l$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:03 executing program 2: socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:03 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:03 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:04 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:04 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:04 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:04 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) 12:14:04 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:04 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:04 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:04 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:04 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:04 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:04 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:04 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) 12:14:04 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:14:04 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:14:04 executing program 4: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) 12:14:04 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) 12:14:04 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:05 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:14:05 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) 12:14:05 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:05 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:05 executing program 4: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:05 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) 12:14:05 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 12:14:05 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 12:14:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:05 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 12:14:05 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:05 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) 12:14:05 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) 12:14:05 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 12:14:05 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 12:14:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:05 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:05 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 12:14:06 executing program 4: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 12:14:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 12:14:06 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 12:14:06 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 12:14:06 executing program 4: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 12:14:06 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 12:14:06 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 4: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) 12:14:06 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) 12:14:06 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) 12:14:06 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:06 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0x11, 0x0, 0x300) 12:14:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0x11, 0x0, 0x300) 12:14:07 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0x11, 0x0, 0x300) 12:14:07 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) socket$kcm(0x11, 0x0, 0x300) 12:14:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, &(0x7f0000001980)={[{@nls={'nls', 0x3d, 'cp949'}}, {@nobarrier='nobarrier'}, {@umask={'umask', 0x3d, 0xffffffff}}]}) 12:14:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 12:14:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2073.857374] hfsplus: umask requires a value [ 2073.861802] hfsplus: unable to parse mount options 12:14:09 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 0: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 4: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 0: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:09 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 0: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 3: connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:12 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 1: clone(0x202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x80000004e23, @loopback}, 0x10) 12:14:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:15 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:16 executing program 4: clone(0x202102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x80000004e23, @loopback}, 0x10) 12:14:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:17 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:17 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) 12:14:17 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1f, 0x2) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x9) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000100)={0x4, 0x4, [0x5]}) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') memfd_create(&(0x7f0000000040)='#{--vboxnet1\x00', 0x5) 12:14:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:17 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:18 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:18 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) 12:14:18 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) dup(0xffffffffffffffff) 12:14:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) 12:14:18 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:18 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(r0, 0x100) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0xffffffffe3c1c9ec, 0x3ff}, 'port1\x00', 0x0, 0x120848, 0x401, 0x10000, 0x7, 0x8, 0x6, 0x0, 0x2, 0x1}) 12:14:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(r0, 0x100) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0xffffffffe3c1c9ec, 0x3ff}, 'port1\x00', 0x0, 0x120848, 0x401, 0x10000, 0x7, 0x8, 0x6, 0x0, 0x2, 0x1}) 12:14:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x41, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xf7}, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f00000001c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2800, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffff9c, 0x112, 0xa, &(0x7f0000000000)=0x775, 0x4) 12:14:19 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:19 executing program 2 (fault-call:11 fault-nth:0): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(r0, 0x100) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0xffffffffe3c1c9ec, 0x3ff}, 'port1\x00', 0x0, 0x120848, 0x401, 0x10000, 0x7, 0x8, 0x6, 0x0, 0x2, 0x1}) [ 2084.153649] FAULT_INJECTION: forcing a failure. [ 2084.153649] name failslab, interval 1, probability 0, space 0, times 0 12:14:19 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) [ 2084.245990] CPU: 0 PID: 26165 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2084.253319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2084.262687] Call Trace: [ 2084.265316] dump_stack+0x172/0x1f0 [ 2084.268968] should_fail.cold+0xa/0x1b [ 2084.272876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2084.277979] ? lock_downgrade+0x810/0x810 [ 2084.282132] ? ___might_sleep+0x163/0x280 [ 2084.286300] __should_failslab+0x121/0x190 [ 2084.290546] should_failslab+0x9/0x14 [ 2084.294363] kmem_cache_alloc_trace+0x2d1/0x760 [ 2084.299034] ? retint_kernel+0x2d/0x2d [ 2084.302932] loop_add+0x51/0x8d0 [ 2084.306338] loop_control_ioctl+0x165/0x360 [ 2084.310661] ? loop_add+0x8d0/0x8d0 [ 2084.314301] ? __fget+0x340/0x540 [ 2084.317764] ? loop_add+0x8d0/0x8d0 [ 2084.321401] do_vfs_ioctl+0xd6e/0x1390 [ 2084.325315] ? ioctl_preallocate+0x210/0x210 [ 2084.329731] ? __fget+0x367/0x540 [ 2084.333197] ? iterate_fd+0x360/0x360 [ 2084.337011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2084.342570] ? fput+0x128/0x1a0 [ 2084.345868] ? security_file_ioctl+0x93/0xc0 [ 2084.350298] ksys_ioctl+0xab/0xd0 [ 2084.353757] __x64_sys_ioctl+0x73/0xb0 [ 2084.357651] do_syscall_64+0x103/0x610 [ 2084.361566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2084.366759] RIP: 0033:0x457e29 [ 2084.369952] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2084.388852] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:14:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:19 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2084.396573] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2084.403851] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2084.411121] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2084.418387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2084.425648] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:19 executing program 2 (fault-call:11 fault-nth:1): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2084.627970] FAULT_INJECTION: forcing a failure. [ 2084.627970] name failslab, interval 1, probability 0, space 0, times 0 [ 2084.676893] CPU: 1 PID: 26178 Comm: syz-executor.4 Not tainted 5.0.0-rc8+ #89 [ 2084.684202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2084.693547] Call Trace: [ 2084.696145] dump_stack+0x172/0x1f0 [ 2084.699788] should_fail.cold+0xa/0x1b [ 2084.703698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2084.708825] ? lock_downgrade+0x810/0x810 [ 2084.713006] ? ___might_sleep+0x163/0x280 [ 2084.713029] __should_failslab+0x121/0x190 [ 2084.713047] should_failslab+0x9/0x14 [ 2084.713061] kmem_cache_alloc+0x2b2/0x6f0 [ 2084.713074] ? mark_held_locks+0x100/0x100 [ 2084.713087] ? __lock_acquire+0x53b/0x4700 [ 2084.713109] __d_alloc+0x2e/0x8c0 [ 2084.721460] ? __d_lookup+0x40c/0x760 [ 2084.721479] d_alloc+0x4d/0x2b0 [ 2084.721499] d_alloc_parallel+0xf4/0x1bc0 [ 2084.721513] ? lock_downgrade+0x810/0x810 [ 2084.721531] ? kasan_check_read+0x11/0x20 [ 2084.721561] ? __d_lookup+0x433/0x760 [ 2084.721578] ? __d_lookup_rcu+0x6c0/0x6c0 [ 2084.721595] ? lockdep_init_map+0x10c/0x5b0 12:14:20 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:20 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x41, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xf7}, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f00000001c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2800, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffff9c, 0x112, 0xa, &(0x7f0000000000)=0x775, 0x4) [ 2084.729518] ? lockdep_init_map+0x10c/0x5b0 [ 2084.729539] proc_fill_cache+0x317/0x4f0 [ 2084.729556] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2084.729571] ? proc_task_lookup+0x3a0/0x3a0 [ 2084.729586] ? pointer+0x910/0x910 [ 2084.729604] ? find_held_lock+0x35/0x130 [ 2084.738062] ? snprintf+0xbb/0xf0 [ 2084.738082] ? lock_downgrade+0x810/0x810 [ 2084.738099] ? kasan_check_read+0x11/0x20 [ 2084.738115] proc_readfd_common+0x655/0xc00 [ 2084.745332] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2084.745351] ? proc_lookupfdinfo+0x30/0x30 [ 2084.745365] ? lock_acquire+0x16f/0x3f0 [ 2084.745380] ? do_renameat2+0x730/0xc40 [ 2084.745401] proc_readfdinfo+0x25/0x30 [ 2084.752807] iterate_dir+0x489/0x5f0 [ 2084.752828] ksys_getdents64+0x187/0x2e0 [ 2084.752843] ? __ia32_sys_getdents+0x350/0x350 [ 2084.752857] ? ksys_write+0x166/0x1f0 [ 2084.752873] ? iterate_dir+0x5f0/0x5f0 [ 2084.761143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2084.761158] ? do_syscall_64+0x26/0x610 [ 2084.761185] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2084.761209] ? do_syscall_64+0x26/0x610 [ 2084.761244] __x64_sys_getdents64+0x73/0xb0 [ 2084.769180] do_syscall_64+0x103/0x610 [ 2084.769210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2084.769222] RIP: 0033:0x457e29 [ 2084.769235] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2084.769243] RSP: 002b:00007f8e1a053c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 2084.769255] RAX: ffffffffffffffda RBX: 00007f8e1a053c90 RCX: 0000000000457e29 12:14:20 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(r0, 0x100) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) [ 2084.769263] RDX: 000000000000004e RSI: 00000000200001c0 RDI: 0000000000000003 [ 2084.769270] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2084.769278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e1a0546d4 [ 2084.769297] R13: 00000000004be6e8 R14: 00000000004cf2d0 R15: 0000000000000004 12:14:20 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e24, 0x4, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x2f}, {0x0, 0x6, 0x9, 0x6, 0x3a5, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0x8}, 0xc28c, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x0, 0x4, 0x1, 0x10001, 0x8}}, 0xe8) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2085.124940] FAULT_INJECTION: forcing a failure. [ 2085.124940] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.156958] CPU: 0 PID: 26183 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2085.164395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2085.173807] Call Trace: [ 2085.176409] dump_stack+0x172/0x1f0 [ 2085.180053] should_fail.cold+0xa/0x1b [ 2085.183949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2085.189057] ? lock_downgrade+0x810/0x810 [ 2085.193210] ? ___might_sleep+0x163/0x280 [ 2085.197378] __should_failslab+0x121/0x190 [ 2085.201621] should_failslab+0x9/0x14 [ 2085.205429] kmem_cache_alloc_node_trace+0x270/0x720 [ 2085.210553] ? __lock_is_held+0xb6/0x140 [ 2085.214618] ? check_preemption_disabled+0x48/0x290 [ 2085.219639] __kmalloc_node+0x3d/0x70 [ 2085.223447] blk_mq_alloc_tag_set+0x346/0xd40 [ 2085.227956] loop_add+0x286/0x8d0 [ 2085.231407] ? idr_find+0x47/0x60 [ 2085.234877] loop_control_ioctl+0x165/0x360 [ 2085.239219] ? loop_add+0x8d0/0x8d0 [ 2085.242843] ? __fget+0x340/0x540 [ 2085.246304] ? loop_add+0x8d0/0x8d0 [ 2085.249934] do_vfs_ioctl+0xd6e/0x1390 [ 2085.253830] ? ioctl_preallocate+0x210/0x210 [ 2085.258239] ? __fget+0x367/0x540 [ 2085.261735] ? iterate_fd+0x360/0x360 [ 2085.265539] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2085.271101] ? fput+0x128/0x1a0 [ 2085.274396] ? security_file_ioctl+0x93/0xc0 [ 2085.278807] ksys_ioctl+0xab/0xd0 [ 2085.282263] __x64_sys_ioctl+0x73/0xb0 [ 2085.286174] do_syscall_64+0x103/0x610 [ 2085.290065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.295269] RIP: 0033:0x457e29 [ 2085.298486] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2085.317383] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:14:20 executing program 4 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2085.325090] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2085.332368] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2085.339634] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2085.346903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2085.354165] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:20 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:20 executing program 1 (fault-call:5 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:20 executing program 2 (fault-call:11 fault-nth:2): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2085.439446] FAULT_INJECTION: forcing a failure. [ 2085.439446] name failslab, interval 1, probability 0, space 0, times 0 12:14:20 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(r0, 0x100) [ 2085.481649] CPU: 0 PID: 26197 Comm: syz-executor.4 Not tainted 5.0.0-rc8+ #89 [ 2085.488954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2085.498303] Call Trace: [ 2085.498332] dump_stack+0x172/0x1f0 [ 2085.498368] should_fail.cold+0xa/0x1b [ 2085.498392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2085.498412] ? lock_downgrade+0x810/0x810 [ 2085.498432] ? ___might_sleep+0x163/0x280 [ 2085.521861] __should_failslab+0x121/0x190 [ 2085.526100] ? proc_i_callback+0x30/0x30 [ 2085.526117] should_failslab+0x9/0x14 [ 2085.526131] kmem_cache_alloc+0x2b2/0x6f0 [ 2085.526143] ? kasan_check_read+0x11/0x20 [ 2085.526163] ? proc_i_callback+0x30/0x30 [ 2085.526178] proc_alloc_inode+0x1c/0x1a0 [ 2085.526195] alloc_inode+0x66/0x190 [ 2085.554006] new_inode_pseudo+0x19/0xf0 [ 2085.557994] new_inode+0x1f/0x40 [ 2085.561365] proc_pid_make_inode+0x22/0x230 [ 2085.565684] ? lockdep_init_map+0x10c/0x5b0 [ 2085.570007] proc_fdinfo_instantiate+0x58/0x150 [ 2085.574687] proc_fill_cache+0x3a7/0x4f0 [ 2085.580750] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2085.585353] ? proc_task_lookup+0x3a0/0x3a0 [ 2085.589676] ? pointer+0x910/0x910 [ 2085.593223] ? find_held_lock+0x35/0x130 [ 2085.597327] ? snprintf+0xbb/0xf0 [ 2085.600790] ? lock_downgrade+0x810/0x810 [ 2085.604947] ? kasan_check_read+0x11/0x20 [ 2085.609105] proc_readfd_common+0x655/0xc00 [ 2085.613444] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2085.618034] ? proc_lookupfdinfo+0x30/0x30 [ 2085.622286] ? lock_acquire+0x16f/0x3f0 [ 2085.626283] ? do_renameat2+0x730/0xc40 [ 2085.630295] proc_readfdinfo+0x25/0x30 [ 2085.634219] iterate_dir+0x489/0x5f0 [ 2085.637957] ksys_getdents64+0x187/0x2e0 [ 2085.642024] ? __ia32_sys_getdents+0x350/0x350 [ 2085.646622] ? ksys_write+0x166/0x1f0 [ 2085.650431] ? iterate_dir+0x5f0/0x5f0 [ 2085.654329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2085.659090] ? do_syscall_64+0x26/0x610 [ 2085.663062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.668424] ? do_syscall_64+0x26/0x610 [ 2085.672404] __x64_sys_getdents64+0x73/0xb0 [ 2085.676740] do_syscall_64+0x103/0x610 [ 2085.680642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.685827] RIP: 0033:0x457e29 [ 2085.689030] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2085.707921] RSP: 002b:00007f8e1a053c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 2085.715625] RAX: ffffffffffffffda RBX: 00007f8e1a053c90 RCX: 0000000000457e29 [ 2085.722888] RDX: 000000000000004e RSI: 00000000200001c0 RDI: 0000000000000003 [ 2085.730153] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2085.737421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e1a0546d4 [ 2085.744690] R13: 00000000004be6e8 R14: 00000000004cf2d0 R15: 0000000000000004 12:14:21 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:21 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) [ 2085.788818] FAULT_INJECTION: forcing a failure. [ 2085.788818] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.815711] FAULT_INJECTION: forcing a failure. [ 2085.815711] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.834799] CPU: 0 PID: 26203 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #89 [ 2085.842079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2085.844488] FAULT_INJECTION: forcing a failure. [ 2085.844488] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.851431] Call Trace: [ 2085.851475] dump_stack+0x172/0x1f0 [ 2085.851501] should_fail.cold+0xa/0x1b [ 2085.851524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2085.851544] ? lock_downgrade+0x810/0x810 [ 2085.851566] ? ___might_sleep+0x163/0x280 [ 2085.851592] __should_failslab+0x121/0x190 [ 2085.890405] should_failslab+0x9/0x14 [ 2085.894213] __kmalloc+0x2dc/0x740 [ 2085.897763] ? __fdget_pos+0xee/0x110 [ 2085.901578] ? kernfs_fop_write+0x33d/0x480 [ 2085.906395] kernfs_fop_write+0x33d/0x480 [ 2085.910559] __vfs_write+0x116/0x8e0 [ 2085.914293] ? kernfs_fop_open+0xd90/0xd90 [ 2085.918526] ? kernel_read+0x120/0x120 [ 2085.922411] ? __lock_is_held+0xb6/0x140 [ 2085.926471] ? check_preemption_disabled+0x48/0x290 [ 2085.931500] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2085.936958] ? rcu_read_lock_sched_held+0x110/0x130 [ 2085.941991] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2085.946762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2085.952324] ? __sb_start_write+0x1ac/0x360 [ 2085.956651] vfs_write+0x20c/0x580 [ 2085.960197] ksys_write+0xea/0x1f0 [ 2085.963738] ? __ia32_sys_read+0xb0/0xb0 [ 2085.967800] ? do_syscall_64+0x26/0x610 [ 2085.971775] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.977137] ? do_syscall_64+0x26/0x610 [ 2085.981118] __x64_sys_write+0x73/0xb0 [ 2085.985017] do_syscall_64+0x103/0x610 [ 2085.988923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.994108] RIP: 0033:0x457e29 [ 2085.997304] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2086.016200] RSP: 002b:00007f5d9a64cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2086.023903] RAX: ffffffffffffffda RBX: 00007f5d9a64cc90 RCX: 0000000000457e29 [ 2086.031171] RDX: 0000000000000012 RSI: 0000000020000100 RDI: 0000000000000004 12:14:21 executing program 4 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2086.038441] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2086.045718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9a64d6d4 [ 2086.053437] R13: 00000000004c72b6 R14: 00000000004dce60 R15: 0000000000000005 [ 2086.064730] CPU: 1 PID: 26207 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #89 [ 2086.072020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2086.081370] Call Trace: [ 2086.083965] dump_stack+0x172/0x1f0 [ 2086.087603] should_fail.cold+0xa/0x1b [ 2086.091495] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2086.096599] ? lock_downgrade+0x810/0x810 [ 2086.100755] ? ___might_sleep+0x163/0x280 [ 