 0x10) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x20400000, 0x0) 20:08:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) sendfile(r2, r4, 0x0, 0x2) 20:08:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x20400000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x81, 0x0, 0x5, 0x101, 0x80}, 0xc) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000000)) 20:08:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r1, 0x20400000, 0x0) [ 1321.062363][ T1083] INFO: task syz-executor.4:28484 can't die for more than 143 seconds. [ 1321.070645][ T1083] syz-executor.4 D29192 28484 8813 0x00000004 [ 1321.078259][ T1083] Call Trace: [ 1321.082703][ T1083] __schedule+0x8e1/0x1f30 [ 1321.087122][ T1083] ? __sched_text_start+0x8/0x8 [ 1321.091955][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.099203][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.104483][ T1083] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1321.109805][ T1083] schedule+0xdc/0x2b0 [ 1321.113978][ T1083] rwsem_down_write_slowpath+0x706/0xf80 [ 1321.119688][ T1083] ? up_write+0x490/0x490 [ 1321.124211][ T1083] ? mark_held_locks+0xf0/0xf0 [ 1321.129056][ T1083] ? lock_acquire+0x190/0x410 [ 1321.133892][ T1083] ? path_openat+0x1484/0x4710 [ 1321.138661][ T1083] down_write+0x13c/0x150 [ 1321.147399][ T1083] ? down_write+0x13c/0x150 [ 1321.151912][ T1083] ? down_write_killable+0x170/0x170 [ 1321.157246][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.163548][ T1083] ? __mnt_want_write+0x1f1/0x2f0 [ 1321.169528][ T1083] path_openat+0x1484/0x4710 [ 1321.174180][ T1083] ? save_stack+0x23/0x90 [ 1321.178521][ T1083] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1321.184369][ T1083] ? kasan_slab_alloc+0xf/0x20 [ 1321.189130][ T1083] ? kmem_cache_alloc+0x121/0x710 [ 1321.194204][ T1083] ? getname_flags+0xd6/0x5b0 [ 1321.198897][ T1083] ? getname+0x1a/0x20 [ 1321.203031][ T1083] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1321.209279][ T1083] ? __lockdep_free_key_range+0x120/0x120 [ 1321.215054][ T1083] ? __alloc_fd+0x487/0x620 [ 1321.219996][ T1083] do_filp_open+0x1a1/0x280 [ 1321.224610][ T1083] ? may_open_dev+0x100/0x100 [ 1321.229325][ T1083] ? do_raw_spin_unlock+0x178/0x270 [ 1321.234613][ T1083] do_sys_open+0x3fe/0x5d0 [ 1321.239027][ T1083] ? filp_open+0x80/0x80 [ 1321.243336][ T1083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1321.248805][ T1083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1321.256556][ T1083] ? do_syscall_64+0x26/0x790 [ 1321.261269][ T1083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.267390][ T1083] ? do_syscall_64+0x26/0x790 [ 1321.272123][ T1083] __x64_sys_openat+0x9d/0x100 [ 1321.276895][ T1083] do_syscall_64+0xfa/0x790 [ 1321.281410][ T1083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.287436][ T1083] RIP: 0033:0x45a639 [ 1321.291348][ T1083] Code: Bad RIP value. [ 1321.295483][ T1083] RSP: 002b:00007f7f6e791c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1321.303968][ T1083] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a639 [ 1321.311935][ T1083] RDX: 0000000000000040 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 1321.319949][ T1083] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1321.327948][ T1083] R10: 0000000000000155 R11: 0000000000000246 R12: 00007f7f6e7926d4 [ 1321.335985][ T1083] R13: 00000000004c72f9 R14: 00000000004dcd20 R15: 00000000ffffffff [ 1321.344030][ T1083] INFO: task syz-executor.4:28484 blocked for more than 143 seconds. [ 1321.352139][ T1083] Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1321.359157][ T1083] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1321.369116][ T1083] syz-executor.4 D29192 28484 8813 0x00000004 [ 1321.375509][ T1083] Call Trace: [ 1321.378798][ T1083] __schedule+0x8e1/0x1f30 [ 1321.383282][ T1083] ? __sched_text_start+0x8/0x8 [ 1321.388127][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.393370][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.398587][ T1083] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1321.403970][ T1083] schedule+0xdc/0x2b0 [ 1321.408075][ T1083] rwsem_down_write_slowpath+0x706/0xf80 [ 1321.413788][ T1083] ? up_write+0x490/0x490 [ 1321.418147][ T1083] ? mark_held_locks+0xf0/0xf0 [ 1321.422989][ T1083] ? lock_acquire+0x190/0x410 [ 1321.427669][ T1083] ? path_openat+0x1484/0x4710 [ 1321.432519][ T1083] down_write+0x13c/0x150 [ 1321.436859][ T1083] ? down_write+0x13c/0x150 [ 1321.441370][ T1083] ? down_write_killable+0x170/0x170 [ 1321.446701][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.453010][ T1083] ? __mnt_want_write+0x1f1/0x2f0 [ 1321.458038][ T1083] path_openat+0x1484/0x4710 [ 1321.462920][ T1083] ? save_stack+0x23/0x90 [ 1321.467313][ T1083] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1321.475188][ T1083] ? kasan_slab_alloc+0xf/0x20 [ 1321.479961][ T1083] ? kmem_cache_alloc+0x121/0x710 [ 1321.485065][ T1083] ? getname_flags+0xd6/0x5b0 [ 1321.489736][ T1083] ? getname+0x1a/0x20 [ 1321.493866][ T1083] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1321.499241][ T1083] ? __lockdep_free_key_range+0x120/0x120 [ 1321.505024][ T1083] ? __alloc_fd+0x487/0x620 [ 1321.509533][ T1083] do_filp_open+0x1a1/0x280 [ 1321.514084][ T1083] ? may_open_dev+0x100/0x100 [ 1321.518779][ T1083] ? do_raw_spin_unlock+0x178/0x270 [ 1321.524048][ T1083] do_sys_open+0x3fe/0x5d0 [ 1321.528465][ T1083] ? filp_open+0x80/0x80 [ 1321.532769][ T1083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1321.538230][ T1083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1321.543881][ T1083] ? do_syscall_64+0x26/0x790 [ 1321.548558][ T1083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.554757][ T1083] ? do_syscall_64+0x26/0x790 [ 1321.559438][ T1083] __x64_sys_openat+0x9d/0x100 [ 1321.564271][ T1083] do_syscall_64+0xfa/0x790 [ 1321.568773][ T1083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.574709][ T1083] RIP: 0033:0x45a639 [ 1321.578625][ T1083] Code: Bad RIP value. [ 1321.584691][ T1083] RSP: 002b:00007f7f6e791c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1321.593248][ T1083] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a639 [ 1321.601217][ T1083] RDX: 0000000000000040 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 1321.609237][ T1083] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1321.617238][ T1083] R10: 0000000000000155 R11: 0000000000000246 R12: 00007f7f6e7926d4 [ 1321.625857][ T1083] R13: 00000000004c72f9 R14: 00000000004dcd20 R15: 00000000ffffffff [ 1321.633923][ T1083] INFO: task syz-executor.4:29185 can't die for more than 143 seconds. [ 1321.642193][ T1083] syz-executor.4 D29712 29185 8813 0x00000004 [ 1321.648564][ T1083] Call Trace: [ 1321.651851][ T1083] __schedule+0x8e1/0x1f30 [ 1321.656329][ T1083] ? __sched_text_start+0x8/0x8 [ 1321.661187][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.666428][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.671632][ T1083] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1321.676964][ T1083] schedule+0xdc/0x2b0 [ 1321.681050][ T1083] rwsem_down_write_slowpath+0x706/0xf80 [ 1321.686729][ T1083] ? up_write+0x490/0x490 [ 1321.691068][ T1083] ? mark_held_locks+0xf0/0xf0 [ 1321.697850][ T1083] ? lock_acquire+0x190/0x410 [ 1321.702659][ T1083] ? filename_create+0x17c/0x4f0 [ 1321.707611][ T1083] down_write_nested+0x140/0x160 [ 1321.712590][ T1083] ? down_write_nested+0x140/0x160 [ 1321.717705][ T1083] ? rwsem_down_write_slowpath+0xf80/0xf80 [ 1321.723555][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.729793][ T1083] ? __mnt_want_write+0x1f1/0x2f0 [ 1321.734875][ T1083] filename_create+0x17c/0x4f0 [ 1321.739634][ T1083] ? kern_path_mountpoint+0x40/0x40 [ 1321.744860][ T1083] ? strncpy_from_user+0x2b4/0x400 [ 1321.749973][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.756242][ T1083] ? getname_flags+0x277/0x5b0 [ 1321.761439][ T1083] do_mknodat+0x1a4/0x480 [ 1321.765803][ T1083] ? do_file_open_root+0x3a0/0x3a0 [ 1321.770925][ T1083] ? do_syscall_64+0x26/0x790 [ 1321.775649][ T1083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.781713][ T1083] ? do_syscall_64+0x26/0x790 [ 1321.786449][ T1083] __x64_sys_mknod+0x7b/0xb0 [ 1321.791042][ T1083] do_syscall_64+0xfa/0x790 [ 1321.795606][ T1083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.801495][ T1083] RIP: 0033:0x45a639 [ 1321.806717][ T1083] Code: Bad RIP value. [ 1321.810778][ T1083] RSP: 002b:00007f7f6e770c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1321.819219][ T1083] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 1321.827236][ T1083] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1321.835283][ T1083] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1321.843294][ T1083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7716d4 [ 1321.851270][ T1083] R13: 00000000004c7033 R14: 00000000004dc780 R15: 00000000ffffffff [ 1321.859302][ T1083] INFO: task syz-executor.4:29185 blocked for more than 144 seconds. [ 1321.867388][ T1083] Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1321.874446][ T1083] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1321.883160][ T1083] syz-executor.4 D29712 29185 8813 0x00000004 [ 1321.889507][ T1083] Call Trace: [ 1321.892842][ T1083] __schedule+0x8e1/0x1f30 [ 1321.897264][ T1083] ? __sched_text_start+0x8/0x8 [ 1321.902150][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.907348][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1321.914649][ T1083] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1321.920206][ T1083] schedule+0xdc/0x2b0 [ 1321.924404][ T1083] rwsem_down_write_slowpath+0x706/0xf80 [ 1321.930043][ T1083] ? up_write+0x490/0x490 [ 1321.934454][ T1083] ? mark_held_locks+0xf0/0xf0 [ 1321.939230][ T1083] ? lock_acquire+0x190/0x410 [ 1321.943956][ T1083] ? filename_create+0x17c/0x4f0 [ 1321.948899][ T1083] down_write_nested+0x140/0x160 [ 1321.953883][ T1083] ? down_write_nested+0x140/0x160 [ 1321.959007][ T1083] ? rwsem_down_write_slowpath+0xf80/0xf80 [ 1321.964842][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.971080][ T1083] ? __mnt_want_write+0x1f1/0x2f0 [ 1321.976186][ T1083] filename_create+0x17c/0x4f0 [ 1321.980949][ T1083] ? kern_path_mountpoint+0x40/0x40 [ 1321.986183][ T1083] ? strncpy_from_user+0x2b4/0x400 [ 1321.991315][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.997682][ T1083] ? getname_flags+0x277/0x5b0 [ 1322.002497][ T1083] do_mknodat+0x1a4/0x480 [ 1322.006825][ T1083] ? do_file_open_root+0x3a0/0x3a0 [ 1322.011919][ T1083] ? do_syscall_64+0x26/0x790 [ 1322.016634][ T1083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.024809][ T1083] ? do_syscall_64+0x26/0x790 [ 1322.029504][ T1083] __x64_sys_mknod+0x7b/0xb0 [ 1322.034148][ T1083] do_syscall_64+0xfa/0x790 [ 1322.038650][ T1083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.044581][ T1083] RIP: 0033:0x45a639 [ 1322.048494][ T1083] Code: Bad RIP value. [ 1322.052594][ T1083] RSP: 002b:00007f7f6e770c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1322.061016][ T1083] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 1322.069023][ T1083] RDX: 0000000000000708 RSI: 00000000ffffc000 RDI: 0000000020000000 [ 1322.077054][ T1083] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1322.085055][ T1083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7716d4 [ 1322.093061][ T1083] R13: 00000000004c7033 R14: 00000000004dc780 R15: 00000000ffffffff [ 1322.101055][ T1083] INFO: task syz-executor.4:29186 can't die for more than 144 seconds. [ 1322.109389][ T1083] syz-executor.4 D28184 29186 8813 0x00004004 [ 1322.115762][ T1083] Call Trace: [ 1322.119048][ T1083] __schedule+0x8e1/0x1f30 [ 1322.123563][ T1083] ? __sched_text_start+0x8/0x8 [ 1322.128429][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1322.135776][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1322.140988][ T1083] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1322.146363][ T1083] schedule+0xdc/0x2b0 [ 1322.150449][ T1083] rwsem_down_write_slowpath+0x706/0xf80 [ 1322.156156][ T1083] ? up_write+0x490/0x490 [ 1322.160487][ T1083] ? mark_held_locks+0xf0/0xf0 [ 1322.165279][ T1083] ? perf_trace_lock+0xeb/0x4c0 [ 1322.170151][ T1083] ? lock_acquire+0x190/0x410 [ 1322.174868][ T1083] ? lock_mount+0x8c/0x2e0 [ 1322.179312][ T1083] down_write+0x13c/0x150 [ 1322.183686][ T1083] ? down_write+0x13c/0x150 [ 1322.188204][ T1083] ? down_write_killable+0x170/0x170 [ 1322.193532][ T1083] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1322.199248][ T1083] ? mnt_warn_timestamp_expiry+0x127/0x300 [ 1322.205086][ T1083] lock_mount+0x8c/0x2e0 [ 1322.209331][ T1083] do_add_mount+0x27/0x380 [ 1322.213804][ T1083] do_mount+0x1701/0x1b50 [ 1322.218129][ T1083] ? copy_mount_string+0x40/0x40 [ 1322.223119][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1322.229352][ T1083] ? copy_mount_options+0x2e8/0x3f0 [ 1322.234614][ T1083] ksys_mount+0xdb/0x150 [ 1322.238848][ T1083] __x64_sys_mount+0xbe/0x150 [ 1322.245143][ T1083] do_syscall_64+0xfa/0x790 [ 1322.249647][ T1083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.255582][ T1083] RIP: 0033:0x45a639 [ 1322.259483][ T1083] Code: Bad RIP value. [ 1322.263594][ T1083] RSP: 002b:00007f7f6e74fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1322.272047][ T1083] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a639 [ 1322.280024][ T1083] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 1322.288040][ T1083] RBP: 000000000075c118 R08: 00000000200005c0 R09: 0000000000000000 [ 1322.296091][ T1083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7506d4 [ 1322.304132][ T1083] R13: 00000000004c7138 R14: 00000000004dc960 R15: 00000000ffffffff [ 1322.312170][ T1083] INFO: task syz-executor.4:29186 blocked for more than 144 seconds. [ 1322.320233][ T1083] Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1322.327284][ T1083] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1322.335996][ T1083] syz-executor.4 D28184 29186 8813 0x00004004 [ 1322.342388][ T1083] Call Trace: [ 1322.345693][ T1083] __schedule+0x8e1/0x1f30 [ 1322.350093][ T1083] ? __sched_text_start+0x8/0x8 [ 1322.357018][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1322.362280][ T1083] ? _raw_spin_unlock_irq+0x23/0x80 [ 1322.367643][ T1083] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1322.373013][ T1083] schedule+0xdc/0x2b0 [ 