2086.104920] __should_failslab+0x121/0x190 [ 2086.109160] should_failslab+0x9/0x14 [ 2086.112964] kmem_cache_alloc_node+0x264/0x710 [ 2086.117580] __alloc_skb+0xd5/0x5e0 [ 2086.121209] ? skb_scrub_packet+0x440/0x440 [ 2086.125537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2086.131086] ? netlink_autobind.isra.0+0x228/0x310 [ 2086.136023] netlink_sendmsg+0x97b/0xd70 [ 2086.140088] ? netlink_unicast+0x720/0x720 [ 2086.144319] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2086.149168] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2086.153924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2086.159463] ? security_socket_sendmsg+0x93/0xc0 [ 2086.164220] ? netlink_unicast+0x720/0x720 [ 2086.168467] sock_sendmsg+0xdd/0x130 [ 2086.172199] ___sys_sendmsg+0x806/0x930 [ 2086.176212] ? copy_msghdr_from_user+0x430/0x430 [ 2086.180986] ? lock_downgrade+0x810/0x810 [ 2086.185144] ? kasan_check_read+0x11/0x20 [ 2086.189307] ? __fget+0x367/0x540 [ 2086.192764] ? iterate_fd+0x360/0x360 [ 2086.196564] ? lock_downgrade+0x810/0x810 [ 2086.200734] ? __fget_light+0x1a9/0x230 [ 2086.204709] ? __fdget+0x1b/0x20 [ 2086.208076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2086.213634] __sys_sendmsg+0x105/0x1d0 [ 2086.217540] ? __ia32_sys_shutdown+0x80/0x80 [ 2086.221962] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2086.227506] ? fput+0x128/0x1a0 [ 2086.230798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2086.235554] ? do_syscall_64+0x26/0x610 [ 2086.239543] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.244908] ? do_syscall_64+0x26/0x610 [ 2086.248887] __x64_sys_sendmsg+0x78/0xb0 [ 2086.252977] do_syscall_64+0x103/0x610 [ 2086.256883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.262069] RIP: 0033:0x457e29 [ 2086.265273] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2086.284188] RSP: 002b:00007fc4dbae9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2086.291911] RAX: ffffffffffffffda RBX: 00007fc4dbae9c90 RCX: 0000000000457e29 [ 2086.299181] RDX: 0000000000000000 RSI: 0000000020dddfc8 RDI: 0000000000000003 [ 2086.306464] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2086.313739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4dbaea6d4 [ 2086.321007] R13: 00000000004c54bf R14: 00000000004d9398 R15: 0000000000000004 [ 2086.328338] CPU: 0 PID: 26205 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2086.335636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2086.344980] Call Trace: [ 2086.347580] dump_stack+0x172/0x1f0 [ 2086.351226] should_fail.cold+0xa/0x1b [ 2086.355131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2086.360243] ? lock_downgrade+0x810/0x810 [ 2086.364402] ? ___might_sleep+0x163/0x280 [ 2086.368587] __should_failslab+0x121/0x190 [ 2086.372831] should_failslab+0x9/0x14 [ 2086.376642] kmem_cache_alloc_node_trace+0x270/0x720 [ 2086.381752] ? kasan_unpoison_shadow+0x35/0x50 [ 2086.386342] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2086.391458] __kmalloc_node+0x3d/0x70 [ 2086.395268] blk_mq_alloc_tag_set+0x492/0xd40 [ 2086.399815] loop_add+0x286/0x8d0 [ 2086.403282] ? idr_find+0x47/0x60 [ 2086.406765] loop_control_ioctl+0x165/0x360 [ 2086.411101] ? loop_add+0x8d0/0x8d0 [ 2086.414733] ? __fget+0x340/0x540 [ 2086.418192] ? loop_add+0x8d0/0x8d0 [ 2086.421822] do_vfs_ioctl+0xd6e/0x1390 [ 2086.425742] ? ioctl_preallocate+0x210/0x210 [ 2086.430158] ? __fget+0x367/0x540 [ 2086.433618] ? iterate_fd+0x360/0x360 [ 2086.437431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2086.442977] ? fput+0x128/0x1a0 [ 2086.446271] ? security_file_ioctl+0x93/0xc0 [ 2086.450727] ksys_ioctl+0xab/0xd0 [ 2086.454204] __x64_sys_ioctl+0x73/0xb0 [ 2086.458108] do_syscall_64+0x103/0x610 [ 2086.462006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.467197] RIP: 0033:0x457e29 [ 2086.470395] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:21 executing program 3: fchmod(0xffffffffffffffff, 0x100) [ 2086.489305] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2086.497011] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2086.504295] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2086.511577] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2086.518864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2086.526132] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:21 executing program 3: fchmod(0xffffffffffffffff, 0x100) 12:14:21 executing program 1 (fault-call:5 fault-nth:1): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2086.587821] FAULT_INJECTION: forcing a failure. [ 2086.587821] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.627233] CPU: 0 PID: 26215 Comm: syz-executor.4 Not tainted 5.0.0-rc8+ #89 [ 2086.634582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2086.643928] Call Trace: [ 2086.643961] dump_stack+0x172/0x1f0 [ 2086.643986] should_fail.cold+0xa/0x1b [ 2086.644012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2086.644033] ? lock_downgrade+0x810/0x810 [ 2086.644054] ? ___might_sleep+0x163/0x280 [ 2086.644079] __should_failslab+0x121/0x190 [ 2086.644097] should_failslab+0x9/0x14 [ 2086.644110] kmem_cache_alloc+0x2b2/0x6f0 [ 2086.644123] ? mark_held_locks+0x100/0x100 [ 2086.644141] ? mark_held_locks+0x100/0x100 [ 2086.644163] __d_alloc+0x2e/0x8c0 [ 2086.644178] ? __d_lookup+0x40c/0x760 [ 2086.644198] d_alloc+0x4d/0x2b0 [ 2086.644222] d_alloc_parallel+0xf4/0x1bc0 [ 2086.644240] ? lock_downgrade+0x810/0x810 [ 2086.644285] ? kasan_check_read+0x11/0x20 [ 2086.663558] ? __d_lookup+0x433/0x760 [ 2086.663576] ? __d_lookup_rcu+0x6c0/0x6c0 [ 2086.663597] ? lockdep_init_map+0x10c/0x5b0 [ 2086.675752] ? lockdep_init_map+0x10c/0x5b0 [ 2086.675787] proc_fill_cache+0x317/0x4f0 [ 2086.675803] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2086.675820] ? proc_task_lookup+0x3a0/0x3a0 [ 2086.675836] ? pointer+0x910/0x910 [ 2086.675851] ? find_held_lock+0x35/0x130 [ 2086.684222] ? snprintf+0xbb/0xf0 [ 2086.684269] ? lock_downgrade+0x810/0x810 [ 2086.684307] ? kasan_check_read+0x11/0x20 [ 2086.695785] proc_readfd_common+0x655/0xc00 [ 2086.695804] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2086.695825] ? proc_lookupfdinfo+0x30/0x30 [ 2086.695842] ? lock_acquire+0x16f/0x3f0 [ 2086.695860] ? do_renameat2+0x731/0xc40 [ 2086.695882] proc_readfdinfo+0x25/0x30 12:14:22 executing program 2 (fault-call:11 fault-nth:3): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:22 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000180)={'rose0\x00'}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) [ 2086.703309] iterate_dir+0x489/0x5f0 [ 2086.703344] ksys_getdents64+0x187/0x2e0 [ 2086.703361] ? __ia32_sys_getdents+0x350/0x350 [ 2086.703377] ? ksys_write+0x166/0x1f0 [ 2086.703392] ? iterate_dir+0x5f0/0x5f0 [ 2086.728254] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2086.728272] ? do_syscall_64+0x26/0x610 [ 2086.728296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.728310] ? do_syscall_64+0x26/0x610 [ 2086.728333] __x64_sys_getdents64+0x73/0xb0 [ 2086.728352] do_syscall_64+0x103/0x610 [ 2086.728371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.728384] RIP: 0033:0x457e29 [ 2086.728398] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2086.728406] RSP: 002b:00007f8e1a053c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 2086.728422] RAX: ffffffffffffffda RBX: 00007f8e1a053c90 RCX: 0000000000457e29 [ 2086.728434] RDX: 000000000000004e RSI: 00000000200001c0 RDI: 0000000000000003 12:14:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:22 executing program 3: fchmod(0xffffffffffffffff, 0x100) 12:14:22 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) [ 2086.741373] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2086.741382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e1a0546d4 [ 2086.741390] R13: 00000000004be6e8 R14: 00000000004cf2d0 R15: 0000000000000004 [ 2086.825903] FAULT_INJECTION: forcing a failure. [ 2086.825903] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.926988] CPU: 0 PID: 26223 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2086.934314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2086.943686] Call Trace: [ 2086.946313] dump_stack+0x172/0x1f0 [ 2086.949956] should_fail.cold+0xa/0x1b [ 2086.953852] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2086.958963] ? lock_downgrade+0x810/0x810 [ 2086.963135] ? ___might_sleep+0x163/0x280 [ 2086.967302] __should_failslab+0x121/0x190 [ 2086.971550] should_failslab+0x9/0x14 [ 2086.975361] kmem_cache_alloc_node_trace+0x270/0x720 [ 2086.980476] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2086.986021] ? find_next_bit+0x107/0x130 [ 2086.990099] blk_mq_init_tags+0x73/0x2c0 [ 2086.994182] blk_mq_alloc_rq_map+0x88/0x200 [ 2086.998531] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2087.003035] ? kasan_kmalloc+0x9/0x10 [ 2087.006843] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2087.011357] loop_add+0x286/0x8d0 [ 2087.014816] ? idr_find+0x47/0x60 [ 2087.018299] loop_control_ioctl+0x165/0x360 [ 2087.022625] ? loop_add+0x8d0/0x8d0 [ 2087.026264] ? __fget+0x340/0x540 [ 2087.029728] ? loop_add+0x8d0/0x8d0 [ 2087.033363] do_vfs_ioctl+0xd6e/0x1390 [ 2087.037269] ? ioctl_preallocate+0x210/0x210 [ 2087.041689] ? __fget+0x367/0x540 [ 2087.045160] ? iterate_fd+0x360/0x360 [ 2087.048961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2087.054189] ? security_file_ioctl+0x93/0xc0 [ 2087.058629] ksys_ioctl+0xab/0xd0 [ 2087.062085] __x64_sys_ioctl+0x73/0xb0 [ 2087.065977] do_syscall_64+0x103/0x610 [ 2087.069866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2087.075052] RIP: 0033:0x457e29 [ 2087.078243] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2087.097171] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2087.104885] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2087.112157] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2087.119426] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2087.126691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 12:14:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e3952c3948445b7aedc008e534e69c317c03aeb6ff49921d5c17cbbea8ff374bcea8c0581ab762e989d05b8d14a483e9514bc85f57d913a40f510357a15dd763cabe67146ae006e1e15c112f95e82cb19d57b2dce3b95eb31ec7b7960ad6f636e1b6e4afc1a5ac084b70a58213d0ba378e9b59a777ee6937989d18b7fd4a80de62dfb31e7c9fe18e5"], 0x2c}}, 0x0) 12:14:22 executing program 4 (fault-call:1 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2087.133957] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2087.144584] blk-mq: reduced tag depth (128 -> 64) [ 2087.171367] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2087.200814] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:22 executing program 2 (fault-call:11 fault-nth:4): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='task\x00') socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0x7, @pix={0x9, 0xfff, 0x47314356, 0x0, 0x7f, 0x1, 0x6, 0xffffffffffffffc0, 0x0, 0xf, 0x2}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000100520000007f0000000c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:22 executing program 3: r0 = syz_open_procfs$namespace(0x0, 0x0) fchmod(r0, 0x100) [ 2087.271708] FAULT_INJECTION: forcing a failure. [ 2087.271708] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.326539] CPU: 1 PID: 26235 Comm: syz-executor.4 Not tainted 5.0.0-rc8+ #89 [ 2087.333875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2087.343237] Call Trace: [ 2087.346041] dump_stack+0x172/0x1f0 [ 2087.349688] should_fail.cold+0xa/0x1b [ 2087.353592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2087.358701] ? lock_downgrade+0x810/0x810 [ 2087.362857] ? ___might_sleep+0x163/0x280 [ 2087.362881] __should_failslab+0x121/0x190 [ 2087.362898] ? proc_i_callback+0x30/0x30 [ 2087.362915] should_failslab+0x9/0x14 [ 2087.362934] kmem_cache_alloc+0x2b2/0x6f0 [ 2087.379143] ? kasan_check_read+0x11/0x20 [ 2087.379169] ? proc_i_callback+0x30/0x30 [ 2087.379187] proc_alloc_inode+0x1c/0x1a0 [ 2087.379208] alloc_inode+0x66/0x190 [ 2087.387488] new_inode_pseudo+0x19/0xf0 [ 2087.387502] new_inode+0x1f/0x40 [ 2087.387518] proc_pid_make_inode+0x22/0x230 [ 2087.387532] ? lockdep_init_map+0x10c/0x5b0 [ 2087.387548] proc_fdinfo_instantiate+0x58/0x150 [ 2087.387564] proc_fill_cache+0x3a7/0x4f0 [ 2087.387578] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2087.387595] ? proc_task_lookup+0x3a0/0x3a0 [ 2087.395701] ? pointer+0x910/0x910 [ 2087.395721] ? find_held_lock+0x35/0x130 [ 2087.395744] ? snprintf+0xbb/0xf0 [ 2087.395763] ? lock_downgrade+0x810/0x810 [ 2087.406700] ? kasan_check_read+0x11/0x20 [ 2087.406720] proc_readfd_common+0x655/0xc00 [ 2087.406747] ? proc_fd_instantiate+0x1f0/0x1f0 [ 2087.406768] ? proc_lookupfdinfo+0x30/0x30 [ 2087.406789] ? lock_acquire+0x16f/0x3f0 [ 2087.406806] ? do_renameat2+0x731/0xc40 [ 2087.406828] proc_readfdinfo+0x25/0x30 [ 2087.406854] iterate_dir+0x489/0x5f0 [ 2087.406878] ksys_getdents64+0x187/0x2e0 [ 2087.433082] ? __ia32_sys_getdents+0x350/0x350 [ 2087.440670] ? ksys_write+0x166/0x1f0 [ 2087.440685] ? iterate_dir+0x5f0/0x5f0 [ 2087.440706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2087.440721] ? do_syscall_64+0x26/0x610 [ 2087.440752] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2087.511414] ? do_syscall_64+0x26/0x610 [ 2087.515409] __x64_sys_getdents64+0x73/0xb0 [ 2087.519745] do_syscall_64+0x103/0x610 [ 2087.523649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2087.528833] RIP: 0033:0x457e29 [ 2087.532033] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2087.550936] RSP: 002b:00007f8e1a053c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 2087.558653] RAX: ffffffffffffffda RBX: 00007f8e1a053c90 RCX: 0000000000457e29 [ 2087.565925] RDX: 000000000000004e RSI: 00000000200001c0 RDI: 0000000000000003 12:14:22 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x13) 12:14:22 executing program 3: r0 = syz_open_procfs$namespace(0x0, 0x0) fchmod(r0, 0x100) [ 2087.573200] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2087.580470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e1a0546d4 [ 2087.587740] R13: 00000000004be6e8 R14: 00000000004cf2d0 R15: 0000000000000004 12:14:22 executing program 4 (fault-call:1 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) getpeername(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x80) sync_file_range(r0, 0x9, 0x6, 0x4) [ 2087.625196] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2087.636359] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2087.717232] FAULT_INJECTION: forcing a failure. [ 2087.717232] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.731929] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2087.742906] CPU: 0 PID: 26242 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2087.750197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2087.759547] Call Trace: [ 2087.762147] dump_stack+0x172/0x1f0 [ 2087.765792] should_fail.cold+0xa/0x1b [ 2087.769691] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2087.774816] ? lock_downgrade+0x810/0x810 [ 2087.778971] ? ___might_sleep+0x163/0x280 [ 2087.783127] __should_failslab+0x121/0x190 [ 2087.787379] should_failslab+0x9/0x14 [ 2087.791180] kmem_cache_alloc_node_trace+0x270/0x720 [ 2087.796285] ? __lock_is_held+0xb6/0x140 [ 2087.800360] ? should_fail+0x14d/0x85c [ 2087.803627] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2087.804283] __kmalloc_node+0x3d/0x70 [ 2087.815422] sbitmap_init_node+0x29e/0x510 [ 2087.819664] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2087.825122] sbitmap_queue_init_node+0x40/0x710 [ 2087.829794] ? find_next_bit+0x107/0x130 [ 2087.833882] blk_mq_init_tags+0x119/0x2c0 [ 2087.838041] blk_mq_alloc_rq_map+0x88/0x200 [ 2087.842367] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2087.846866] ? kasan_kmalloc+0x9/0x10 [ 2087.850679] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2087.855189] loop_add+0x286/0x8d0 [ 2087.858655] ? idr_find+0x47/0x60 [ 2087.862118] loop_control_ioctl+0x165/0x360 [ 2087.866441] ? loop_add+0x8d0/0x8d0 [ 2087.870096] ? __fget+0x340/0x540 [ 2087.873575] ? loop_add+0x8d0/0x8d0 [ 2087.877213] do_vfs_ioctl+0xd6e/0x1390 [ 2087.881115] ? ioctl_preallocate+0x210/0x210 [ 2087.885549] ? __fget+0x367/0x540 [ 2087.889024] ? iterate_fd+0x360/0x360 [ 2087.892833] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2087.898372] ? fput+0x128/0x1a0 [ 2087.901663] ? security_file_ioctl+0x93/0xc0 [ 2087.906085] ksys_ioctl+0xab/0xd0 [ 2087.909547] __x64_sys_ioctl+0x73/0xb0 [ 2087.913453] do_syscall_64+0x103/0x610 [ 2087.917364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2087.922570] RIP: 0033:0x457e29 [ 2087.925769] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2087.944700] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2087.952427] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2087.959699] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 12:14:23 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x4, 0x8483) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r1, &(0x7f0000000000)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x111000) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffffa2d68fe7000c000100520000007f0000010c000400000022ff02e93e00f2fa6ed8edf341cff22a533611cbb293be9f"], 0x2c}}, 0x0) r3 = gettid() ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r3) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5b, 0x200) 12:14:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x20000112) [ 2087.966963] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2087.974233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2087.981528] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2088.040244] blk-mq: reduced tag depth (128 -> 64) 12:14:23 executing program 2 (fault-call:11 fault-nth:5): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2088.079796] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2088.118885] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:23 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:23 executing program 3: r0 = syz_open_procfs$namespace(0x0, 0x0) fchmod(r0, 0x100) 12:14:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000001c0)) r2 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x42, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r5, 0x10f, 0x85) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000003c0)=0x0) write$cgroup_pid(r2, &(0x7f0000000380)=r6, 0x12) ioctl$TIOCOUTQ(r5, 0x5411, &(0x7f0000000200)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000040)={r5}) 12:14:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x103080, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000780)={@initdev, @initdev, 0x0}, &(0x7f00000007c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'bond_slave_0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000009c0)={0x0, @local, @multicast1}, &(0x7f0000000a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000a40)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000dc0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000f80)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001e00)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001fc0)={0x0, @loopback, @empty}, &(0x7f0000002000)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002040)={'bridge_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003b00)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x104100}, 0xc, &(0x7f0000003fc0)={&(0x7f0000003b40)={0x480, r2, 0x302, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xacb}}}]}}, {{0x8, 0x1, r4}, {0x1ec, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r11}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0xac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}]}}]}, 0x480}, 0x1, 0x0, 0x0, 0x4048000}, 0x4000000) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x18) 12:14:23 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:23 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(0xffffffffffffffff, 0x100) 12:14:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2088.309787] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2088.331048] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r1}) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c040501ff0080f7fdffff2e0a0040000c400100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) [ 2088.358189] FAULT_INJECTION: forcing a failure. [ 2088.358189] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.388471] CPU: 0 PID: 26277 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2088.395781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2088.405135] Call Trace: [ 2088.407752] dump_stack+0x172/0x1f0 [ 2088.411402] should_fail.cold+0xa/0x1b [ 2088.415318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2088.420424] ? lock_downgrade+0x810/0x810 [ 2088.424578] ? ___might_sleep+0x163/0x280 [ 2088.428737] __should_failslab+0x121/0x190 [ 2088.433001] should_failslab+0x9/0x14 [ 2088.436798] kmem_cache_alloc_node_trace+0x270/0x720 [ 2088.441901] ? check_preemption_disabled+0x48/0x290 [ 2088.446932] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2088.451955] ? find_next_bit+0x107/0x130 [ 2088.456029] sbitmap_queue_init_node+0x29e/0x710 [ 2088.460800] blk_mq_init_tags+0x119/0x2c0 [ 2088.464957] blk_mq_alloc_rq_map+0x88/0x200 [ 2088.469300] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2088.473802] ? kasan_kmalloc+0x9/0x10 [ 2088.477610] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2088.482116] loop_add+0x286/0x8d0 [ 2088.485578] ? idr_find+0x47/0x60 [ 2088.489037] loop_control_ioctl+0x165/0x360 [ 2088.493373] ? loop_add+0x8d0/0x8d0 [ 2088.496999] ? __fget+0x340/0x540 [ 2088.500460] ? loop_add+0x8d0/0x8d0 [ 2088.504090] do_vfs_ioctl+0xd6e/0x1390 [ 2088.507982] ? ioctl_preallocate+0x210/0x210 [ 2088.512390] ? __fget+0x367/0x540 [ 2088.515849] ? iterate_fd+0x360/0x360 [ 2088.519655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2088.525193] ? fput+0x128/0x1a0 [ 2088.528489] ? security_file_ioctl+0x93/0xc0 [ 2088.532899] ksys_ioctl+0xab/0xd0 [ 2088.536355] __x64_sys_ioctl+0x73/0xb0 [ 2088.540258] do_syscall_64+0x103/0x610 [ 2088.544163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2088.549357] RIP: 0033:0x457e29 [ 2088.552570] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2088.574211] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2088.581933] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2088.589205] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2088.596473] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2088.603756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2088.611027] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2088.621425] blk-mq: reduced tag depth (128 -> 64) 12:14:23 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:23 executing program 2 (fault-call:11 fault-nth:6): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:24 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(0xffffffffffffffff, 0x100) 12:14:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup3(r0, r0, 0x80000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) r2 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r2, 0x3, &(0x7f00000000c0)={0x38, 0x800000000fff, 0xffffffffffffffff}) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=0x0, &(0x7f0000000400)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000440)={0x2, 0x8b, 0x0, 0x81, 0x7, 0xdc, 0x6, 0x2, r3}, 0x20) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_addrs=@tipc=@name={0x1e, 0x2, 0x1, {{0x1, 0x3}, 0x2}}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r4, 0x1d1, 0x10}, 0xc) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getpeername$netrom(r5, &(0x7f0000000240)={{0x3, @default}, [@remote, @null, @remote, @remote, @remote, @rose, @bcast, @null]}, &(0x7f0000000080)=0x48) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @broadcast}, 0x41, 0x0, 0x0, 0x0, 0xdd0, 0x0, 0x8000, 0x7}) 12:14:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x2000020e) 12:14:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:24 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(0xffffffffffffffff, 0x100) 12:14:24 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0xffffff52) getdents64(r0, &(0x7f0000000000)=""/175, 0xaf) 12:14:24 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0xa101, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x600, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r4, 0x808c563d, &(0x7f0000000180)) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2088.859143] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2088.893786] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x193080, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) [ 2088.972429] FAULT_INJECTION: forcing a failure. [ 2088.972429] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.988924] CPU: 0 PID: 26306 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2088.996220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2089.005613] Call Trace: [ 2089.008212] dump_stack+0x172/0x1f0 [ 2089.011855] should_fail.cold+0xa/0x1b [ 2089.015752] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2089.020859] ? lock_downgrade+0x810/0x810 [ 2089.025011] ? ___might_sleep+0x163/0x280 [ 2089.029172] __should_failslab+0x121/0x190 [ 2089.033414] should_failslab+0x9/0x14 [ 2089.037222] kmem_cache_alloc_node_trace+0x270/0x720 [ 2089.042335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2089.047874] ? sbitmap_init_node+0x149/0x510 [ 2089.052315] sbitmap_queue_init_node+0x29e/0x710 [ 2089.057090] blk_mq_init_tags+0x17b/0x2c0 [ 2089.061240] blk_mq_alloc_rq_map+0x88/0x200 [ 2089.065575] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2089.070073] ? kasan_kmalloc+0x9/0x10 [ 2089.073885] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2089.078409] loop_add+0x286/0x8d0 [ 2089.081862] ? idr_find+0x47/0x60 [ 2089.085331] loop_control_ioctl+0x165/0x360 [ 2089.089659] ? loop_add+0x8d0/0x8d0 [ 2089.093353] ? __fget+0x340/0x540 [ 2089.096854] ? loop_add+0x8d0/0x8d0 [ 2089.100480] do_vfs_ioctl+0xd6e/0x1390 [ 2089.104372] ? ioctl_preallocate+0x210/0x210 [ 2089.108780] ? __fget+0x367/0x540 [ 2089.112242] ? iterate_fd+0x360/0x360 [ 2089.116066] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2089.121605] ? fput+0x128/0x1a0 [ 2089.124895] ? security_file_ioctl+0x93/0xc0 [ 2089.129314] ksys_ioctl+0xab/0xd0 [ 2089.132772] __x64_sys_ioctl+0x73/0xb0 [ 2089.136677] do_syscall_64+0x103/0x610 [ 2089.140838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2089.146024] RIP: 0033:0x457e29 [ 2089.149245] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:24 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') fchmod(r0, 0x0) [ 2089.168373] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2089.176085] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2089.183354] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2089.190620] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2089.197892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2089.205160] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2089.219463] blk-mq: reduced tag depth (128 -> 64) 12:14:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0xffe7, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[], 0x8}}, 0x0) 12:14:24 executing program 2 (fault-call:11 fault-nth:7): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) ioprio_get$pid(0x1, r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:24 executing program 3: r0 = socket$kcm(0x10, 0x80000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)="2e0000001d008100e00f80ecdb4cb90406c8650407007400000000fb120003003200000040d819a9060015000000", 0x2e}], 0x1}, 0x0) 12:14:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x11, r1, 0x1, 0xfffffffffffffffc, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 12:14:24 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100522f6b554b24584ef6000400000022ff0238e93e"], 0x2c}}, 0x0) fdatasync(r0) 12:14:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x36, 0x4, 0x7, 0xc1}, {0x10001, 0x9, 0x0, 0x10001}, {0x6, 0x1ff, 0x1, 0xbd}, {0xff, 0x1, 0x3, 0x10001}, {0x20, 0x3, 0x835, 0xc0}]}) 12:14:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0x5) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 12:14:24 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, 0x0) 12:14:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) timer_create(0x7, &(0x7f0000000200)={0x0, 0x1c, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000380)=0x0) timer_getoverrun(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400000) r5 = dup3(r0, r3, 0x80000) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x7fff, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x7, 0x40080) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="000000000000000100000000000000f0ffffffff", @ANYRES32=r5, @ANYBLOB="0000000000000100000000000080000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000100000000000000000000000000", @ANYRES32=r7, @ANYBLOB="00000000000000f0ffffffff0000000000000000"]) r8 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x36, 0x4000) setsockopt$IP_VS_SO_SET_ZERO(r8, 0x0, 0x48f, &(0x7f00000000c0)={0x5c, @broadcast, 0x4e23, 0x0, 'lc\x00', 0x23, 0x8f, 0x5b}, 0x2c) r9 = openat$cgroup_procs(r3, &(0x7f0000000780)='cgrt\b\x00\xa1\xcf\xb3\xf7\x0f6\x85\x96(&;\x89cs?\x00\xb8\xb8\xba\xcc\x96\xd7\xb9\n\f\x06\xfa\xff\xef\xcd=\xf6Z,\xc1\x9b\xb3\xe5\xbdO\xe9\xb4\x116\xf2P\xb3\x1fo\x04\xa9N\xd6\xc96{\x87%\x86gQ\xe0\xf7\xcd\x97', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000080), 0x12) r10 = getuid() openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/loop-control\x00', 0x0, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0xe7d0, 0x1}, {0x400, 0xfff}], r10}, 0xffffffb4, 0x2) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:24 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40001, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000300)={0x90, 0xffffffffffffffff, 0x3, {0x5, 0x1, 0x3, 0x7, 0x0, 0x1000, {0x3, 0x8000, 0x8001, 0x9, 0x9, 0x6, 0x5, 0x6, 0x10000, 0x1ff, 0x3, r1, r2, 0x6, 0x3f}}}, 0x90) accept4(r0, 0x0, &(0x7f0000000080), 0x80000) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80001400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x90, 0x0, 0x300, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3417}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x49}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x800) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000440)=ANY=[@ANYBLOB="0000010014000000c403003e080000000500000001000000000400006b454c0048ac0b4929ad761746a57b246299d98d133a356f9593624dfdbd207a603b6eda529b5e2a2210c66e558280056feb5c48fc63c48572193bb5966ca9a6b9ce985c9c0da4d2611faf86"]) sendmsg$nl_netfilter(r3, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) write$P9_RSYMLINK(r0, &(0x7f00000003c0)={0x14, 0x11, 0x2, {0x0, 0x3, 0x3}}, 0x14) [ 2089.498388] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2089.509545] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 12:14:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c00000022ff0238e93e0000"], 0x2c}}, 0x0) [ 2089.623310] FAULT_INJECTION: forcing a failure. [ 2089.623310] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.644820] CPU: 0 PID: 26345 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2089.652101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2089.661449] Call Trace: [ 2089.664049] dump_stack+0x172/0x1f0 [ 2089.667694] should_fail.cold+0xa/0x1b [ 2089.671626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2089.676735] ? ___might_sleep+0x163/0x280 [ 2089.680891] __should_failslab+0x121/0x190 [ 2089.685128] should_failslab+0x9/0x14 [ 2089.688953] kmem_cache_alloc_node_trace+0x270/0x720 [ 2089.694077] __kmalloc_node+0x3d/0x70 [ 2089.697889] blk_mq_alloc_rq_map+0xb9/0x200 [ 2089.702207] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2089.706713] ? kasan_kmalloc+0x9/0x10 [ 2089.710520] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2089.715034] loop_add+0x286/0x8d0 [ 2089.718489] ? idr_find+0x47/0x60 [ 2089.721952] loop_control_ioctl+0x165/0x360 [ 2089.726294] ? loop_add+0x8d0/0x8d0 [ 2089.729921] ? __fget+0x340/0x540 [ 2089.733408] ? loop_add+0x8d0/0x8d0 [ 2089.737037] do_vfs_ioctl+0xd6e/0x1390 [ 2089.740930] ? ioctl_preallocate+0x210/0x210 [ 2089.745342] ? __fget+0x367/0x540 [ 2089.748805] ? iterate_fd+0x360/0x360 [ 2089.752612] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2089.758157] ? fput+0x128/0x1a0 [ 2089.761449] ? security_file_ioctl+0x93/0xc0 [ 2089.765860] ksys_ioctl+0xab/0xd0 [ 2089.769324] __x64_sys_ioctl+0x73/0xb0 [ 2089.773225] do_syscall_64+0x103/0x610 [ 2089.777131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2089.782345] RIP: 0033:0x457e29 [ 2089.785541] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2089.804441] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2089.812156] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2089.819438] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2089.826726] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2089.833992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2089.841265] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2089.851695] blk-mq: reduced tag depth (128 -> 64) 12:14:25 executing program 2 (fault-call:11 fault-nth:8): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) 12:14:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) 12:14:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:25 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, 0x0) 12:14:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000081886dbdb5a02a4af11319a267b19b22ff0238e93e"], 0x2c}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000080)) 12:14:25 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x600, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x5, 0x7fffffff, 0x1, 0x7ff}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x800, 0x6, 0x81, 0x7ec1, 0x9, 0x100, 0x0, 0x0, 0x2, 0x40, 0x20, 0x0, 0x7b2}, {0x4, 0x7b5579b2, 0x7f, 0x6, 0x400, 0x8, 0x1, 0x6, 0xffffffffffffff9d, 0x8, 0x100000001, 0x1000, 0x80}, {0xd3, 0x4, 0x200, 0x958, 0x8, 0x1, 0x9, 0x4, 0x6, 0x1, 0x6, 0x3, 0x3}], 0xfde}) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) [ 2090.150058] FAULT_INJECTION: forcing a failure. [ 2090.150058] name failslab, interval 1, probability 0, space 0, times 0 [ 2090.176892] CPU: 0 PID: 26378 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2090.184186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2090.193542] Call Trace: [ 2090.196137] dump_stack+0x172/0x1f0 [ 2090.199772] should_fail.cold+0xa/0x1b [ 2090.203659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2090.208764] ? ___might_sleep+0x163/0x280 [ 2090.212917] __should_failslab+0x121/0x190 [ 2090.217167] should_failslab+0x9/0x14 [ 2090.220963] kmem_cache_alloc_node_trace+0x270/0x720 [ 2090.226076] ? kasan_unpoison_shadow+0x35/0x50 [ 2090.230669] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2090.235789] __kmalloc_node+0x3d/0x70 [ 2090.239607] blk_mq_alloc_rq_map+0xfa/0x200 [ 2090.243931] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2090.248425] ? kasan_kmalloc+0x9/0x10 [ 2090.252232] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2090.256748] loop_add+0x286/0x8d0 [ 2090.260201] ? idr_find+0x47/0x60 [ 2090.263672] loop_control_ioctl+0x165/0x360 [ 2090.267992] ? loop_add+0x8d0/0x8d0 [ 2090.271616] ? __fget+0x340/0x540 [ 2090.275072] ? loop_add+0x8d0/0x8d0 [ 2090.278703] do_vfs_ioctl+0xd6e/0x1390 [ 2090.282618] ? ioctl_preallocate+0x210/0x210 [ 2090.287026] ? __fget+0x367/0x540 [ 2090.290487] ? iterate_fd+0x360/0x360 [ 2090.294302] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2090.299835] ? fput+0x128/0x1a0 [ 2090.303120] ? security_file_ioctl+0x93/0xc0 [ 2090.307536] ksys_ioctl+0xab/0xd0 [ 2090.311007] __x64_sys_ioctl+0x73/0xb0 [ 2090.314898] do_syscall_64+0x103/0x610 [ 2090.318828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2090.324036] RIP: 0033:0x457e29 [ 2090.327225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2090.346133] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2090.353849] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2090.361110] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2090.368374] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2090.375638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2090.382901] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2090.399174] blk-mq: reduced tag depth (128 -> 64) 12:14:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={@remote, @dev={0xfe, 0x80, [], 0x1b}, @empty, 0x0, 0x40, 0x36f9, 0x0, 0x2}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 12:14:25 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, 0x0) 12:14:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x32801, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000200)=r2) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0xfffffffffffffcd8}, 0x1, 0x0, 0x0, 0x1000000000000}, 0x0) 12:14:25 executing program 2 (fault-call:11 fault-nth:9): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.nlink\x00') 12:14:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x9) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) write$cgroup_pid(r2, &(0x7f00000000c0), 0xffffffffffffffcc) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) 12:14:25 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:25 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x260200) accept4$nfc_llcp(r0, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x80000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x9) 12:14:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2000004e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) close(r1) dup2(r2, r0) 12:14:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x280000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080), 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0xffffffffffffffb2, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[@ANYRES32], 0xfffffffffffffef1}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) 12:14:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) fremovexattr(r2, &(0x7f0000000400)=@random={'user.', '\x00'}) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/148, 0x94) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000040)={0x6, "37e1674b85fe48f08734d986629b01e0d1e2bd6dedc6c24d1d78cbfb28a0d9af", 0x2, 0x1}) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x103802, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000003c0)) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:25 executing program 4: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000240)='em0trustedGPLGPL#^vmnet0em1\x00'}, 0x30) ptrace(0x4208, r1) recvfrom$unix(r0, &(0x7f0000000080)=""/100, 0x64, 0x2, &(0x7f0000000140)=@abs={0xc72e5c632a045f52, 0x0, 0x4e21}, 0x173) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r3, &(0x7f00000001c0)=""/78, 0x4e) 12:14:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000002c0)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x40) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000280)=0x8, 0x4) r2 = syz_genetlink_get_family_id$ipvs(0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x118, r2, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x81}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x50150000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x200}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8fd}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc5ff}]}, 0x118}, 0x1, 0x0, 0x0, 0x20000080}, 0x80) [ 2090.705110] FAULT_INJECTION: forcing a failure. [ 2090.705110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2090.737477] CPU: 1 PID: 26400 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2090.744793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2090.754142] Call Trace: [ 2090.756757] dump_stack+0x172/0x1f0 [ 2090.760410] should_fail.cold+0xa/0x1b [ 2090.764308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2090.769446] ? ___might_sleep+0x163/0x280 [ 2090.773611] should_fail_alloc_page+0x50/0x60 [ 2090.778125] __alloc_pages_nodemask+0x1a1/0x710 [ 2090.782808] ? __lock_is_held+0xb6/0x140 [ 2090.786877] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2090.791901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2090.797436] ? find_next_bit+0x107/0x130 [ 2090.801506] ? __cpu_to_node+0x7e/0xa0 [ 2090.805405] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 2090.810256] blk_mq_alloc_rqs+0x223/0x7f0 [ 2090.814433] ? __kmalloc_node+0x4e/0x70 [ 2090.818422] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 2090.823011] ? kasan_kmalloc+0x9/0x10 [ 2090.826819] blk_mq_alloc_tag_set+0x78a/0xd40 [ 2090.831338] loop_add+0x286/0x8d0 [ 2090.834805] ? idr_find+0x47/0x60 [ 2090.838263] loop_control_ioctl+0x165/0x360 [ 2090.842599] ? loop_add+0x8d0/0x8d0 [ 2090.846239] ? __fget+0x340/0x540 [ 2090.849696] ? loop_add+0x8d0/0x8d0 [ 2090.853330] do_vfs_ioctl+0xd6e/0x1390 [ 2090.857224] ? ioctl_preallocate+0x210/0x210 [ 2090.861650] ? __fget+0x367/0x540 [ 2090.865112] ? iterate_fd+0x360/0x360 [ 2090.868914] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2090.874471] ? fput+0x128/0x1a0 [ 2090.877766] ? security_file_ioctl+0x93/0xc0 [ 2090.882184] ksys_ioctl+0xab/0xd0 [ 2090.885653] __x64_sys_ioctl+0x73/0xb0 [ 2090.889548] do_syscall_64+0x103/0x610 [ 2090.893460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2090.898662] RIP: 0033:0x457e29 [ 2090.901867] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2090.920786] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2090.928505] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2090.935772] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2090.943044] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 12:14:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000040)={0x6, @raw_data="2e46755071e1b2fe77365197631eee1c7e42b70336141e7366c6de891ecb5d7c9f8766e99a7186a416d3b071d1a7d2f6a709135380e3b374ec73f02fd910568eabb5ad9883a29f5592cba2b039b4f23a20302f00c1a930d2e98e1a540f594a17b035aa27ba128da0da4379a29deebc2466cbc88afbdf9fe367d176ec2834686e807a31dcc7213e8bcaa58bb388b52b36b9447899c525bb6ef9f1402e7dee602c3473fcfb7aa836bdcec80d6d5d5abe59c6e2a3294818ce3bd009879d430dde9e53707ac86afc4c65"}) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000001c0)=':eth1ppp0\\ppp1\\.proc}*\xa5ppp0\x00') sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000140)={0x8, 