1322.377108][ T1083] rwsem_down_write_slowpath+0x706/0xf80 [ 1322.382803][ T1083] ? up_write+0x490/0x490 [ 1322.387151][ T1083] ? mark_held_locks+0xf0/0xf0 [ 1322.391897][ T1083] ? perf_trace_lock+0xeb/0x4c0 [ 1322.396799][ T1083] ? lock_acquire+0x190/0x410 [ 1322.401486][ T1083] ? lock_mount+0x8c/0x2e0 [ 1322.405947][ T1083] down_write+0x13c/0x150 [ 1322.410276][ T1083] ? down_write+0x13c/0x150 [ 1322.414837][ T1083] ? down_write_killable+0x170/0x170 [ 1322.420134][ T1083] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1322.425914][ T1083] ? mnt_warn_timestamp_expiry+0x127/0x300 [ 1322.431913][ T1083] lock_mount+0x8c/0x2e0 [ 1322.436227][ T1083] do_add_mount+0x27/0x380 [ 1322.440640][ T1083] do_mount+0x1701/0x1b50 [ 1322.445008][ T1083] ? copy_mount_string+0x40/0x40 [ 1322.449953][ T1083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1322.456303][ T1083] ? copy_mount_options+0x2e8/0x3f0 [ 1322.461518][ T1083] ksys_mount+0xdb/0x150 [ 1322.467100][ T1083] __x64_sys_mount+0xbe/0x150 [ 1322.471802][ T1083] do_syscall_64+0xfa/0x790 [ 1322.476448][ T1083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.482396][ T1083] RIP: 0033:0x45a639 [ 1322.486314][ T1083] Code: Bad RIP value. [ 1322.490362][ T1083] RSP: 002b:00007f7f6e74fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1322.498817][ T1083] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a639 [ 1322.506821][ T1083] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 1322.515028][ T1083] RBP: 000000000075c118 R08: 00000000200005c0 R09: 0000000000000000 [ 1322.523046][ T1083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f6e7506d4 [ 1322.531017][ T1083] R13: 00000000004c7138 R14: 00000000004dc960 R15: 00000000ffffffff [ 1322.539057][ T1083] [ 1322.539057][ T1083] Showing all locks held in the system: [ 1322.546806][ T1083] 1 lock held by khungtaskd/1083: [ 1322.551801][ T1083] #0: ffffffff88fabc00 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 1322.561163][ T1083] 2 locks held by rsyslogd/8670: [ 1322.566126][ T1083] #0: ffff8880a59abba0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1322.576786][ T1083] #1: ffff8880ae837358 (&rq->lock){-.-.}, at: __schedule+0x232/0x1f30 [ 1322.585344][ T1083] 2 locks held by getty/8760: [ 1322.590008][ T1083] #0: ffff88809b502090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.598980][ T1083] #1: ffffc90005f672e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.608651][ T1083] 2 locks held by getty/8761: [ 1322.613367][ T1083] #0: ffff8880960bb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.622367][ T1083] #1: ffffc90005f512e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.631924][ T1083] 2 locks held by getty/8762: [ 1322.636637][ T1083] #0: ffff88808e05e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.645717][ T1083] #1: ffffc90005f452e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.655320][ T1083] 2 locks held by getty/8763: [ 1322.659988][ T1083] #0: ffff8880989ac090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.668962][ T1083] #1: ffffc90005f492e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.678549][ T1083] 2 locks held by getty/8764: [ 1322.684961][ T1083] #0: ffff888098c3a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.693965][ T1083] #1: ffffc90005f612e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.703568][ T1083] 2 locks held by getty/8765: [ 1322.708229][ T1083] #0: ffff888099863090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.717203][ T1083] #1: ffffc90005f6b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.726800][ T1083] 2 locks held by getty/8766: [ 1322.731448][ T1083] #0: ffff88808fb2e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1322.740426][ T1083] #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 1322.750156][ T1083] 2 locks held by syz-executor.4/28393: [ 1322.755744][ T1083] #0: ffff88805f018428 (sb_writers#19){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 1322.764482][ T1083] #1: ffff888093e4cc90 (&sb->s_type->i_mutex_key#27/1){+.