0xb, 0x4, 0x80000, {0x0, 0x7530}, {0x4, 0xe, 0x3f, 0x7, 0xe000000000000, 0x46, "b4e50a86"}, 0x6, 0x6, @offset, 0x4}) [ 2090.950307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2090.957571] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:26 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/tcp6\x00') getdents64(r1, &(0x7f0000000080)=""/78, 0x2e) fremovexattr(r1, &(0x7f0000000000)=@random={'user.', 'fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8'}) 12:14:26 executing program 2 (fault-call:11 fault-nth:10): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:26 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8a001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000180)={0x7}, 0x4) 12:14:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@quota='quota'}, {@nogrpid='nogrpid'}], [{@euid_eq={'euid'}}]}) 12:14:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x20000, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:26 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x4, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x80) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000240)={{0x0, 0x3, 0x7, 0x8000, 'syz0\x00', 0x6}, 0x0, [0x6, 0x5, 0x7f, 0x100, 0x1, 0x6, 0x1, 0x80000001, 0x7, 0x2a10b5e6, 0x7, 0x9, 0xff, 0x0, 0xffffffffdd00163a, 0x3, 0x7, 0xe23a, 0xffffffffffffffff, 0x300, 0x4, 0x1f, 0x0, 0x5, 0x6, 0x3, 0x7, 0x7, 0x6, 0xfffffffffffffff8, 0x9, 0x7, 0x9, 0x5, 0x200, 0x80, 0xfffffffeffffffff, 0xd4, 0x779, 0x80000001, 0x4, 0xf04, 0x5, 0x2a, 0xb8b, 0x9, 0xb30, 0x100000000, 0x9, 0x1, 0x81, 0x9, 0x6, 0x6, 0xe7, 0x80000001, 0x3, 0x1, 0xfffffffffffffff7, 0x81, 0x2, 0x2, 0xbf4, 0x3, 0x5, 0x81, 0x1, 0x0, 0x6, 0x6, 0x80000001, 0x7, 0xffffffffffffff80, 0x2, 0x0, 0x1, 0xfffffffffffffffd, 0x7fff, 0x100000000, 0x4, 0x5, 0xdb0, 0x800, 0x10000000000, 0x9, 0x9e, 0x0, 0x0, 0x71e, 0x0, 0x3, 0x3, 0x1, 0x81, 0xffffffff, 0x7, 0x4c0, 0x80, 0x4, 0x4, 0xb0, 0x0, 0x6, 0x9, 0xffffffff, 0x1, 0x6, 0x40, 0x9, 0x8, 0x267, 0x6, 0x10000, 0x100000001, 0x80, 0x3, 0x6, 0xdf, 0x3, 0x2, 0x5, 0x40, 0x5, 0x80, 0x2, 0x6, 0x9, 0x3], {r2, r3+10000000}}) 12:14:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = getpgrp(0xffffffffffffffff) r5 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) r6 = getuid() ioprio_set$uid(0x3, r6, 0x0) ioctl$VIDIOC_CREATE_BUFS(r5, 0xc100565c, &(0x7f0000000380)={0x2, 0x2, 0x4, {0xd, @pix_mp={0x1, 0x100000000000000, 0x0, 0x0, 0x4, [{0x0, 0x2}, {0x2, 0xff}, {0x10001, 0x7fff}, {0xbbc}, {0x7fffffff, 0x6}, {0x8, 0x3}, {0x101, 0x6}, {0x3, 0x2}], 0xfffffffffffffffd, 0x81, 0x7}}}) write$cgroup_pid(r1, &(0x7f0000000040)=r4, 0x12) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) sendmsg$nl_crypto(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)=@del={0x100, 0x11, 0x0, 0x70bd28, 0x25dfdbfe, {{'michael_mic-generic\x00'}, [], [], 0x2400, 0x400}, [{0x8, 0x1, 0x1f}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x3ff}]}, 0x100}, 0x1, 0x0, 0x0, 0x24008041}, 0x44801) [ 2091.250889] XFS (loop3): unknown mount option [euid=00000000000000000000]. 12:14:26 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x0, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) [ 2091.355134] XFS (loop3): unknown mount option [euid=00000000000000000000]. 12:14:26 executing program 4: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='mxujtinfo\x10') setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0x6, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000800), 0x0) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) [ 2091.625790] FAULT_INJECTION: forcing a failure. [ 2091.625790] name failslab, interval 1, probability 0, space 0, times 0 [ 2091.643459] CPU: 1 PID: 26470 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2091.650873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2091.660227] Call Trace: [ 2091.662891] dump_stack+0x172/0x1f0 [ 2091.666553] should_fail.cold+0xa/0x1b [ 2091.670587] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2091.675713] ? lock_downgrade+0x810/0x810 [ 2091.679871] ? ___might_sleep+0x163/0x280 [ 2091.684058] __should_failslab+0x121/0x190 [ 2091.688303] should_failslab+0x9/0x14 [ 2091.692127] kmem_cache_alloc_node+0x264/0x710 [ 2091.696837] ? debug_mutex_init+0x2d/0x60 [ 2091.701010] ? __mutex_init+0xef/0x130 [ 2091.704912] blk_alloc_queue_node+0x32/0x760 [ 2091.709345] blk_mq_init_queue+0x4a/0xb0 [ 2091.713426] loop_add+0x2dd/0x8d0 [ 2091.716905] ? idr_find+0x47/0x60 [ 2091.720373] loop_control_ioctl+0x165/0x360 [ 2091.724698] ? loop_add+0x8d0/0x8d0 [ 2091.728323] ? __fget+0x340/0x540 [ 2091.731802] ? loop_add+0x8d0/0x8d0 [ 2091.735445] do_vfs_ioctl+0xd6e/0x1390 [ 2091.739346] ? ioctl_preallocate+0x210/0x210 [ 2091.743753] ? __fget+0x367/0x540 [ 2091.747246] ? iterate_fd+0x360/0x360 [ 2091.751069] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2091.756744] ? fput+0x128/0x1a0 [ 2091.760043] ? security_file_ioctl+0x93/0xc0 [ 2091.764458] ksys_ioctl+0xab/0xd0 [ 2091.767912] __x64_sys_ioctl+0x73/0xb0 [ 2091.771807] do_syscall_64+0x103/0x610 [ 2091.775701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2091.780890] RIP: 0033:0x457e29 [ 2091.784085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2091.803188] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2091.810897] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2091.818166] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 12:14:27 executing program 2 (fault-call:11 fault-nth:11): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0079f7fdffff2e0b0000000c000100520000007f0000010c0004004b99b6cd34c7780e"], 0x2c}}, 0x0) 12:14:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) io_setup(0x5, &(0x7f00000001c0)=0x0) io_getevents(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 12:14:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x88000, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x100000000, @rand_addr="19d7a05b1881b5d815d4c9a85dcce279", 0x3}, 0x1c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:27 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x0, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x100, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/78, 0x4e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1', "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"}, 0x103) [ 2091.825714] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2091.832988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2091.840259] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:27 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x0, 0xec, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') finit_module(r0, &(0x7f0000000000)='^lo&\x00', 0x2) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) 12:14:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x100, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000380)={'yam0\x00', 0x101, 0xfff}) r2 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) write$cgroup_pid(r4, &(0x7f0000000080)=r5, 0x12) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 12:14:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="c3cf406dfa862a24b9586a6e4f4aa4f810240bac2c000000e6030501ff0080fefdffff3e0a0000000c000100520000007f0000010c000400000022ff0238e93e5e09daff8ecd9b20cbce08085ca36a9c3a5e6d5aaa97797c4fe5f99dd904df64b2bf84e7264f319ec8596175"], 0x2c}}, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x8000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0x2, [{}, {}]}, 0x48) 12:14:27 executing program 3: clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) [ 2092.013078] FAULT_INJECTION: forcing a failure. [ 2092.013078] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.059843] CPU: 0 PID: 26486 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2092.067141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.076491] Call Trace: [ 2092.079092] dump_stack+0x172/0x1f0 [ 2092.082749] should_fail.cold+0xa/0x1b [ 2092.086650] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2092.091758] ? lock_downgrade+0x810/0x810 [ 2092.095919] ? ___might_sleep+0x163/0x280 [ 2092.100080] __should_failslab+0x121/0x190 [ 2092.104333] should_failslab+0x9/0x14 [ 2092.108144] kmem_cache_alloc_node_trace+0x270/0x720 [ 2092.113264] ? lockdep_init_map+0x10c/0x5b0 [ 2092.117617] __kmalloc_node+0x3d/0x70 [ 2092.121424] ? mempool_alloc+0x380/0x380 [ 2092.125493] ? mempool_free+0x380/0x380 [ 2092.129469] mempool_init_node+0x138/0x560 [ 2092.133733] ? wait_for_completion+0x440/0x440 [ 2092.138954] ? mempool_alloc+0x380/0x380 [ 2092.143021] ? mempool_free+0x380/0x380 [ 2092.146996] mempool_init+0x3d/0x50 [ 2092.150630] bioset_init+0x33a/0x710 [ 2092.154359] blk_alloc_queue_node+0x137/0x760 [ 2092.158864] blk_mq_init_queue+0x4a/0xb0 [ 2092.162936] loop_add+0x2dd/0x8d0 [ 2092.166391] ? idr_find+0x47/0x60 [ 2092.169873] loop_control_ioctl+0x165/0x360 [ 2092.174197] ? loop_add+0x8d0/0x8d0 [ 2092.177825] ? __fget+0x340/0x540 [ 2092.181314] ? loop_add+0x8d0/0x8d0 [ 2092.184950] do_vfs_ioctl+0xd6e/0x1390 [ 2092.188851] ? ioctl_preallocate+0x210/0x210 [ 2092.193273] ? __fget+0x367/0x540 [ 2092.196752] ? iterate_fd+0x360/0x360 [ 2092.200574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2092.206127] ? fput+0x128/0x1a0 [ 2092.209416] ? security_file_ioctl+0x93/0xc0 [ 2092.213824] ksys_ioctl+0xab/0xd0 [ 2092.217301] __x64_sys_ioctl+0x73/0xb0 [ 2092.221199] do_syscall_64+0x103/0x610 [ 2092.225094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2092.230294] RIP: 0033:0x457e29 [ 2092.233510] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2092.252414] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:14:27 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1\x01\x00$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x5, &(0x7f0000ffa000/0x4000)=nil, 0x1) getdents64(r1, &(0x7f00000001c0)=""/249, 0xf9) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)={0x1, 0x827, 0x9}) getdents64(r1, &(0x7f00000000c0)=""/78, 0x18) [ 2092.260124] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2092.267407] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2092.274678] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2092.281947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2092.289241] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:27 executing program 2 (fault-call:11 fault-nth:12): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:27 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0x0, [], &(0x7f0000000040)={0x990af7, 0x9, [], @value64=0x1ff}}) 12:14:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000540)="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") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='\xe3group\xf5\x00D?cs\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) r6 = getpgid(0x0) tgkill(r5, r6, 0x0) 12:14:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) write$capi20_data(r1, &(0x7f0000000040)={{0x10, 0x3, 0x3, 0x82, 0x0, 0x1}, 0xcb, "d3dff834bf2908670c14c1cbd6124b55a9e5869e997e214ca1c7761bf449a038d03ce7093f2c3918f05fa3ce5999da4353ac6f5dee1629fa96aa0e567eca754ccb44b4972162eefd23db20b1b6c4edc922338aa709c80c7c3381c60bb968dda55a9bfb38895e9bcd6f21893026a6a918766fc612f821a2df79e52ff2f7204c85305c34d958903d6207ace7e3c60bc425522acd7faa44b70bce05a0de49d5559c9c49d63c84d69cf249eb6d5cf1249daef11e7d906cff43aeac4f56dff865c9d2a51fe5500791447054bd0e"}, 0xdd) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000300)={0x0, @reserved}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e22, 0x542, @mcast1, 0x4}, {0xa, 0x4e24, 0x4, @empty, 0x1000}, 0x80000001, [0x100000001, 0x6, 0x2, 0x0, 0xffffffff, 0x7f68, 0x20, 0x1]}, 0x5c) init_module(&(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x15, &(0x7f0000000180)='/proc/self/net/pfkey\x00') 12:14:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx<\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8\xdb\x1f`~\xc5\x1c\x9e\xabR\xef\xef\xc34\x10h\xcd\xa6\x91\xbc\xa7\xee8\xb5\xbc\xddY\xa1\xcd\x0eV\x96%\xe9l\xbc\xd5\xc3\xee\xdaWn\x9b\xc9\x1e\x1f\xcf\xd3B\xb7\xf0?\xe4@') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:27 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0x0, [], 0x0}) [ 2092.525858] FAULT_INJECTION: forcing a failure. [ 2092.525858] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.546694] validate_nla: 22 callbacks suppressed [ 2092.546704] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2092.559596] CPU: 1 PID: 26510 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2092.566883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2092.576232] Call Trace: [ 2092.578848] dump_stack+0x172/0x1f0 [ 2092.582631] should_fail.cold+0xa/0x1b [ 2092.586546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2092.591691] ? ___might_sleep+0x163/0x280 [ 2092.595860] __should_failslab+0x121/0x190 [ 2092.600107] should_failslab+0x9/0x14 [ 2092.603915] kmem_cache_alloc+0x2b2/0x6f0 [ 2092.608065] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2092.613296] ? mempool_free+0x380/0x380 [ 2092.617296] mempool_alloc_slab+0x47/0x60 [ 2092.621570] ? mempool_alloc+0x380/0x380 [ 2092.625642] mempool_init_node+0x2e1/0x560 [ 2092.628710] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2092.629891] ? mempool_alloc+0x380/0x380 [ 2092.629905] ? mempool_free+0x380/0x380 [ 2092.629918] mempool_init+0x3d/0x50 [ 2092.629938] bioset_init+0x33a/0x710 [ 2092.652632] blk_alloc_queue_node+0x137/0x760 [ 2092.657274] blk_mq_init_queue+0x4a/0xb0 [ 2092.661512] loop_add+0x2dd/0x8d0 [ 2092.664979] ? idr_find+0x47/0x60 [ 2092.668442] loop_control_ioctl+0x165/0x360 [ 2092.672788] ? loop_add+0x8d0/0x8d0 [ 2092.676565] ? __fget+0x340/0x540 [ 2092.680156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2092.684917] ? loop_add+0x8d0/0x8d0 [ 2092.688555] do_vfs_ioctl+0xd6e/0x1390 [ 2092.692468] ? ioctl_preallocate+0x210/0x210 [ 2092.696890] ? retint_kernel+0x2d/0x2d [ 2092.700801] ? security_file_ioctl+0x20/0xc0 [ 2092.705210] ? security_file_ioctl+0xa5/0xc0 [ 2092.709620] ? security_file_ioctl+0x93/0xc0 [ 2092.714039] ksys_ioctl+0xab/0xd0 [ 2092.717506] __x64_sys_ioctl+0x73/0xb0 [ 2092.721418] do_syscall_64+0x103/0x610 [ 2092.725321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2092.730513] RIP: 0033:0x457e29 [ 2092.733735] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2092.752636] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2092.760344] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2092.767616] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 12:14:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2f, 'pids'}]}, 0x6) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000540)=""/4096) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:27 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0x0, [], 0x0}) 12:14:28 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) r1 = geteuid() mount$9p_virtio(&(0x7f0000000000)='&cgroup#&[selinux\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x46, &(0x7f0000000240)={'trans=virtio,', {[{@loose='loose'}], [{@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x7e, 0x73, 0x806e33b670bf54a8, 0x37, 0x0, 0x77, 0x66, 0x30], 0x2d, [0x39, 0x73, 0x65, 0x7c], 0x2d, [0x0, 0x62, 0xd99fef4cb5d83d65, 0x7f], 0x2d, [0x0, 0x72, 0x77, 0x3f], 0x2d, [0x30, 0x0, 0x71, 0x30, 0x37, 0x75, 0x77, 0x38]}}}, {@uid_eq={'uid', 0x3d, r0}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cpusetcpuset'}}, {@appraise='appraise'}, {@fowner_lt={'fowner<', r1}}]}}) 12:14:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2092.774903] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2092.782174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2092.789444] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:28 executing program 3: r0 = gettid() ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = dup2(r1, r1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) inotify_rm_watch(r2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000000)=r0) 12:14:28 executing program 2 (fault-call:11 fault-nth:13): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:28 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x4, 0x0, [], 0x0}) 12:14:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff8d9c00000c000100520000003f0000010c000400000000000000000000000000000000"], 0x2c}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 12:14:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x2000) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000000c0)={0x0, 0x1000, &(0x7f0000000540)="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"}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x3, 0x0) getdents64(r1, &(0x7f00000001c0)=""/78, 0xeb05e6d71709d1ef) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x2, 0x2}) 12:14:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40, 0x0) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f00000000c0)) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x2) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) ioctl$DRM_IOCTL_INFO_BUFS(r4, 0xc0106418, &(0x7f0000000180)={0x5, 0x81, 0x1fd, 0x3ff, 0x0, 0xd6}) [ 2093.226967] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2093.249724] FAULT_INJECTION: forcing a failure. [ 2093.249724] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.286093] CPU: 1 PID: 26541 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2093.293580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.302952] Call Trace: [ 2093.305589] dump_stack+0x172/0x1f0 [ 2093.309242] should_fail.cold+0xa/0x1b [ 2093.313400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2093.319449] ? lock_downgrade+0x810/0x810 [ 2093.323640] ? ___might_sleep+0x163/0x280 [ 2093.327830] __should_failslab+0x121/0x190 [ 2093.332076] should_failslab+0x9/0x14 [ 2093.333756] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2093.335883] kmem_cache_alloc+0x2b2/0x6f0 [ 2093.348623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2093.354173] ? __phys_addr+0xa4/0x120 [ 2093.357978] ? mempool_init+0x3d/0x50 [ 2093.361790] mempool_alloc_slab+0x47/0x60 [ 2093.365940] ? mempool_alloc+0x380/0x380 [ 2093.370001] mempool_init_node+0x2e1/0x560 [ 2093.374242] ? mempool_alloc+0x380/0x380 [ 2093.378340] ? mempool_free+0x380/0x380 [ 2093.382321] mempool_init+0x3d/0x50 [ 2093.385966] bioset_init+0x33a/0x710 [ 2093.389705] blk_alloc_queue_node+0x137/0x760 [ 2093.394214] blk_mq_init_queue+0x4a/0xb0 [ 2093.398292] loop_add+0x2dd/0x8d0 [ 2093.401785] ? idr_find+0x47/0x60 [ 2093.405266] loop_control_ioctl+0x165/0x360 [ 2093.409616] ? loop_add+0x8d0/0x8d0 [ 2093.413240] ? __fget+0x340/0x540 [ 2093.416734] ? loop_add+0x8d0/0x8d0 [ 2093.420365] do_vfs_ioctl+0xd6e/0x1390 [ 2093.424265] ? ioctl_preallocate+0x210/0x210 [ 2093.428689] ? __fget+0x367/0x540 [ 2093.432183] ? iterate_fd+0x360/0x360 [ 2093.435996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2093.441548] ? fput+0x128/0x1a0 [ 2093.444839] ? security_file_ioctl+0x93/0xc0 [ 2093.449261] ksys_ioctl+0xab/0xd0 [ 2093.452723] __x64_sys_ioctl+0x73/0xb0 [ 2093.456603] do_syscall_64+0x103/0x610 [ 2093.460511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2093.465719] RIP: 0033:0x457e29 12:14:28 executing program 3: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000080)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000000)={0x7fff}, 0x0, 0x0, 0x8) rt_sigqueueinfo(r0, 0x0, 0x0) [ 2093.468917] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2093.487810] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2093.495524] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2093.502794] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2093.510060] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2093.517354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2093.524648] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x5d4, 0x7, 0xffffffffffffff63, 0x4, 0x3, 0x3, 0x3e, 0x5d28, 0x3bb, 0x40, 0x137, 0x7, 0x3, 0x38, 0x2, 0x4, 0xfffffffffffeffff, 0x3f}, [{0x7, 0x6, 0x6f97, 0x9, 0x8, 0x9, 0x7f, 0x81}, {0x6, 0xfffffffffffffff7, 0x38c4, 0xff80000000000000, 0x9, 0x6, 0x7, 0x200}], "1a9dd50ae75442f8", [[], [], [], [], [], [], [], [], [], []]}, 0xab8) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00040501ff00520000007f0000000c00040020000000001900000000000000000000000000000000000000"], 0x2c}}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc0, &(0x7f00000000c0)="4b023f393b1659603e9a131b396f54ed96d1e8c4436bb01645fc3e4e036e9528344a1fdb4c8f2f86941bf5b19a9ced2745e1a0f149243d1e2617d989f82af606f23c4be49de1d8584fa03ab03f371288df0f", 0x52) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:14:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 12:14:28 executing program 2 (fault-call:11 fault-nth:14): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) pwrite64(r1, &(0x7f0000000040)="d0d832c7e91d14392b0bea9a970b62311365b579d0606ebda4fe", 0x1a, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000180)={0x2d, 0x6, 0x0, {0x5, 0x0, 0x4, 0x0, 'eth0'}}, 0x2d) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2093.689134] FAULT_INJECTION: forcing a failure. [ 2093.689134] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.717168] CPU: 0 PID: 26566 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2093.724465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.733810] Call Trace: [ 2093.736403] dump_stack+0x172/0x1f0 [ 2093.740059] should_fail.cold+0xa/0x1b [ 2093.743990] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2093.749099] ? lock_downgrade+0x810/0x810 [ 2093.753259] ? ___might_sleep+0x163/0x280 [ 2093.757428] __should_failslab+0x121/0x190 [ 2093.761668] should_failslab+0x9/0x14 [ 2093.765469] kmem_cache_alloc_node_trace+0x270/0x720 [ 2093.770572] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2093.775167] ? lockdep_init_map+0x10c/0x5b0 [ 2093.779496] __kmalloc_node+0x3d/0x70 [ 2093.783305] ? mempool_alloc+0x380/0x380 [ 2093.787367] ? mempool_free+0x380/0x380 [ 2093.791344] mempool_init_node+0x138/0x560 [ 2093.795584] ? mempool_alloc+0x380/0x380 [ 2093.799645] ? mempool_free+0x380/0x380 [ 2093.803652] mempool_init+0x3d/0x50 [ 2093.807325] bioset_init+0x547/0x710 [ 2093.811055] blk_alloc_queue_node+0x137/0x760 [ 2093.815568] blk_mq_init_queue+0x4a/0xb0 [ 2093.819642] loop_add+0x2dd/0x8d0 [ 2093.823094] ? idr_find+0x47/0x60 [ 2093.826558] loop_control_ioctl+0x165/0x360 [ 2093.830913] ? loop_add+0x8d0/0x8d0 [ 2093.834543] ? __fget+0x340/0x540 [ 2093.838003] ? loop_add+0x8d0/0x8d0 [ 2093.841632] do_vfs_ioctl+0xd6e/0x1390 [ 2093.845526] ? ioctl_preallocate+0x210/0x210 [ 2093.849949] ? __fget+0x367/0x540 [ 2093.853437] ? iterate_fd+0x360/0x360 [ 2093.857270] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2093.862812] ? fput+0x128/0x1a0 [ 2093.866117] ? security_file_ioctl+0x93/0xc0 [ 2093.870543] ksys_ioctl+0xab/0xd0 [ 2093.874033] __x64_sys_ioctl+0x73/0xb0 [ 2093.877942] do_syscall_64+0x103/0x610 [ 2093.882304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2093.887500] RIP: 0033:0x457e29 [ 2093.890707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2093.909607] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2093.917311] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2093.924603] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2093.931881] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:14:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000003c0)=0x4) r2 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) write$P9_ROPEN(r5, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x34, 0x1, 0x3}, 0x5}}, 0x18) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000001c0)={0x40000, 0x0, [0x6, 0x7f, 0x7f, 0x5, 0x3, 0xff, 0x200, 0x81]}) write$eventfd(r5, &(0x7f0000000100)=0x80, 0x8) 12:14:29 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) setsockopt(r0, 0x400000000ff, 0x7, &(0x7f0000000000), 0x0) 12:14:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) signalfd(r0, &(0x7f0000000000)={0x7fffffff}, 0x8) 12:14:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x505000) read$alg(r1, &(0x7f0000000040)=""/42, 0x2a) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) [ 2093.939145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2093.946410] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:29 executing program 2 (fault-call:11 fault-nth:15): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2093.983963] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:29 executing program 4: open$dir(0xffffffffffffffff, 0x800, 0x6) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) ioctl$TIOCCBRK(r0, 0x5428) r1 = semget(0x2, 0x7, 0x0) semop(r1, &(0x7f0000000080), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') signalfd(r2, &(0x7f0000000000)={0xfffffffffffff801}, 0x8) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x7fffffff, 0x180810) getdents64(r2, &(0x7f00000001c0)=""/78, 0x4e) ioctl$TIOCCBRK(r2, 0x5428) 12:14:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2094.224430] FAULT_INJECTION: forcing a failure. [ 2094.224430] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.236752] CPU: 0 PID: 26589 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2094.244022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.253368] Call Trace: [ 2094.255978] dump_stack+0x172/0x1f0 [ 2094.259615] should_fail.cold+0xa/0x1b [ 2094.263518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2094.268635] ? lock_downgrade+0x810/0x810 [ 2094.272787] ? ___might_sleep+0x163/0x280 [ 2094.276946] __should_failslab+0x121/0x190 [ 2094.281191] should_failslab+0x9/0x14 [ 2094.284996] kmem_cache_alloc+0x2b2/0x6f0 [ 2094.289157] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2094.294282] ? mempool_free+0x380/0x380 [ 2094.298264] mempool_alloc_slab+0x47/0x60 [ 2094.302413] ? mempool_alloc+0x380/0x380 [ 2094.306482] mempool_init_node+0x2e1/0x560 [ 2094.310720] ? mempool_alloc+0x380/0x380 [ 2094.314778] ? mempool_free+0x380/0x380 [ 2094.318749] mempool_init+0x3d/0x50 [ 2094.322380] bioset_init+0x547/0x710 [ 2094.326102] blk_alloc_queue_node+0x137/0x760 [ 2094.330606] blk_mq_init_queue+0x4a/0xb0 [ 2094.334664] loop_add+0x2dd/0x8d0 [ 2094.338116] ? idr_find+0x47/0x60 [ 2094.341582] loop_control_ioctl+0x165/0x360 [ 2094.345902] ? loop_add+0x8d0/0x8d0 [ 2094.349525] ? __fget+0x340/0x540 [ 2094.352992] ? loop_add+0x8d0/0x8d0 [ 2094.356643] do_vfs_ioctl+0xd6e/0x1390 [ 2094.360562] ? ioctl_preallocate+0x210/0x210 [ 2094.364981] ? __fget+0x367/0x540 [ 2094.368439] ? iterate_fd+0x360/0x360 [ 2094.372244] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2094.377801] ? fput+0x128/0x1a0 [ 2094.381089] ? security_file_ioctl+0x93/0xc0 [ 2094.385499] ksys_ioctl+0xab/0xd0 [ 2094.388968] __x64_sys_ioctl+0x73/0xb0 [ 2094.392854] do_syscall_64+0x103/0x610 [ 2094.396751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2094.401936] RIP: 0033:0x457e29 [ 2094.405139] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000740)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x1, 0x1a8, [0x20000000, 0x0, 0x0, 0x20000030, 0x20000060], 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]}, 0x220) 12:14:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x402, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101040, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r2) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x2, 0x40) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80000141042, 0x0) close(r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x10507e) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x9) 12:14:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f0000000000)=""/78, 0x6f97cdc10578f746) 12:14:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2094.424033] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2094.431735] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2094.439007] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2094.446281] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2094.453570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2094.460849] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:29 executing program 2 (fault-call:11 fault-nth:16): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:29 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000340)='\x00\x00\x00\x05\x00\x00\x00w\x80!\xb7\x93F#v\x1c=\xc7\x86\xe9\x9a%\xf1GgC)W\x10H\x80\x8a{\xf3\xe2\xfe\xfa\xc1X\xe1\xcf\xe4%w\xe1\xae\b\xf0?\xb3\xd9!\xe6\xd0\xdc\a.\xa8+\xdb\x0e\f-\x05d\xf7\xd7y\x7f') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x54, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xb, "2e8682ac33b171e350846c"}, &(0x7f0000000240)=0x13) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000004c0)={0x27}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000440)={r3, 0xb6e}, &(0x7f0000000480)=0x8) [ 2094.535691] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2094.569052] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 12:14:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0xa0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000000c0)="10648061873e1520f1951ab19e15946a", 0x10) [ 2094.596636] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2094.610838] FAULT_INJECTION: forcing a failure. [ 2094.610838] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.629503] CPU: 0 PID: 26612 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2094.636785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2094.646136] Call Trace: [ 2094.648737] dump_stack+0x172/0x1f0 [ 2094.652437] should_fail.cold+0xa/0x1b [ 2094.656350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2094.661468] ? lock_downgrade+0x810/0x810 [ 2094.665628] ? ___might_sleep+0x163/0x280 [ 2094.669790] __should_failslab+0x121/0x190 [ 2094.674032] should_failslab+0x9/0x14 [ 2094.677838] kmem_cache_alloc+0x2b2/0x6f0 [ 2094.681990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2094.687564] ? __phys_addr+0xa4/0x120 [ 2094.691372] ? mempool_init+0x3d/0x50 [ 2094.695186] mempool_alloc_slab+0x47/0x60 [ 2094.699333] ? mempool_alloc+0x380/0x380 [ 2094.703396] mempool_init_node+0x2e1/0x560 [ 2094.707653] ? mempool_alloc+0x380/0x380 [ 2094.711729] ? mempool_free+0x380/0x380 [ 2094.715713] mempool_init+0x3d/0x50 [ 2094.719369] bioset_init+0x547/0x710 [ 2094.723094] blk_alloc_queue_node+0x137/0x760 [ 2094.727599] blk_mq_init_queue+0x4a/0xb0 [ 2094.731665] loop_add+0x2dd/0x8d0 [ 2094.735150] ? idr_find+0x47/0x60 [ 2094.738614] loop_control_ioctl+0x165/0x360 [ 2094.742954] ? loop_add+0x8d0/0x8d0 [ 2094.746594] ? __fget+0x340/0x540 [ 2094.750059] ? loop_add+0x8d0/0x8d0 [ 2094.753706] do_vfs_ioctl+0xd6e/0x1390 [ 2094.757624] ? ioctl_preallocate+0x210/0x210 [ 2094.762036] ? __fget+0x367/0x540 [ 2094.765499] ? iterate_fd+0x360/0x360 [ 2094.769310] ? retint_kernel+0x2d/0x2d [ 2094.773223] ? security_file_ioctl+0x93/0xc0 [ 2094.777662] ksys_ioctl+0xab/0xd0 [ 2094.781126] __x64_sys_ioctl+0x73/0xb0 [ 2094.785025] do_syscall_64+0x103/0x610 [ 2094.788919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2094.794107] RIP: 0033:0x457e29 [ 2094.797314] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2094.816213] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2094.823932] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2094.831197] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2094.838468] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:14:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080)=0x4a5efd62, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100), 0x10) lstat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f00000001c0)={0x3, @bcast, r2}) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) sendto$isdn(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="040000004000000094b7c7fcc5b90853f58ea012ffc045dfa4a4fae54fb8e76d4804df2fb851f2f3c585fa3cec3829db22bd7be6"], 0x32, 0x8010, &(0x7f0000001280)={0x22, 0xff, 0x4, 0x7, 0x1}, 0x6) [ 2094.845733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2094.853031] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000001c0)) r1 = syz_open_pts(r0, 0x800) dup3(r1, r0, 0x0) read(r0, 0x0, 0x0) 12:14:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xa) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2094.905145] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x50a, 0x10000) 12:14:30 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) [ 2094.959731] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:30 executing program 2 (fault-call:11 fault-nth:17): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) ioctl$SIOCAX25GETINFOOLD(r4, 0x89e9, &(0x7f00000000c0)) 12:14:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "c7e2da8ae9051b55a169cd577256820e"}, 0x11, 0x2) accept4(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000180)=0x80, 0x800) sendmsg$alg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="c47e07bae51d486a1bc67f568267e451a3618dfb990e1edc774557709276f5290c8f9f5a3043cf41a4267c5efb6bfe6d9dedf393a031a74b6e2ac02798c8c89343dc1bca9389803589eb99775d3eb1b754dc42f4f437cc2b31b5f7fbd6160c213411f4a254a7f7730fe64f121a2919f2f204b5ffe46ce7e5a93714954a3b298939a06865a7a4ff180d8c11994e9e5ea0353872116f68e10a", 0x98}, {&(0x7f0000000300)="118a1364eed758e936ad333719433f8688a78c7511c2395831d229c11da88293301b23ccd3c98f4a887c52910d36f37773b4abb44ff9ccd319045e3ff7d8c35e0046996aca0e319656a8ee0ee5c70e9eb7f32ca75a43fd4a2a77f27a6f44fc5d89d852351b9308f87de0b4c544afceb62636d09447f3f9fb46a1c6b74cf57f33ab9b2d43c5cb4aa829d3f081e84b4aac60d21cba474b7b4c1761d2377cb85cb41f1291cd31cdffc5d1125723901df1359e4b8370774f4d674d7c377fb3b1538ad31d36a8d4e19b6400c002f9f4b3e3a8ceb2e6f8315cd805e2444b5bb4b9c39cab8bbb9b1def7a0c4242759a0258a5bc66b5", 0xf2}], 0x2, 0x0, 0x0, 0x24000800}, 0x881) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000000c0)={0x53}) 12:14:30 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='\x8aet/\x01\x05\x8c\xba\xa0\t\x00\x92\x86') setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000080)={0xbf, @broadcast, 0x4e1e, 0x4, 'wrv\x00\x00\x00@\x00\x00\x04\x00', 0x0, 0x0, 0x44}, 0x2c) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x8000000, 0x3, 0xda, 0x9, 0x3ff8}) [ 2095.087853] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2095.109191] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2095.121062] FAULT_INJECTION: forcing a failure. [ 2095.121062] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.142555] CPU: 0 PID: 26641 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2095.149837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.159355] Call Trace: [ 2095.161962] dump_stack+0x172/0x1f0 [ 2095.165607] should_fail.cold+0xa/0x1b [ 2095.169505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2095.174621] ? lock_downgrade+0x810/0x810 [ 2095.178788] ? ___might_sleep+0x163/0x280 [ 2095.182953] __should_failslab+0x121/0x190 [ 2095.187201] should_failslab+0x9/0x14 [ 2095.191015] kmem_cache_alloc_node_trace+0x270/0x720 [ 2095.196124] ? retint_kernel+0x2d/0x2d [ 2095.200029] bdi_alloc_node+0x8a/0x100 [ 2095.203928] blk_alloc_queue_node+0x15d/0x760 [ 2095.208443] blk_mq_init_queue+0x4a/0xb0 [ 2095.213318] loop_add+0x2dd/0x8d0 [ 2095.216818] ? idr_find+0x47/0x60 [ 2095.220307] loop_control_ioctl+0x165/0x360 [ 2095.224634] ? loop_add+0x8d0/0x8d0 [ 2095.228308] ? do_vfs_ioctl+0x9e/0x1390 [ 2095.232299] ? loop_add+0x8d0/0x8d0 [ 2095.235932] do_vfs_ioctl+0xd6e/0x1390 [ 2095.239835] ? ioctl_preallocate+0x210/0x210 [ 2095.244243] ? __fget+0x367/0x540 [ 2095.247718] ? iterate_fd+0x360/0x360 [ 2095.251522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2095.256299] ? security_file_ioctl+0x93/0xc0 [ 2095.260716] ksys_ioctl+0xab/0xd0 [ 2095.264175] __x64_sys_ioctl+0x73/0xb0 [ 2095.268063] ? do_syscall_64+0x5b/0x610 [ 2095.272050] do_syscall_64+0x103/0x610 [ 2095.275964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2095.281169] RIP: 0033:0x457e29 [ 2095.284364] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2095.303331] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2095.311041] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2095.318311] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2095.325579] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2095.332845] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 12:14:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)='self%eth1.vboxnet0\x00') r4 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r5, 0x12) 12:14:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000ea5400000426bd7000fcdbdf2500000000", @ANYRES32=r2, @ANYBLOB="02000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000300)=0x1) [ 2095.340113] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000140)=""/110) 12:14:30 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) fcntl$setown(r7, 0x8, r5) tkill(0x0, 0x0) [ 2095.376402] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2095.496444] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2095.514757] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2095.557176] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:31 executing program 3: pipe(0x0) connect(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0xfdbb) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x7) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, 0x0) set_mempolicy(0x8000, &(0x7f0000000040)=0x1f, 0x0) ptrace$getregs(0xc, r0, 0x5, &(0x7f0000000200)=""/106) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x4, 0x0, 0x0, 0xd8, 0x1}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000280)=""/226, 0xe2, 0x12000, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @local}, 0x1, 0x2, 0x4, 0x3}}, 0x80) tkill(r0, 0x1000000000016) 12:14:31 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80000) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="07000000100000000000008000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="010000000100000003000000000000002df18a18cdc15f8abbcbb37c57a48fc11953b70a17c62b726a88c27517e01f0d60d334880d22de47713321a18a39c60c17ad3f558809ad9de947efed88b87cd6"], 0x80}, 0x1, 0x0, 0x0, 0x4008000}, 0x40081) getdents64(r1, &(0x7f0000000080)=""/78, 0xf882ddce) 12:14:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000001c40), 0x4) r2 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x100004e20, @empty}}) r7 = gettid() fcntl$getownex(r3, 0x10, &(0x7f00000001c0)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) r10 = getpgid(0x0) sendmsg$netlink(r5, &(0x7f0000001c00)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)=[{&(0x7f0000000380)={0x8c, 0x2b, 0x102, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x70, 0x20, [@generic="0295eeb0a473d50242254c6408377840e8b0c2d2257243ee549c3c566874cf11eade1c964fc2391c4ffab8ab30f46697ad59f12dfb4ddd7cfeb3f0a94a68cab3e9a8418b4ebca8786b73d95f31f74926086a108e4cec184026d516bc5a2b7a8f627cc5c8", @typed={0x8, 0x4a, @u32=0x8}]}, @typed={0xc, 0x77, @u64=0x100000001}]}, 0x8c}, {&(0x7f0000000640)={0x2b4, 0x2f, 0x4, 0x70bd26, 0x25dfdbfd, "", [@generic="203974be7848fbaa0c7c137e8d4897c89660a41825cf4178499ad065fcb09b1efca9c83a328d26fea4d04ce6f8369e0c75b71969d2c230b70ef85a3098ac1644e47af9bd0f4dacf5f221dab66b401424832da480e112b42427c68a837708a11815a10269e56c6ecad61fb6f4d8ea5ffc98", @nested={0xc, 0x4c, [@typed={0x8, 0x14, @pid=r7}]}, @generic="26af816ce22a7b215acaf5c54b46ce273be375b856907cac4adab81fc3bdcd6ee5766907c75e1022bb591af87a98dcbd11455e12b91f109a29bc99e8c1b3bfdb5afb73e726ad27f4ea4e4470ed502ebfb93fcb52a67ae3ba38f34ff05abc9311877f24481a867bfcfb1f18ab6c84ce68f3d86207c5d4e51111ec77ed7f558f91fe445d38c821bb87830e55f1720d32175e5a667a48f392c0146a158f525a9f78fc39dfc4e553d7dffeff547826c196a1213d8362456128b98fc12c0cced605db0f41eb81", @typed={0x8, 0x78, @pid=r8}, @generic="b45082534dc605bbe941c66fd68413ff581c0c165b16b739e0215c05707c9e52a41589aa44274339b3bfd397b0ec34014c5f67fed581c22fd9190148a921fa8473efb53289fe5cdad58d6ba1e2e32c0aac5510f89831707a6519ab3a341364e0a67e01b2101da5c108", @generic="62feeec6f9f0513682d0c638170a37e8e74443e407f0a1e2b7c66d1331f94df3585fb9ece3f93bc38647fa", @generic="96d62ff3676ff877dc63cef5705de8f154b1ec2638e6033447aad01ef37b0a26bd12d89d6ae39825beaa895bc2c06cc6ad6516f0a5921fc53437817a36434bac86ddb5ff4a549f8f82a957017e8327bf98b7c0965e32ec532d6718874c2f7a604044d97fd308c3904c1d269fc06a634e1f78022ad57e0385b57e03e9e50164b27bf9fdfd83b8d0a402054df9222cf1f98a2ec7a134ad4bff4621575a6c28b3ad7de3e55ce226222716d33fe9a6455d", @typed={0x8, 0x8, @uid=r9}, @typed={0x8, 0x45, @ipv4=@empty}, @typed={0x8, 0x65, @u32=0x37}]}, 0x2b4}, {&(0x7f0000000900)={0x188, 0x2e, 0x204, 0x70bd25, 0x25dfdbff, "", [@generic="37880ea7f9eb4d82677310b921df3acf6fa111654c16e3d1cfc5e706862a1a676330d4e507c2ecaf548676ed6a439b8e13124091204ee4f5837a82c84908fa5b8c653202d9b11e62000b1450114ad9e18aed937ec9d283d6206ba9bdf816cbaa674281fb", @generic="29fa359e7f3585fa26e5ac42b1381695ea0e55df54f70022c5c6490553d8fcfcd730f66698a66f36a68f365bb3e8576360b91ad64cfd669b57a9803f000be1a25ff5b3051eca12ed504db1b1833f90c7fa72cd51c1f340e501b24247cdd42250051f3579a5fe9b310e2a53c713216d183775e1733e1ea2558d5731389108036d81cee0e3919fbdd85a61a643ded3", @generic="285f84bf6e66cd7f7037296cadccace6c81ba04f39a1e6237ee3c342ba5ecbf401692520d7c7a14300a8cd73633bdcdcc120fb6ad74c6332729a18bb294ba6f39ff5692eb3d856cc88610699f1d93ac7efbe3d080f4339bb0b233c62f6412017dadc6fe24582a7c2d2de9f80a402b9860a671579dcec91d6d0245559983740264eb8e0"]}, 0x188}, {&(0x7f0000000ac0)={0x1108, 0x31, 0x10, 0x70bd28, 0x25dfdbfd, "", [@nested={0x10f8, 0x29, [@generic="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", @typed={0x8, 0x8c, @pid=r10}, @generic="66b504f915e763f9e430bbb9711fed8b71799ae8cde8afbd44842a7acaa068d724a083f48cf187ba6a7438bcfd18c008f254e14bfa6b549c852e55326abcc071e6aab19c9fe292e43258d6541061378bc1bdcb1609a010b4ecd496a62e7b5ddf948bbd9a5d3d1d4368ce7d8d91be6727e7641a48a10af28ffbee05561ac4e3b03fb9c4482051440d19c20e82d9ce0aba17d27c68b6a9652eb8124092353ac71231608d7966293f16d8a6de07eeba0a442b13618d8344d9187846d49e763ed20bbdd757e984d013bb8736eb69f838655e119de3b62aa87093d30a", @typed={0x8, 0x5e, @u32=0x8}, @typed={0x8, 0x18, @fd=r6}]}]}, 0x1108}, {&(0x7f0000000440)={0x10, 0x14, 0x200, 0x70bd2b, 0x25dfdbfc}, 0x10}], 0x5, 0x0, 0x0, 0x24000001}, 0x0) 12:14:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0xfffffffffffffffc, 0x3, 