+.}, at: filename_create+0x17c/0x4f0 [ 1322.774866][ T1083] 2 locks held by syz-executor.4/28484: [ 1322.780403][ T1083] #0: ffff88805f018428 (sb_writers#19){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 1322.789119][ T1083] #1: ffff888093e4cc90 (&sb->s_type->i_mutex_key#28){++++}, at: path_openat+0x1484/0x4710 [ 1322.800253][ T1083] 2 locks held by syz-executor.4/29185: [ 1322.805819][ T1083] #0: ffff88805f018428 (sb_writers#19){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 1322.814548][ T1083] #1: ffff888093e4cc90 (&sb->s_type->i_mutex_key#27/1){+.+.}, at: filename_create+0x17c/0x4f0 [ 1322.824928][ T1083] 1 lock held by syz-executor.4/29186: [ 1322.830369][ T1083] #0: ffff888093e4cc90 (&sb->s_type->i_mutex_key#28){++++}, at: lock_mount+0x8c/0x2e0 [ 1322.840054][ T1083] [ 1322.842419][ T1083] ============================================= [ 1322.842419][ T1083] [ 1322.851615][ T1083] NMI backtrace for cpu 1 [ 1322.855988][ T1083] CPU: 1 PID: 1083 Comm: khungtaskd Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1322.865441][ T1083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.875476][ T1083] Call Trace: [ 1322.878760][ T1083] dump_stack+0x197/0x210 [ 1322.883089][ T1083] nmi_cpu_backtrace.cold+0x70/0xb2 [ 1322.888304][ T1083] ? vprintk_func+0x86/0x189 [ 1322.892894][ T1083] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1322.898515][ T1083] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 1322.904476][ T1083] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1322.910346][ T1083] watchdog+0xc8f/0x1350 [ 1322.914583][ T1083] kthread+0x361/0x430 [ 1322.918639][ T1083] ? reset_hung_task_detector+0x30/0x30 [ 1322.924172][ T1083] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 1322.929873][ T1083] ret_from_fork+0x24/0x30 [ 1322.934427][ T1083] Sending NMI from CPU 1 to CPUs 0: [ 1322.939702][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 1322.942458][ T1083] Kernel panic - not syncing: hung_task: blocked tasks [ 1322.954786][ T1083] CPU: 1 PID: 1083 Comm: khungtaskd Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 1322.964325][ T1083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.974364][ T1083] Call Trace: [ 1322.977661][ T1083] dump_stack+0x197/0x210 [ 1322.981978][ T1083] panic+0x2e3/0x75c [ 1322.985860][ T1083] ? add_taint.cold+0x16/0x16 [ 1322.990525][ T1083] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1322.996148][ T1083] ? ___preempt_schedule+0x16/0x18 [ 1323.001250][ T1083] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 1323.007387][ T1083] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 1323.013529][ T1083] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 1323.019669][ T1083] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 1323.025804][ T1083] watchdog+0xca0/0x1350 [ 1323.030031][ T1083] kthread+0x361/0x430 [ 1323.034084][ T1083] ? reset_hung_task_detector+0x30/0x30 [ 1323.039616][ T1083] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 1323.045317][ T1083] ret_from_fork+0x24/0x30 [ 1323.051251][ T1083] Kernel Offset: disabled [ 1323.055588][ T1083] Rebooting in 86400 seconds..