0xffffffffffffff75, 0x3, 0x6, 0x1, 0x9, 0x5, 0x9, 0xfffffffffffffffb, 0x5}, 0xb) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000001040501ff442cc83492bbc2d80a1a2e0f6203a9e90080f7fdffff2e0a000f000c0001005a000000ff028363a4e14d1a5a5a0c086bf0f3123f7a39b68d677536657723c89c9e1c2058421de00436c0efa3c19c136354a17fd58be27688376a602ec127e2b9670c7a3f172dff5ed5f8f4060e5c8b50b94cdd4c7087447f67f5071330a433c4d72fd12d33df8de30210ae351a2afd08db37307bc9c0692ccb0a6a9a46028fd15903369af6148d"], 0x2c}}, 0x0) 12:14:31 executing program 2 (fault-call:11 fault-nth:18): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2095.813773] FAULT_INJECTION: forcing a failure. [ 2095.813773] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.817188] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2095.848047] CPU: 0 PID: 26672 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 12:14:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r1, &(0x7f0000000140)=@name, &(0x7f0000000480)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_buf(r2, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$media(&(0x7f0000000540)='/dev/media#\x00', 0x80, 0x504) ioctl$VIDIOC_STREAMOFF(r4, 0x40045613, &(0x7f0000000200)=0x5) ioctl$SIOCRSACCEPT(r4, 0x89e3) openat$cgroup_procs(r0, &(0x7f0000000600)='t asks\x16\xd7\\;\x8c\xc4fz\xa6E\fR\xdd}f\xc3\xc8Ro\xcdT\xfe\xf8\x10@\xbc\b\xdc~\xa7\xbe\x1b!G\awb^/\xe6%YF\xae\xfe\x9e', 0x2, 0x0) r5 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f00000000c0)=r5, 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000000480), &(0x7f00000004c0)) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x1, @bcast, @netrom={'nr', 0x0}, 0x8, 'syz0\x00', @bcast, 0x0, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) r6 = shmget(0x2, 0xc000, 0x1, &(0x7f0000ff1000/0xc000)=nil) shmctl$IPC_STAT(r6, 0x2, &(0x7f0000000380)=""/237) 12:14:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) [ 2095.855344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2095.864695] Call Trace: [ 2095.867334] dump_stack+0x172/0x1f0 [ 2095.870986] should_fail.cold+0xa/0x1b [ 2095.874880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2095.879984] ? lock_downgrade+0x810/0x810 [ 2095.884137] ? ___might_sleep+0x163/0x280 [ 2095.888318] __should_failslab+0x121/0x190 [ 2095.892558] should_failslab+0x9/0x14 [ 2095.896390] kmem_cache_alloc_node_trace+0x270/0x720 [ 2095.901505] ? mempool_alloc+0x380/0x380 [ 2095.905581] ? mempool_free+0x380/0x380 [ 2095.910156] ? mempool_init+0x3d/0x50 12:14:31 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000002600)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x40000000000001, 0x21f) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000019c0)={0x0}, &(0x7f0000001a00)=0xc) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) r6 = gettid() stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000002000)=[0x0, 0x0, 0xee01, 0xffffffffffffffff]) [ 2095.913967] bdi_alloc_node+0x8a/0x100 [ 2095.917864] blk_alloc_queue_node+0x15d/0x760 [ 2095.922367] blk_mq_init_queue+0x4a/0xb0 [ 2095.926441] loop_add+0x2dd/0x8d0 [ 2095.929898] ? idr_find+0x47/0x60 [ 2095.933380] loop_control_ioctl+0x165/0x360 [ 2095.937703] ? loop_add+0x8d0/0x8d0 [ 2095.941355] ? loop_add+0x8d0/0x8d0 [ 2095.944995] do_vfs_ioctl+0xd6e/0x1390 [ 2095.948889] ? ioctl_preallocate+0x210/0x210 [ 2095.953329] ? __fget+0x367/0x540 [ 2095.956784] ? iterate_fd+0x360/0x360 [ 2095.960588] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2095.966138] ? fput+0x128/0x1a0 [ 2095.969444] ? security_file_ioctl+0x93/0xc0 [ 2095.973857] ksys_ioctl+0xab/0xd0 [ 2095.977322] __x64_sys_ioctl+0x73/0xb0 [ 2095.981214] do_syscall_64+0x103/0x610 [ 2095.985126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2095.990317] RIP: 0033:0x457e29 [ 2095.993514] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 sendmsg$netlink(r0, &(0x7f0000002080)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x4080}, 0xc, &(0x7f0000001e80)=[{&(0x7f0000002640)={0x2854, 0x15, 0x200, 0x70bd26, 0x25dfdbfc, "", [@nested={0xc0, 0x89, [@typed={0x14, 0x9, @ipv6=@loopback}, @typed={0x14, 0x5d, @ipv6=@mcast1}, @typed={0x8, 0x79, @pid=r1}, @typed={0xc, 0x5d, @u64=0x6}, @generic="0f8cd2f29b335b9c5570d024ca63ef3ad4ac07f77a56cc29f325af092b823023c6092974f113efbfd945f41a275df3d3eadcddd384b276b5c7fe7a72cd07d735293d4ea5f9e58a54b8fca8521ac9f5f5ef357a67d08d6a1753c8f04ff02547d8bffaa7467db09b48ecce40ef17298b0905235440a0342c501802b42e4d9589d2"]}, @nested={0x1c0, 0xd, [@generic="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", @typed={0xbc, 0x7b, @binary="7bd06cb4216984f1e36d8f966896f003e6d30ac5d44c8919ded8395163a147feca139b8a373237e6e6db874aff75d421d8be483708f434576e909137c91aba947b2617ff624b35a63f0a99da5463f949cc75a75cd766d4c8f487aced1de575d1a06f220e15faf9d4bd53db42e55de97eb69aa757285fa59e004017a54f56d13a31f92d012ae7531ae9235d3fd0306f573fa5508f73964e0c2819ed5f444c48387d4e9059b737af15c83adb934f90b3f813663d4810f8e47d"}]}, @typed={0xc, 0x56, @u64=0x94}, @generic="deb89ff972ecee270326dfc231329a558dfd7cf4c3663c5711d524ec49a6a9f8a7473b049fdb3ad405bf3768adb6bc8a09ecbc5fc1f48a6f4bf89af064c3556bb194d8e988be0f0c34cc15073c337ae7d2a30afe38245a1b399cfa14c572d0f29ed2e098e052e246b7e2db7a4f5cc2f0ebffdc8a9faa0171f1c1fd665589be2a0b35650f9f1798ac18735f9e62006aeea3c8b6ed40d13b85db7158c7518f9568ace1885bddefd2f990bea9ef79fa7c79634db60632f865fad79425edc8737ba0081dbec13da3b2799055bf", @nested={0x13dc, 0xe, [@generic="920524cabb60445f0c1c85d4badbe9cb603a2e7a22edfd9671b5ea1baa805f293fe07c2bec6a80a4ebf6bccf37180198f715d5c5234d298c7fcdd255ee1ece7ede8493b751022c66c7922683c920ee114ac46400c07f93736271e036d3", @generic="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", @generic="988b25f0eadae77f7f6868da30d8fef7bb730a9b559aa7fc917c219da3536ef27fdf6b7d29576d543eaea596f3f94d7eb28fbf35922038c61c93abef21dd6f59bf9f4b650809516239690b317443664878414b5f763cb518646dafccb22438c99575cb79c965dce07f548e7d9cb47fb3165566bb7c5ff92cded5d1f9ac3756ea5c28c79dfa3ec0cb55dc4fcae3ebe172f8d49363c6c7f95e05c955ba23ce66813b7a6816b0d300bd243b7425bd90", @generic="1e7dd40059c3dd618f89325e835ada8a21073304604d42544a8873151eb52b8356c943aee6241b02b33a7e6d2c8f05bf59d23cae88052bc8e4096df68a573dc32b7f6aa8a519f23340abbcf11293973e98bb983ed74bbb8e932adcc103bec6d7f918b6225aa774c58abae6f0ab43171371d471ba3c2815e8e9e982912d1872b8695b0e07015050d256c205d1b1b35bce9b80f2c2490d6ca7698a11698731c5ead0ac05382e6eacfe89e4e5b6620d797e984ac1158407e302ce4126eb1a3edcdf87fc960c75ec0a1c98778696421082bcb46984523e85cc65b884260b96377658e786", @typed={0xa8, 0x71, @binary="11e318ad15ae3a493f5ee167425ea59ef7f46e7a49b265e8babf13c865940c0a1659e28a44407752bb07c530d2656b11a1495ded766162613fe767a4e79dbac70e8f8f1daa41dd689566a4a1938a062a259a9b6af6c7aa2f7163af16a7a687c5011d171a70b4e5689fd899afcfde8f23c0fcb6cad1f150f8deb57974766471e718e06effdcc0156d1b7dc0ebcb8c358d62f10ec58e8b68f4342f923527774a5aad"}, @generic="5b6db4740b7870a779004b26794e7419b37993b5a904e1d9378bbdeef136ca5010c196df20aeed15666414beb45ac9ed8834a05cbc809860246be579590dbdbb4b0426ed79ca2bb9c22e6a80e4c1c2117be9fba48a05a15f11a7a6037beff716a34d8f0bdf49d3fc752d81fb07595b5af8742577fe57c24e170f10c9d7c089e345c27ccac49a3f6856e230c08aca6f", @typed={0x10, 0x55, @str='/dev/vbi#\x00'}, @generic="678ca585b5135ca1220b3d43f3b180a5a8808864b00d07a561f46c6df64dadd591a6d515d30c787d302f87ea8bcd63170fd500359845b43e2c7c392939013d127e9b86d7d105f6b046200ac3fde97a8f9c4364c4c81f6ffc92377f732549fa621c68b16897cb3af1f960f7773e946ed4b2eb095d0fc6155a8dfdabb15335f15dba108d0cd44bb86a0165937404144dc1adb70ec368c7e4f186947378cf4d55c001cc6e"]}, @nested={0x103c, 0xf, [@generic="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", @typed={0x18, 0x20, @binary="420f594d2ad6a17e14d2c6e148c125c7501b"}, @generic='N', @generic="28e551c739d264d3649ffb", @typed={0x14, 0x9, @ipv6=@empty}]}, @typed={0x8, 0x7, @ipv4=@multicast1}, @typed={0x4, 0x8b}, @nested={0x5c, 0x75, [@typed={0x8, 0x79, @str='\x00'}, @typed={0x4, 0x3a}, @generic="c5271cf14d422411f54c3019549f52c64e7fe5b0e55f48e246ff53eb0ab44b91cb", @generic="3d77ae69737dfc8ed992d82d9d6ef77918b6151f870e914fd7dabc4a88a87226c74e", @typed={0x8, 0x87, @ipv4=@local}]}, @generic="627a77663b7e5e77e013ab6072969032c0f3f1fc3a01107655188f5e4bd3e6145e6ea8f81da759e762764f6b2af47ab99b480d936a0758522493a1e7e569b3159250e3b099200749e2f1462226421931682f5e819027d92f535773ae3b20fe78da3046368fd115dea5ffbe9b"]}, 0x2854}, {&(0x7f0000000140)={0xa8, 0x27, 0x400, 0x70bd29, 0x25dfdbfd, "", [@nested={0x74, 0x3a, [@typed={0x10, 0x91, @str='/dev/vbi#\x00'}, @generic="1521f808a8d4b773df5e920752275f13ba74a247ca54aeea4bcbbab05ec95840ce847a048013ea9ced149b9bc75025e744309db7507dcacd41bd387160f1ff8a8907c524dafd095ac1e6a4fa694ad126be2cd95f20abe62e59946e5da557e77c"]}, @generic="27a15419995579b09d4bee3d3104fa54b34e8423ddaa319997a0355a37040496958bb2"]}, 0xa8}, {&(0x7f0000000240)={0x1740, 0x24, 0x902, 0x70bd2a, 0x25dfdbff, "", [@nested={0x2d4, 0x8d, [@typed={0x4, 0x82}, @generic="b784a3d5fd53bea18d96a0ca07c2ae8c1db081dfbef82cd89e89f218866f447a2baf457d84a7b46a88980636d86aaf6fa3bb5363583e6d748132ca7f6d02ccf5531a4b29d087734d4900501d223be948239bc9b9c1095a9d303878264c8cd976ab6a5044bfa677c97e7215c29cb4d8ff7c635708f8b6011c6c9585e340307cb4", @generic="90396f34896b36fc1030320c28e1e22eee9f0e3553c2d9d3af3f7b58ad23b30229467cda9023cd74d9c9c7b6351dee8432eef5cc", @generic="d4ed16634236fa4ed70fe85f7d2b62b3457c757bb2ff0909af1d6bbe2e5c5b61dba223c40a7e41ab61cc72f1fba632c90f59e87c52f0e722324b7aeee13e2437b8dece92f3b0b4b8270d7f1a1426d98f7817563329eb912edabb655c9e9287a2f50e7300df56e50513f82f2923205357253b2519d94cd37ed4d81e6c8d1d1e9d2b57198903cf76ed9e44aa7a64af8db39afadeee92f3cf826da29d7fc2934bc2db806358cabb5e0240c9775def7bd061ca3af8d8c7c4a0ffd4e62218c1f9b8c3def55e4ad874589568f5", @generic="6505fda52c9df3743db264c11a8571e56ef840971231293bb5fd98550d4c3216887a21ec8d24e2c22302d29e4ef5012d385a7b0d435e44cc3748088b7246899093c611b2191db41b93b4c41b18cc20d0de1d623dcf833ba08cfd1363700310b998a72d8799cffd232b2928d9ba60e14ea1fe194594eb0ba4f34500bc88c52b8b2d2c6169bdd822454234d795d23f19b1b45c34c67c1becc9b49e20c00611941a9175b0ad0304d2ba7c2563a02a378bd343bd86775362b445e5513a174303e1b6577381f4560f4bdf441671c157e63bc3c167b217d1e8c86e", @generic="586bf55c20502aeb8ce34311e5e86be0e2fec1a3368e04c37951aa3d53f273e57c598ed6834992befab75f0db97c30acf9c13309b65997cf7d122e69e8c757fd8e91a1f8be2e6f485db94d1b725f50c6521716a7cf47c0f348391afe596e8d52165df46ccbabab703da9f73644489aa01084", @typed={0x4, 0x4c}]}, @generic="55548801a93b151a726e019063816f2b01027f39637b717bddc71428aa46de2c5120373a71716e73f20f5ca240c1e2ca33aa7d91a177f7014e80211b5940910ce77e31bd441467a2b13cf8ceecd2be4d3d2bc540f175f25053d1c70e51fc27872f121c3332050ccce05fcfb4a52c0784859131e41fda8f2b5fc3e803fc94fd3e7e4071fa619d50e0c96e0412b30079522dbdc793eea7f31ffa00e32268cbed7fd81228e5c489e52afe9f6a838a267048be9bc61bf4a1e6be15144062dd3069cef1a33b98b8440c31ca5b01c15db84ac59f2b10648c0af04bc9c01218d6d0619090c9740622a0a88b", @nested={0x1170, 0x1a, [@generic="836f89659cf4cfaa9cdd0395acc601adabfacf7891e6bdd71be51a03dbc66d6fa27cac2ca4973c45601ac5394e3496c1de9d5e0802a9d74bac197c7b47226473cbed7bb6505328d989c96d3c7a330e256888a91a6c343cae0e04ad25b39e029b6176a5713477", @generic="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", @typed={0x4, 0x38}, @generic="8947107498bf0abb2c145fab2df0750e5e3ddfcc9ca093c37cd3e76726980c738f5b66fca6148d2bae171c7423561763d2852911254b9289c544119917ef708c54298a3e4f50bcf77ba7f34dff94178e4b02ab6c063dae27e8cab0d244faf2814fb29ba62d6aaa28c1af59301c5d0a4336773fdec476adf06695f0b0f6c09bea375fed60d6bc4a1f46ac5d8c689be708f1", @typed={0x8, 0x7d, @u32=0x2}, @generic="01f0b03676e49fa1d2d1b778090e2ed7c66ca98fcc3e33f52b78345ac53bc94532707908d728fe7a566f5cdee2a1af2253498a1690580e8421246c31d3d1531da7f6804321d98a553d8daa", @typed={0xc, 0x37, @u64=0x4}, @typed={0x10, 0xc, @str='selfproc..\x00'}]}, @nested={0x1f0, 0x96, [@generic="f783fc423bb61d334a9161768866740092fd611c875f10b15451ddc5f62132b3187a06d18a13c989ac3bfc9982d79e6222c3f7f120bc4168bdd585bea8e593f7d168d729ca4ca6fa9914e841c4bc74978e2f8957dcf82459c14c55e580682f6e9f94c11cd565c470d939299c81410d241600c2d0da16f2dbe5a5d60fa96e0dc8b6b3d7f77ff56ff3da1f3ea80010ec5ef9c86d7d67a4f0a9d79d26270f84e41b02d852a59bea91a81fa9ad6c7cba293cbe0eeef37e076d4e4beac393a7c75427c659dae23f6396607541", @typed={0xc, 0x7e, @u64=0x101}, @typed={0x14, 0x52, @ipv6=@ipv4={[], [], @remote}}, @generic="8aa0676c2104507920f9be934bd6f7108b3736acf745f8dacc44598b38f1a0e35c7a5198e33eb05aff3396b16548e2c887977dcce90e3093ed183a653ceaa5125030aad0c6ee8938181074d6d306e4aef73b812feb69d36c8ae0c6fc94d13531eb995aa1560f48a3c66adf69776dfc50685dc9e726e99685fef0865008d868c908d67f934125bdd34220f84e351e4a", @generic="b19978408b01202bd2e9578d98230e3e859b13b95e43febca497dca4cf10ecfa036daeac6313aad24f196a87f756446c8e2751791831691297810fb59a5e633c5613741efb4fc93b528d94f74750fc43af5c180c56e49861fdcb56c0c541926e1c9a0c76bc702ccb0ed35b3c818b6159"]}, @typed={0x14, 0x6, @ipv6=@dev={0xfe, 0x80, [], 0xe}}]}, 0x1740}, {&(0x7f0000001980)={0x20, 0x3f, 0x10, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x10, 0x6f, @str='/dev/vbi#\x00'}]}, 0x20}, {&(0x7f0000004ec0)={0x127c, 0x41, 0x204, 0x70bd27, 0x25dfdbfc, "", [@generic="32667375b753250b91cd32fbc46f6452255251835ae39e29fad8e385b7dc5d5be488061de50ea2dba1e59e5feb3b89980d47f647e70caaa48a31b7cd9a51d3d35c7031abbd61938fbfdd4b4108a1365704ebe3288fa4b73eacc4e693cd6092919d3704400cce2c1065c06c77bf73db2ebb1396ed962e8271bb38511c9f70606d1336efd665bc1637326a07f0be090b6510ef03d6", @generic="d7ea9469c6517ecc166279f323151d74e5718263901045741fa776181034ce99fd65505c128b7e0228bb8d85fc60be964322ad4eda9d4754aeb2da230f720185c91f026a5d7e0538547a7a90a562ad6129b5024a3d", @nested={0x164, 0x32, [@typed={0xc, 0x9, @u64=0x4}, @typed={0x8, 0x82, @pid=r2}, @generic="de5efc32b08f7615074791d5ac50b6f094", @generic="a16b1c35a94669151bf3362073dfc647f7ef8f960b508797800f585be37dab6ee0ae081b81bf3d30ddbc8b845e2861f50f37da63438c664c8ea9936e0d2eaba9144ef09748b87b33bd0230931e34e9ce89754e3f071c5379e6d80e8f7cb78f06fb058c510ad9ad9f370f0137a66ec5cb8d162f44a51f1e6f3302937ea0317bbaa555c155ec7ac2c68d9ef66436de6c68d8a8fc9f6cc699bfa78223cc4fa8b2ffaec04fe1917646b7dc4f37b24b2a3b6afd4b1e4ca46dba08bebc716fcddc89e543fccb9a9f44cb37ebbc707181bc66378eab96c0f1310991c7096b9e", @typed={0xc, 0x48, @u64=0x3ff}, @generic="a7e86b8e72c8b667b4e5a93aac650def8cbb5a0468bd44", @generic="50c9282974dc83f76491cd1cab846da2332be0ca0ca79b1fce67bee8779cda6e", @typed={0x8, 0x4a, @uid=r3}, @typed={0x14, 0x32, @ipv6=@local}]}, @typed={0x8, 0x89, @uid=r4}, @nested={0x14, 0xe, [@typed={0x8, 0x8e, @pid=r5}, @generic="e947d3955760"]}, @generic="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"]}, 0x127c}, {&(0x7f0000001bc0)={0x84, 0x21, 0x100, 0x70bd2c, 0x25dfdbff, "", [@generic="4ff5b76c3aec51a35379907406dc3b2002e9cb41239fdfa173d7c75acda6790c7fd13c07f62f7cebb7a7b98e3611194b825c4da487e7c14b9de4288e5204b257ed396de79cef99dedad79c3b9ec9e6805ffc410d748f4f1d49c6b1db3504bdd1f88bfbda974af57367ccc73b1c9f3fecbd"]}, 0x84}, {&(0x7f0000001c80)={0x10, 0x34, 0x200, 0x70bd29, 0x25dfdbff}, 0x10}, {&(0x7f0000001cc0)={0x10, 0x12, 0x300, 0x70bd26, 0x25dfdbfc}, 0x10}, {&(0x7f0000001d00)={0x160, 0x15, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@generic="3b9c7732c807743d7f074937b7e993b6d441883f50e380f1d953fff98ba50e160a7050545eef323bb67b3aece000902225a1739f79fc6ac378e2eaff067eb64e801c1a167860ba3429953106ae9a3df973d7d786875bb5dadffeb8d71362a4b8fc2c91988875847e60f10a7c467ea8ccda1e947cb9c0279507", @typed={0x8, 0x26, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @nested={0xbc, 0x14, [@generic="6aac5d94b4b8125c5f4d9c71852785d6635405462745e9e7e1d1c016d1fea89d5a57e4a6b71e0c2eb2e2db39bdd6a76293bb8322ad0c25a026af924ccfb6de0b7321ea5c6dcf1643e090e3f142748b6abd20edc0a9892ee2c5a1ff61b7af761515c74e499450a423fb8bd2050f1d8b078295b05df53c97c9e68c", @generic="112d94f7dbc582c424cd0d394c5f66bdc61d88d68edfc3195c3bab8627ec0622682e982148683eaf4327fa3a15d0ba05e08016f3a06319d7ae7244baff"]}, @typed={0x8, 0x1a, @ipv4=@rand_addr=0xfffffffffffffc00}, @typed={0x8, 0x77, @u32=0x1}]}, 0x160}], 0x9, &(0x7f0000002040)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x18, 0x1, 0x1, [r0]}], 0x38, 0x14}, 0x40800) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$nl_netfilter(r9, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:31 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x2000) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@timestamp], 0x1) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a00000c008f94a8153a048969e80b0400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getsockname(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f0000000080)=0x80) accept4$unix(r0, 0x0, &(0x7f00000000c0), 0x800) getdents64(r0, &(0x7f0000000140)=""/78, 0x14f) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000001c0)={0x8000, 0xffffffffb2487b1e}) [ 2096.012438] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2096.020147] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2096.027412] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2096.034708] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2096.041972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2096.049238] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2096.092614] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 12:14:31 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) fcntl$setown(r7, 0x8, r5) tkill(0x0, 0x0) [ 2096.311703] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2096.371337] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:34 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = dup(r0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x3743cc407ff1109f) r2 = gettid() setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) fdatasync(0xffffffffffffffff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0x4, 0x4) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) syncfs(0xffffffffffffffff) io_setup(0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) tkill(r2, 0x1000000000016) 12:14:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setreuid(0x0, 0xee00) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) fchown(r1, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) flock(r0, 0x1) getdents64(r0, &(0x7f0000000080)=""/78, 0xffffffffffffffbc) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x400, 0x0) 12:14:34 executing program 1: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000001840)=[{&(0x7f0000000180)=""/83, 0x53}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/167, 0xa7}, {&(0x7f0000000540)=""/178, 0xb2}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/127, 0x7f}, {&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000001680)=""/164, 0xa4}, {&(0x7f0000001740)=""/232, 0xe8}], 0x9, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 12:14:34 executing program 2 (fault-call:11 fault-nth:19): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:34 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) fcntl$setown(r7, 0x8, r5) tkill(0x0, 0x0) [ 2099.241576] FAULT_INJECTION: forcing a failure. [ 2099.241576] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.244191] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2099.280457] CPU: 0 PID: 26711 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2099.287740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2099.297089] Call Trace: [ 2099.299685] dump_stack+0x172/0x1f0 [ 2099.303335] should_fail.cold+0xa/0x1b [ 2099.307226] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2099.312365] ? lock_downgrade+0x810/0x810 [ 2099.316526] ? ___might_sleep+0x163/0x280 [ 2099.320703] __should_failslab+0x121/0x190 [ 2099.324952] should_failslab+0x9/0x14 [ 2099.328765] kmem_cache_alloc_node_trace+0x270/0x720 [ 2099.333863] ? mempool_alloc+0x380/0x380 [ 2099.333875] ? mempool_free+0x380/0x380 [ 2099.333889] ? mempool_init+0x3d/0x50 [ 2099.345691] bdi_alloc_node+0x8a/0x100 [ 2099.349588] blk_alloc_queue_node+0x15d/0x760 [ 2099.354087] blk_mq_init_queue+0x4a/0xb0 [ 2099.354108] loop_add+0x2dd/0x8d0 [ 2099.361619] ? idr_find+0x47/0x60 [ 2099.365089] loop_control_ioctl+0x165/0x360 [ 2099.369409] ? loop_add+0x8d0/0x8d0 [ 2099.373031] ? __fget+0x340/0x540 [ 2099.376492] ? loop_add+0x8d0/0x8d0 [ 2099.380122] do_vfs_ioctl+0xd6e/0x1390 [ 2099.384015] ? ioctl_preallocate+0x210/0x210 [ 2099.388425] ? __fget+0x367/0x540 [ 2099.391883] ? iterate_fd+0x360/0x360 [ 2099.395691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2099.400473] ? security_file_ioctl+0x93/0xc0 [ 2099.404904] ksys_ioctl+0xab/0xd0 [ 2099.408368] __x64_sys_ioctl+0x73/0xb0 [ 2099.412273] do_syscall_64+0x103/0x610 [ 2099.416187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2099.421379] RIP: 0033:0x457e29 12:14:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000001c0)=0x5, 0x4) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r3 = fcntl$getown(r0, 0x9) sched_setattr(r3, &(0x7f0000000080)={0x30, 0x6, 0x0, 0xfffffffffffffff9, 0x6, 0xa3, 0x3f, 0x766}, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f0000000100)={0x2, 'syz1\x00'}) getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000003c0)=""/172, &(0x7f0000000000)=0xac) 12:14:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80040, 0x0) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000040)="cc1554028465a778d5b47608b2f7bc3ca7d86f770b34677074773ba10b2e2f5b44184425631511b156b65569ed83538ade9b5d512306bec6c89765a05316d41b8c4a190b1f933b7d81e4c1ff79eeba575bbe38e74ea9407028ade0323148d4397d1e2c25024478d28aa7868cc37965dea136afa4d1d68f02ed6dae2e1eb38148be13ee4764f4ee58c95a5acc80a597a36c9aa6080b3c1c2f71d6f939e52b9538f29054460d9de8183167f93d7fd51f097f257e6e63c2a904aed8decd9849e9be5e561d5aec1a562bfb1637f8494328f7f53c2c28cd6fe269850348a1e7af1cd811bd4a6d0f7377c5a9fe0f84c8b9a88d86bf55", 0xf3) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r1, 0x804, 0x70bd2a, 0x25dfdbdc, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) [ 2099.424583] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2099.443481] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2099.451185] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2099.458451] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2099.465721] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2099.472999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2099.480274] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:34 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) [ 2099.523070] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2099.531758] validate_nla: 5 callbacks suppressed [ 2099.531767] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:34 executing program 2 (fault-call:11 fault-nth:20): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f00000000c0)={0x7, 0xff}) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0x0) [ 2099.669244] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2099.702091] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2099.702550] FAULT_INJECTION: forcing a failure. 12:14:35 executing program 4: getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000040)='eth1*\x91\x00', 0xffffffffffffffff}, 0x30) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000003c0)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b2\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x94kX\xe0 \x9f\x9010\x14\x02\xeey\x18\xd6TK\xea8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00A\xb13\xf0\x17\xadlh\xd4\x9d\x17\x89Z\xa9\x9c\x0e\x93\xc3\xa1\x15%l\x00m(L\x1b\xae|\xb6\x80{)\xcd\x95U|r\x9e\x02\xbd\xda\xa2\x13a\xa4?\xc4,Tv\x8e1\x95\x93\x95\xa0\xb13\x8aW\a\b\x8f{h!,\xa7\xe4A{F\x03Y\xa8\xa3\xa1\xd2\x8d\xc6\x9cN\xc4}i\x96\xe1h\xc0\xe4\xd9[~H\xcb') setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x3f, 0x1, 0x6, 0x0, 0xffffffffffff8000, 0xd6, 0x5}, 0x1c) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) [ 2099.702550] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.724392] QAT: Invalid ioctl [ 2099.737505] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2099.747166] QAT: Invalid ioctl [ 2099.759369] CPU: 0 PID: 26739 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2099.766649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2099.775996] Call Trace: [ 2099.778597] dump_stack+0x172/0x1f0 [ 2099.782229] should_fail.cold+0xa/0x1b [ 2099.786129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2099.791241] ? __should_failslab+0x99/0x190 [ 2099.795594] __should_failslab+0x121/0x190 [ 2099.799852] should_failslab+0x9/0x14 [ 2099.803667] kmem_cache_alloc_node_trace+0x270/0x720 [ 2099.808777] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 2099.813560] blkg_alloc+0x93/0x590 [ 2099.817105] blkcg_init_queue+0x27/0x3d0 [ 2099.821176] blk_alloc_queue_node+0x541/0x760 [ 2099.825677] blk_mq_init_queue+0x4a/0xb0 [ 2099.829752] loop_add+0x2dd/0x8d0 [ 2099.833206] ? idr_find+0x47/0x60 [ 2099.836696] loop_control_ioctl+0x165/0x360 [ 2099.841021] ? loop_add+0x8d0/0x8d0 [ 2099.844646] ? __fget+0x340/0x540 [ 2099.848105] ? loop_add+0x8d0/0x8d0 [ 2099.851736] do_vfs_ioctl+0xd6e/0x1390 [ 2099.855628] ? ioctl_preallocate+0x210/0x210 [ 2099.860037] ? __fget+0x367/0x540 [ 2099.863506] ? iterate_fd+0x360/0x360 [ 2099.867316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2099.872870] ? fput+0x128/0x1a0 [ 2099.876162] ? security_file_ioctl+0x93/0xc0 [ 2099.880571] ksys_ioctl+0xab/0xd0 [ 2099.884034] __x64_sys_ioctl+0x73/0xb0 [ 2099.887925] do_syscall_64+0x103/0x610 [ 2099.891818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2099.897007] RIP: 0033:0x457e29 [ 2099.900203] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2099.919100] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2099.926804] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2099.934079] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2099.941354] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2099.948620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2099.955909] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c00840000d022ff0238e93e9cbb4b11cd8feda88d3865020bc54b31a2116755b3e3e0a17d709304880c465ede53e94543e6d83a0f3a6a8e6f5a02cd75f9f1a8c76845e0c3f4e6f3803f826777c58e67ea32caad74959a35411bafe1e05c57861437155304702b87868517b9603a0922e3eb8e732cd67906aa6b357ccf5be1d5"], 0x2c}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x201, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)={0x5f, 0xa, 0x0, [{0x3, 0x7, 0x9, 0x200, 0x1fffc, 0x93, 0xfffffffffffffffb}, {0x2, 0xc, 0x6, 0x6, 0x6, 0x7, 0x80000001}, {0x2, 0xa7, 0x186, 0x7, 0x3ff, 0x7, 0x6}, {0x401, 0x5, 0xa6d, 0xffffffffffffc4b0, 0x5, 0x3, 0x78c}, {0x2, 0x3, 0x3, 0x7a2, 0x8, 0x5, 0x2}, {0x4, 0x0, 0xb67, 0x9, 0x8000, 0x2, 0x80000001}, {0x7fff, 0x7, 0xff, 0x7f, 0x1, 0x8, 0x3}, {0x5, 0x4, 0x56, 0x1, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfff}, {0x0, 0x6, 0x10001, 0x0, 0x3, 0xc050, 0x9}, {0x100, 0x7a2c, 0xff, 0x3, 0x4, 0x8, 0x800}]}) 12:14:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00\xc7)l\x18\x1c`\x04t\xc9\xbfs\x10?\x93\xcf\xe6]`\xcd\x8e\x93j:\x9dA\x95\xf3l\xac\x16\x96I\xf6F\xd0J\xe3\x93\x17\x1aO\xc0\x92W\xe5\xed\xbe\"b\xfa\xed\x96\xbf\xc4\xe9iQ\xddk\xd3\xff\xb96\x97\x120ez\xcei\x19\xca\xe6\x94\xda0\xe2u', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2099.973206] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2099.986735] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2100.016914] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 12:14:35 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) fcntl$setown(r7, 0x8, r5) tkill(0x0, 0x0) 12:14:35 executing program 2 (fault-call:11 fault-nth:21): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)={0x110, r2, 0x202, 0x70bd25, 0x100000001, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x30}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x501}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x10000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x214}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x29}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{r4, r5/1000+10000}, {0x77359400}}) r6 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000040)={0x4, 0x8, 0x5}) r7 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000080), 0x12) write$cgroup_pid(r6, &(0x7f0000000100), 0x12) 12:14:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2000004e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) dup2(r2, r0) 12:14:35 executing program 0: socketpair(0x4, 0x80a, 0x1000, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, 0x8, 0x5, 0x2, 0x70bd26, 0x25dfdbfb, {0x7, 0x0, 0x4}, [@typed={0x4, 0x1e}, @generic="a1fb2f6fcc431d465f6011bd040c55b7e48d0010550306604b3068f7733febcbd3980ceaa2e91e94e867bf08595c9a0374d042851836df49964cc3ffec0fd334b314f47993dd205b92d707df0e1885c8ce71a845103d1f1b3331356d775a4dc279798a2e0e54578480318f81841a3254fc87d684163be86b7a596ac7437c6c4f4f351915f171196647db1193277b7507b883"]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x800) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00070001040501ff0080f7fdffff2e0a0000df0c000100520000007f0000010c000400000022ff0238eb3eb3c1ef185e39c5f577439e217dcc305654421b2eeae16ef5436d8812"], 0x48}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff) [ 2100.146403] FAULT_INJECTION: forcing a failure. [ 2100.146403] name failslab, interval 1, probability 0, space 0, times 0 [ 2100.197755] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2100.204814] CPU: 1 PID: 26756 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2100.212098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2100.221447] Call Trace: [ 2100.221475] dump_stack+0x172/0x1f0 [ 2100.221498] should_fail.cold+0xa/0x1b [ 2100.221521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2100.231603] ? lock_downgrade+0x810/0x810 [ 2100.231622] ? ___might_sleep+0x163/0x280 [ 2100.231656] __should_failslab+0x121/0x190 [ 2100.231672] should_failslab+0x9/0x14 [ 2100.253048] kmem_cache_alloc_trace+0x2d1/0x760 [ 2100.257728] ? lock_downgrade+0x810/0x810 [ 2100.261886] blk_iolatency_init+0x4e/0x2f0 [ 2100.266129] blkcg_init_queue+0x163/0x3d0 [ 2100.270301] blk_alloc_queue_node+0x541/0x760 [ 2100.274811] blk_mq_init_queue+0x4a/0xb0 [ 2100.278885] loop_add+0x2dd/0x8d0 [ 2100.282337] ? idr_find+0x47/0x60 [ 2100.285807] loop_control_ioctl+0x165/0x360 [ 2100.290131] ? loop_add+0x8d0/0x8d0 [ 2100.293755] ? __fget+0x340/0x540 [ 2100.297216] ? loop_add+0x8d0/0x8d0 [ 2100.300864] do_vfs_ioctl+0xd6e/0x1390 [ 2100.304755] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2100.309520] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2100.314101] ? ioctl_preallocate+0x210/0x210 [ 2100.318526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2100.323297] ? retint_kernel+0x2d/0x2d [ 2100.327201] ksys_ioctl+0xab/0xd0 [ 2100.330656] __x64_sys_ioctl+0x73/0xb0 [ 2100.334548] do_syscall_64+0x103/0x610 [ 2100.338442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2100.343635] RIP: 0033:0x457e29 [ 2100.346829] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2100.365726] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2100.373434] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2100.380714] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2100.387984] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:14:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) 12:14:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x4) [ 2100.395247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2100.402539] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:35 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20080) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000240)=""/246) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x4e78a90b, @dev={0xfe, 0x80, [], 0x2a}, 0x3}, r2}}, 0x30) [ 2100.437323] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:35 executing program 2 (fault-call:11 fault-nth:22): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0xffffffffffffffff) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x2, 0x4) 12:14:35 executing program 3: socket$unix(0x1, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x332) r0 = gettid() semget(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) chdir(0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10040, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 2100.585943] FAULT_INJECTION: forcing a failure. [ 2100.585943] name failslab, interval 1, probability 0, space 0, times 0 [ 2100.606453] CPU: 0 PID: 26788 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2100.613748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2100.623099] Call Trace: [ 2100.625698] dump_stack+0x172/0x1f0 [ 2100.629373] should_fail.cold+0xa/0x1b [ 2100.633288] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2100.638407] ? lock_downgrade+0x810/0x810 [ 2100.642565] ? ___might_sleep+0x163/0x280 [ 2100.646733] __should_failslab+0x121/0x190 [ 2100.650998] should_failslab+0x9/0x14 [ 2100.654801] kmem_cache_alloc_node_trace+0x270/0x720 [ 2100.659911] ? retint_kernel+0x2d/0x2d [ 2100.663816] iolatency_pd_alloc+0x8d/0x140 [ 2100.668055] ? blkcg_iolatency_throttle+0xfb0/0xfb0 [ 2100.673076] blkcg_activate_policy+0x128/0x560 [ 2100.677671] blk_iolatency_init+0x151/0x2f0 [ 2100.682001] blkcg_init_queue+0x163/0x3d0 [ 2100.686168] blk_alloc_queue_node+0x541/0x760 [ 2100.690670] blk_mq_init_queue+0x4a/0xb0 [ 2100.694750] loop_add+0x2dd/0x8d0 [ 2100.698205] ? idr_find+0x47/0x60 [ 2100.701669] loop_control_ioctl+0x165/0x360 [ 2100.705996] ? loop_add+0x8d0/0x8d0 [ 2100.709624] ? __fget+0x340/0x540 [ 2100.713091] ? loop_add+0x8d0/0x8d0 [ 2100.716723] do_vfs_ioctl+0xd6e/0x1390 [ 2100.720621] ? ioctl_preallocate+0x210/0x210 [ 2100.725037] ? __fget+0x367/0x540 [ 2100.728499] ? iterate_fd+0x360/0x360 [ 2100.732325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2100.737862] ? fput+0x128/0x1a0 [ 2100.741153] ? security_file_ioctl+0x93/0xc0 [ 2100.745570] ksys_ioctl+0xab/0xd0 [ 2100.749039] __x64_sys_ioctl+0x73/0xb0 [ 2100.752929] do_syscall_64+0x103/0x610 [ 2100.756824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2100.762017] RIP: 0033:0x457e29 [ 2100.765210] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2100.784113] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2100.791824] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2100.799093] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2100.806363] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2100.813637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2100.820914] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:36 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) fcntl$setown(r7, 0x8, r5) 12:14:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)=0x0) r5 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0xfff, 0x4082) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1, 0xc000, 0x8, 0x8, 0x1000, 0x9, 0x0, 0x6, 0x80000000, 0x6, 0xffffffff, 0x8, 0x4, 0x8, 0x2d, 0x4, 0x6, 0xfffffffffffffff7, 0x1720, 0x0, 0x1f, 0x5, 0x0, 0x7, 0x4, 0x5, 0x4, 0x6, 0x9, 0x2, 0x873, 0x0, 0x6, 0x0, @perf_config_ext={0x1000, 0x10000}, 0x80, 0xb9, 0x4, 0x5, 0x2, 0x0, 0x2}, r4, 0xb, r5, 0x8) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r6 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4200) ioctl$SIOCGIFHWADDR(r6, 0x8927, &(0x7f0000000180)) 12:14:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x200, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x2c) ioctl$NBD_DISCONNECT(r1, 0xab08) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000010405f2fe0080f7fdffff2e0a0000000c000100520000000400000022ff0238e98b3e000000000000f9"], 0x2c}}, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff7, 0x0) recvmsg(r0, &(0x7f0000005a40)={&(0x7f0000005400)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000058c0)=[{&(0x7f0000005480)=""/117, 0x75}, {&(0x7f0000005500)=""/47, 0x2f}, {&(0x7f0000005540)=""/182, 0xb6}, {&(0x7f0000005600)=""/140, 0x8c}, {&(0x7f00000056c0)=""/200, 0xc8}, {&(0x7f00000057c0)=""/5, 0x5}, {&(0x7f0000005800)=""/116, 0x74}, {&(0x7f0000005880)=""/2, 0x2}], 0x8, &(0x7f0000005940)=""/213, 0xd5}, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000005a80)={@local, r4}, 0x14) fcntl$getown(r1, 0x9) 12:14:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) clone(0x100, &(0x7f0000000000)="90edfd3e1645523d5b3f82f71bc2a1d6004f62a8c45ef4f0e2a8301e09e48a52738df1ba5597964177ae590cfab8cc8c08041ae3e78a37343888eb6ea4d3c74357cb92c81dcc6754f498413f86a753acee89e6e87a3f79f20a305aefabdbbaef48119dbc2b00111552e79141ce6ed961dba3f24c95c043587af39906b01920503e6a81a1b28e657dce01fdf9f431b20939d8c9e9f5367cb4b30c13f550d7f534842555c5ab24fb999ce06e1106456d62a3d81e770c65c2249d3a59ca3790532445be6ef148e82be062687ffdcb67526b886583e0e317c948c3acafdf9fed8a190f18887c4c2b34a6b24f1911", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)="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") socket$inet_sctp(0x2, 0x1, 0x84) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000001240)="f385c4cbb706a0851483e63b6dd7422f816e3f142f3fd331d90367107e6da272af57a4c860868e49cbb48aba6a944c616995f3dea01c0b536b6c77f4d3396be397afe8b062525130dd7fc0aacb4880d9e55b80b0fe8dbf1ee9c993ba23454b1a0c") ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 12:14:36 executing program 2 (fault-call:11 fault-nth:23): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:36 executing program 3: r0 = gettid() chdir(0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) prctl$PR_GET_PDEATHSIG(0x2, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r1, 0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000015) [ 2100.996694] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2101.040981] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2101.043159] FAULT_INJECTION: forcing a failure. [ 2101.043159] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.067377] CPU: 1 PID: 26800 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2101.074652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2101.083999] Call Trace: [ 2101.086591] dump_stack+0x172/0x1f0 12:14:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) pwrite64(r0, &(0x7f0000000000)="07b38f479d49bf2a730829d8fd89ab6a9d908cc6a48fd3baaa50ee207dddd51d76dac0cb46cfb673e2e101026d9670f0ea721b27dc7486c2dea3203e2090c13fbebf1cea8ca1d1172dea681e900942de", 0x50, 0x0) [ 2101.090225] should_fail.cold+0xa/0x1b [ 2101.094149] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2101.099274] ? lock_downgrade+0x810/0x810 [ 2101.103435] ? ___might_sleep+0x163/0x280 [ 2101.107586] __should_failslab+0x121/0x190 [ 2101.111820] should_failslab+0x9/0x14 [ 2101.115617] kmem_cache_alloc_trace+0x2d1/0x760 [ 2101.120315] ? lock_downgrade+0x810/0x810 [ 2101.124467] blk_iolatency_init+0x4e/0x2f0 [ 2101.128705] blkcg_init_queue+0x163/0x3d0 [ 2101.132855] blk_alloc_queue_node+0x541/0x760 [ 2101.137355] blk_mq_init_queue+0x4a/0xb0 [ 2101.141418] loop_add+0x2dd/0x8d0 [ 2101.144871] ? idr_find+0x47/0x60 [ 2101.148352] loop_control_ioctl+0x165/0x360 [ 2101.152694] ? loop_add+0x8d0/0x8d0 [ 2101.156325] ? __fget+0x340/0x540 [ 2101.160244] ? loop_add+0x8d0/0x8d0 [ 2101.163878] do_vfs_ioctl+0xd6e/0x1390 [ 2101.167765] ? ioctl_preallocate+0x210/0x210 [ 2101.172174] ? __fget+0x367/0x540 [ 2101.175630] ? iterate_fd+0x360/0x360 [ 2101.179426] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2101.184955] ? fput+0x128/0x1a0 [ 2101.188236] ? security_file_ioctl+0x93/0xc0 [ 2101.192643] ksys_ioctl+0xab/0xd0 [ 2101.196151] __x64_sys_ioctl+0x73/0xb0 [ 2101.200036] do_syscall_64+0x103/0x610 [ 2101.203922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2101.209105] RIP: 0033:0x457e29 [ 2101.212290] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2101.231198] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2101.238915] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2101.246188] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2101.253453] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2101.260728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2101.267992] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:36 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x800, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="f83e3bb501426197705961de711622bc3f9cde38790c7bbe44631f13f1ea04bf36a5f1a1c81b8d5d92bed4fadc6ed047415a1f8f5f82384077789ae7042e9e5635e39567e88f1be33bf5fb134a25990e965163d5c6ed5e4a2e7cd426ff73c88c998e359199b865db792dfe0a4770eb76ec6810ccaee9f35ff0d10c12105a7cdc7217376c73aea34853dfcddb039f", 0x8e, 0x4d2}, {&(0x7f00000002c0)="dfdc8ddfb4ef29edd52763cddd3979bb1ec2593f8b2d4f597458f25a59b23b1ef5a35050aac67b112505e4b90a910b7fe4ab647c8fd51baee7c4ec7e39109060dc54824e72ed4a68fc3d3d986a6507be279f1d61dec7e3caea51a00e87115f9bdbac0c243f122684deb6c4ee5e1820bc99650af7d4c7b376bd974c89671edd1142e170911f1da597751cb69f5d7488e354e05df758f0acf83f5ce0f1bad8a526d76bf2500822666710dec203640a99f59b", 0xb1, 0x4}], 0x4008, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000440)='/dev/udmabuf\x00', 0x2) r1 = epoll_create(0xfffffffffffffffe) epoll_wait(r1, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x4, 0x0) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, r0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000400)=0x9, 0x4) ioctl$TIOCNOTTY(r2, 0x5422) getsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$nl_netfilter(r2, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000ff2e070000000cff0100520000007f0098ea0c000400000022ff0214e93e00000010dd050000000000128711418b3d7d8c43851ba51d6dc536cca569afe083e8091ca97c242fe3fbc13d47d94b5509ad0e974aa2c659459c0f23e0fb479a90a632f170db25b4de4b3c1e069e50587e29c3e8e58dfbfc155a624e557de7046c37f2f9ab9bbc59964ecbea1d32e19da6883e6ce1bb0901e03966d5bdb5d6590a405065e78517214500000000b5a76e4c"], 0x4a}, 0x1, 0x0, 0x0, 0x1}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) [ 2101.288233] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:36 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x2}) 12:14:36 executing program 2 (fault-call:11 fault-nth:24): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2101.357049] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x4) r4 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write(r2, &(0x7f0000000180)="347c07339d8f85d237d836ea250a58da412cc4b54e4211869d8f56f8a914b2e1fd1cef2d8e3f020af244acda006c8c98ba9aa5fe64020c35682f6d09cd148291a11f9a80bcdf599ce76f49821f5ada5ebe7dadf1c75516b5e7af146d3e32c7b679f328b322057162a512365e0dff329511a512f8ace72eef8e43417f8298285aba011a7bbd8ba4cd716e008b8e814d83b1043fcde33ff1fb6382563dd85c88f277", 0xa1) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x14d3263e, 0x100) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x5a2, 0x5, 0x3, 0x7, 0x13, 0x4, 0x401, 0x100, 0x6, 0x101, 0x10000, 0x12}) [ 2101.557726] FAULT_INJECTION: forcing a failure. [ 2101.557726] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.575737] CPU: 0 PID: 26831 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2101.583022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2101.592371] Call Trace: [ 2101.594986] dump_stack+0x172/0x1f0 [ 2101.598626] should_fail.cold+0xa/0x1b [ 2101.602525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2101.607632] ? lock_downgrade+0x810/0x810 [ 2101.611790] ? ___might_sleep+0x163/0x280 [ 2101.615950] __should_failslab+0x121/0x190 [ 2101.620190] should_failslab+0x9/0x14 [ 2101.623993] kmem_cache_alloc_node_trace+0x270/0x720 [ 2101.629106] ? retint_kernel+0x2d/0x2d [ 2101.633002] iolatency_pd_alloc+0x8d/0x140 [ 2101.637235] ? blkcg_iolatency_throttle+0xfb0/0xfb0 [ 2101.642286] blkcg_activate_policy+0x128/0x560 [ 2101.646893] blk_iolatency_init+0x151/0x2f0 [ 2101.651229] blkcg_init_queue+0x163/0x3d0 [ 2101.655412] blk_alloc_queue_node+0x541/0x760 [ 2101.659915] blk_mq_init_queue+0x4a/0xb0 [ 2101.663979] loop_add+0x2dd/0x8d0 [ 2101.667438] loop_control_ioctl+0x165/0x360 [ 2101.671759] ? loop_add+0x8d0/0x8d0 [ 2101.675399] ? __fget+0x340/0x540 [ 2101.678858] ? loop_add+0x8d0/0x8d0 [ 2101.682514] do_vfs_ioctl+0xd6e/0x1390 [ 2101.686406] ? ioctl_preallocate+0x210/0x210 [ 2101.690812] ? __fget+0x367/0x540 [ 2101.694285] ? iterate_fd+0x360/0x360 [ 2101.698095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2101.702857] ? security_file_ioctl+0x93/0xc0 [ 2101.707310] ksys_ioctl+0xab/0xd0 [ 2101.710776] __x64_sys_ioctl+0x73/0xb0 [ 2101.714664] ? do_syscall_64+0xed/0x610 [ 2101.718640] do_syscall_64+0x103/0x610 [ 2101.722528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2101.727710] RIP: 0033:0x457e29 [ 2101.730905] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2101.749820] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2101.757539] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2101.764815] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2101.772089] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2101.779360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2101.786629] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:37 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r5, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r6}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r5, r6) 12:14:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x88, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:37 executing program 2 (fault-call:11 fault-nth:25): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000400)=0x6) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) r5 = open(&(0x7f0000000100)='./file0\x00', 0xc040, 0x104) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000380)=0x4) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_GET_PIT2(r6, 0x8070ae9f, &(0x7f0000000180)) 12:14:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0}, 0x10) 12:14:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000201040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000002) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x4) 12:14:37 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x501600, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x8d1, 0x2024, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) [ 2101.933478] FAULT_INJECTION: forcing a failure. [ 2101.933478] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.982680] CPU: 1 PID: 26836 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2101.989981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2101.999356] Call Trace: [ 2101.999386] dump_stack+0x172/0x1f0 [ 2101.999409] should_fail.cold+0xa/0x1b [ 2102.009801] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.014911] ? ___might_sleep+0x52/0x280 [ 2102.018973] ? ___might_sleep+0x163/0x280 [ 2102.023128] __should_failslab+0x121/0x190 [ 2102.027367] should_failslab+0x9/0x14 [ 2102.031171] kmem_cache_alloc_node_trace+0x270/0x720 [ 2102.036293] ? __debug_object_init+0x190/0xc30 [ 2102.040878] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2102.045996] throtl_pd_alloc+0x8b/0x990 [ 2102.049972] ? throtl_schedule_next_dispatch+0x640/0x640 [ 2102.055689] blkcg_activate_policy+0x128/0x560 [ 2102.060289] ? throtl_pd_offline+0x210/0x210 [ 2102.064726] blk_throtl_init+0x459/0x680 [ 2102.068799] blkcg_init_queue+0x277/0x3d0 [ 2102.072954] blk_alloc_queue_node+0x541/0x760 [ 2102.077458] blk_mq_init_queue+0x4a/0xb0 [ 2102.081523] loop_add+0x2dd/0x8d0 [ 2102.084985] ? idr_find+0x47/0x60 [ 2102.088470] loop_control_ioctl+0x165/0x360 [ 2102.092805] ? loop_add+0x8d0/0x8d0 [ 2102.096441] ? __fget+0x340/0x540 [ 2102.099897] ? loop_add+0x8d0/0x8d0 [ 2102.103527] do_vfs_ioctl+0xd6e/0x1390 [ 2102.107449] ? ioctl_preallocate+0x210/0x210 [ 2102.111876] ? __fget+0x367/0x540 [ 2102.115347] ? iterate_fd+0x360/0x360 [ 2102.119153] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2102.124689] ? fput+0x128/0x1a0 [ 2102.127978] ? security_file_ioctl+0x93/0xc0 [ 2102.132386] ksys_ioctl+0xab/0xd0 [ 2102.135848] __x64_sys_ioctl+0x73/0xb0 [ 2102.139752] do_syscall_64+0x103/0x610 [ 2102.143647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.148845] RIP: 0033:0x457e29 [ 2102.152037] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2102.170932] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2102.178639] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2102.185908] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2102.193175] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2102.200446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2102.207711] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402000, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x200}, {0xa, 0x4e23, 0x80000001, @mcast2, 0x80000000}, r2, 0x8}}, 0x48) [ 2102.219638] audit: type=1800 audit(1551356077.481:199): pid=26838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16568 res=0 [ 2102.243182] audit: type=1800 audit(1551356077.511:200): pid=26838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16568 res=0 12:14:37 executing program 2 (fault-call:11 fault-nth:26): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:37 executing program 4: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000001280)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x5, 0x0, 0x9, 0x3, 0x3f}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r2, 0x0, 0x6}, 0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@mcast2, 0x0}, &(0x7f0000000180)=0x14) connect(r1, &(0x7f0000001440)=@hci={0x1f, r3, 0x3}, 0x80) [ 2102.321353] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2102.343383] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2102.357964] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2102.405957] FAULT_INJECTION: forcing a failure. [ 2102.405957] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.417528] CPU: 0 PID: 26860 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2102.424798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2102.434144] Call Trace: [ 2102.436742] dump_stack+0x172/0x1f0 [ 2102.440386] should_fail.cold+0xa/0x1b [ 2102.444298] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.449420] ? __debug_object_init+0x190/0xc30 [ 2102.454006] ? __lock_is_held+0xb6/0x140 [ 2102.458081] __should_failslab+0x121/0x190 [ 2102.462318] should_failslab+0x9/0x14 [ 2102.466117] kmem_cache_alloc_node_trace+0x5a/0x720 [ 2102.471132] ? rwlock_bug.part.0+0x90/0x90 [ 2102.475362] ? lock_acquire+0x16f/0x3f0 [ 2102.479342] ? blkcg_activate_policy+0x14d/0x560 [ 2102.484116] throtl_pd_alloc+0x8b/0x990 [ 2102.488089] ? throtl_schedule_next_dispatch+0x640/0x640 [ 2102.493541] blkcg_activate_policy+0x242/0x560 [ 2102.498135] blk_throtl_init+0x459/0x680 [ 2102.502204] blkcg_init_queue+0x277/0x3d0 [ 2102.506360] blk_alloc_queue_node+0x541/0x760 [ 2102.510862] blk_mq_init_queue+0x4a/0xb0 [ 2102.514927] loop_add+0x2dd/0x8d0 [ 2102.518404] ? idr_find+0x47/0x60 [ 2102.521897] loop_control_ioctl+0x165/0x360 [ 2102.526226] ? loop_add+0x8d0/0x8d0 [ 2102.529861] ? __fget+0x340/0x540 [ 2102.533348] ? loop_add+0x8d0/0x8d0 [ 2102.536981] do_vfs_ioctl+0xd6e/0x1390 [ 2102.540871] ? ioctl_preallocate+0x210/0x210 [ 2102.545296] ? __fget+0x367/0x540 [ 2102.548777] ? iterate_fd+0x360/0x360 [ 2102.552584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2102.558141] ? fput+0x128/0x1a0 [ 2102.561435] ? security_file_ioctl+0x93/0xc0 [ 2102.565867] ksys_ioctl+0xab/0xd0 [ 2102.569330] __x64_sys_ioctl+0x73/0xb0 [ 2102.574104] do_syscall_64+0x103/0x610 [ 2102.577997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.583193] RIP: 0033:0x457e29 [ 2102.586412] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2102.605332] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2102.614355] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2102.621625] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2102.628892] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2102.636157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2102.643422] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2102.667928] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:38 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r5, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r6}], 0x200000000000004e, 0xffffffffffbffff8) 12:14:38 executing program 2 (fault-call:11 fault-nth:27): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4002000, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040)=0x500, 0x10000000000443) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$DRM_IOCTL_SET_UNIQUE(r4, 0x40106410, &(0x7f0000000680)={0x3c, &(0x7f0000000640)="fb629594b7f25dc6a88689ec19b5e0ba0849046e87d2d31dcbd9b240899ea590954145a3683c5080d8356485f5403b2c4f90944fe2fd04380882e4ee"}) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[]}}, 0x4040804) sigaltstack(&(0x7f0000804000/0x1000)=nil, 0x0) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) io_setup(0x7fff, &(0x7f0000000200)=0x0) io_submit(r5, 0x1, &(0x7f0000000840)=[&(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x3ff, r1, &(0x7f0000000780), 0x0, 0x1ac, 0x0, 0x1}]) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xa, &(0x7f0000000080), 0x4) ftruncate(0xffffffffffffffff, 0x6) r6 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$RTC_ALM_READ(r6, 0x80247008, 0x0) 12:14:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/s~z1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./c\x1cg\x84\x0fIp\xaeG\xa7\x061\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000180)) r4 = getpid() write$cgroup_pid(r1, &(0x7f0000000100)=r4, 0xfffffffffffffcdd) 12:14:38 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:38 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x10000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="a4741dc7486fc68b0c114fdd0b1c2df84a0a0d3376a2b468a88e46f933f2ac12a066c578dfbf2241b7577086eb9286f236e20627afa403472d5a08eddec7b8dd0f60db83628b50d72d1bd99a41b4acd1a7d84313cce10840cd4406f185d5b7003b9222a932f5a416e774427523d89fcfe32042b93568b3b0e3ad12a4a7131f4dc464db122663a0232192a18142", &(0x7f0000001240)=""/4096}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) truncate(&(0x7f0000000140)='./file0\x00', 0x5942) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) eventfd2(0x3, 0x80801) [ 2103.163508] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x800, 0x0) ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f0000000180)) r5 = fcntl$dupfd(r3, 0x0, r1) ioctl$EVIOCSABS0(r5, 0x401845c0, &(0x7f0000000040)={0x71, 0x7656, 0x8, 0x279, 0x2, 0x3f}) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x3, 0x2, 0x9, 0x10000}, {0x6c1c, 0x1, 0x3}]}) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:38 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x8001, 0x5, 0x1, 0xfff, 0x0, 0x4, 0x80000, 0x2, 0x8, 0x4, 0xb2, 0x40, 0x74cace15, 0x876, 0x0, 0x7, 0x1, 0x100000000, 0xfff, 0x3, 0xff, 0x5, 0x3, 0x7ff, 0x5, 0x0, 0x81, 0x64, 0x1f, 0x500000000, 0x7, 0x8, 0x7, 0x1, 0x800, 0xae3, 0x0, 0x8, 0x1, @perf_config_ext={0x1000, 0x5}, 0x20, 0x1ff, 0x80000000, 0x7, 0x3ff, 0xfffffffffffffff9, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c2b00000001040501ff0080f7fdffff2f0a0000000c000100520001007f0000010c000400659db0ce000022ff062e"], 0x2c}}, 0x0) [ 2103.244642] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2103.316907] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2103.378611] FAULT_INJECTION: forcing a failure. [ 2103.378611] name failslab, interval 1, probability 0, space 0, times 0 12:14:38 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0xf, 0xb, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 12:14:38 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x800) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000080)='fdinfo\x00N\xe7\xbc\xbbx+X\xd6TK\xea8\a\xf7\x15\xfc\x90\xf4\x95\x91\xb4\x1f\x85\xb6_\xe8Mxl\r\x86\xe2\x9d\xbf\x18Y\xe7V\x8a\x8bd\xd8\xeb,\x14-.|\x1a>\x12e*\'T') getdents64(r2, &(0x7f00000001c0)=""/78, 0x4e) [ 2103.434245] CPU: 0 PID: 26886 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2103.441557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.450921] Call Trace: [ 2103.453517] dump_stack+0x172/0x1f0 [ 2103.457152] should_fail.cold+0xa/0x1b [ 2103.461242] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.466365] ? lock_downgrade+0x810/0x810 [ 2103.470527] ? ___might_sleep+0x163/0x280 [ 2103.474678] __should_failslab+0x121/0x190 [ 2103.478916] should_failslab+0x9/0x14 12:14:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x280, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000040)={{0x27c8, 0x7a, 0x8, 0x2, 0x8076, 0x7}, 0x7, 0x800, 0x10000, 0x6, 0x1, "62f59fe9e63cd53ea4d201f543264fc10d58cf013cf6e6d7bd07fde0ce6c60d522d12b57092e9c9a7549cadc03368d1246fb113c13f577289ef6b1e9cf12b0e4856b1b5dcf8028e52f48b3ede4d0ff12cc12e124337c2fcd350d3987ac4726cd61d4cc1cd0b4481d83c0e357afa7217eea68f84a6dedfabb7c6ceb9792ea0eca"}) [ 2103.482722] kmem_cache_alloc_trace+0x2d1/0x760 [ 2103.487408] ? throtl_pd_free+0x23/0x30 [ 2103.491388] ? blkcg_activate_policy+0x6a/0x560 [ 2103.496063] ? blk_mq_queue_stopped+0x130/0x130 [ 2103.500736] blk_stat_alloc_callback+0x58/0x270 [ 2103.505410] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 2103.510444] blk_mq_init_allocated_queue+0x85/0x1570 [ 2103.515563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.521105] ? blkcg_init_queue+0x18a/0x3d0 [ 2103.525447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.530989] ? blk_alloc_queue_node+0x559/0x760 [ 2103.535665] blk_mq_init_queue+0x62/0xb0 [ 2103.539740] loop_add+0x2dd/0x8d0 [ 2103.543198] ? idr_find+0x47/0x60 [ 2103.546658] loop_control_ioctl+0x165/0x360 [ 2103.550981] ? loop_add+0x8d0/0x8d0 [ 2103.554606] ? __fget+0x340/0x540 [ 2103.558075] ? loop_add+0x8d0/0x8d0 [ 2103.561699] do_vfs_ioctl+0xd6e/0x1390 [ 2103.565586] ? ioctl_preallocate+0x210/0x210 [ 2103.569999] ? __fget+0x367/0x540 [ 2103.574939] ? iterate_fd+0x360/0x360 [ 2103.578742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2103.584278] ? fput+0x128/0x1a0 [ 2103.587606] ? security_file_ioctl+0x93/0xc0 [ 2103.592015] ksys_ioctl+0xab/0xd0 [ 2103.595468] __x64_sys_ioctl+0x73/0xb0 [ 2103.599365] do_syscall_64+0x103/0x610 [ 2103.603304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.608501] RIP: 0033:0x457e29 [ 2103.611708] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.630602] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2103.638317] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2103.645598] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2103.652861] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2103.660147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2103.667421] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:39 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r5, 0xa, 0x12) 12:14:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4002000, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040)=0x500, 0x10000000000443) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$DRM_IOCTL_SET_UNIQUE(r4, 0x40106410, &(0x7f0000000680)={0x3c, &(0x7f0000000640)="fb629594b7f25dc6a88689ec19b5e0ba0849046e87d2d31dcbd9b240899ea590954145a3683c5080d8356485f5403b2c4f90944fe2fd04380882e4ee"}) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[]}}, 0x4040804) sigaltstack(&(0x7f0000804000/0x1000)=nil, 0x0) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) io_setup(0x7fff, &(0x7f0000000200)=0x0) io_submit(r5, 0x1, &(0x7f0000000840)=[&(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x3ff, r1, &(0x7f0000000780), 0x0, 0x1ac, 0x0, 0x1}]) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xa, &(0x7f0000000080), 0x4) ftruncate(0xffffffffffffffff, 0x6) r6 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$RTC_ALM_READ(r6, 0x80247008, 0x0) 12:14:39 executing program 2 (fault-call:11 fault-nth:28): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x10001, 0x202000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000180)=[{{r2, r3/1000+30000}, 0x0, 0x7, 0xfffffffffffffbff}], 0x18) r4 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) 12:14:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000240)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) 12:14:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x00\x00ob\xbb\x93\x01f\xe9s\x90Q\xcd\xcev\x1d\x97\x1f\xafn^\x88\x89\xec/\x98\xf2\xf8`\x02\n=') ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x3) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x10) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') [ 2104.145618] FAULT_INJECTION: forcing a failure. [ 2104.145618] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.179796] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2104.195504] CPU: 1 PID: 26919 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2104.202812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.212496] Call Trace: [ 2104.215098] dump_stack+0x172/0x1f0 [ 2104.218760] should_fail.cold+0xa/0x1b [ 2104.222836] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2104.227968] ? lock_downgrade+0x810/0x810 [ 2104.232154] ? ___might_sleep+0x163/0x280 [ 2104.236320] __should_failslab+0x121/0x190 [ 2104.241369] should_failslab+0x9/0x14 [ 2104.245181] kmem_cache_alloc_trace+0x2d1/0x760 [ 2104.250002] ? throtl_pd_free+0x23/0x30 [ 2104.253987] ? blkcg_activate_policy+0x6a/0x560 [ 2104.258669] ? blk_mq_queue_stopped+0x130/0x130 [ 2104.263372] blk_stat_alloc_callback+0x58/0x270 [ 2104.268046] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 2104.273069] blk_mq_init_allocated_queue+0x85/0x1570 [ 2104.278180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2104.283726] ? blkcg_init_queue+0x18a/0x3d0 [ 2104.288054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2104.293614] ? blk_alloc_queue_node+0x559/0x760 [ 2104.298309] blk_mq_init_queue+0x62/0xb0 [ 2104.302577] loop_add+0x2dd/0x8d0 [ 2104.306036] ? idr_find+0x47/0x60 [ 2104.309506] loop_control_ioctl+0x165/0x360 [ 2104.313840] ? loop_add+0x8d0/0x8d0 [ 2104.317484] ? __fget+0x340/0x540 [ 2104.320948] ? loop_add+0x8d0/0x8d0 [ 2104.324589] do_vfs_ioctl+0xd6e/0x1390 [ 2104.328482] ? ioctl_preallocate+0x210/0x210 [ 2104.332886] ? __fget+0x367/0x540 [ 2104.336357] ? iterate_fd+0x360/0x360 [ 2104.340178] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2104.345749] ? fput+0x128/0x1a0 [ 2104.349052] ? security_file_ioctl+0x93/0xc0 [ 2104.353473] ksys_ioctl+0xab/0xd0 [ 2104.356930] __x64_sys_ioctl+0x73/0xb0 [ 2104.360847] do_syscall_64+0x103/0x610 [ 2104.364752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.369959] RIP: 0033:0x457e29 [ 2104.373150] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2e5e, 0x201) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r5}}, 0x18) [ 2104.392060] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2104.399767] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2104.407046] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2104.414317] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2104.421592] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2104.428865] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2104.497068] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:39 executing program 0: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000080)="3fd99bd4a91c93c1a53163d1abde9c98110c441cad664685e3274b375f92863657975f760181235ca482cd39f2de90b27d0b6206d000a8e1cee9fa70473c71b4ce74c13aa5e8a0fa920c3df13176fac75f3d7a14960e12f256683a87c64665446cf184528a99c93162a9e3cc8f48aaa981883d9290ae05695e8515e7a47b13ac868fe8a4eaa026b2e7c529af00693a1a85de117ffe28e6ec0abf", 0x9a, 0x44}, {&(0x7f0000000240)="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", 0x1000, 0x8}, {&(0x7f0000000140)="c6d25a166bc5b47652dea598224bac55bd3b6efc6d06a9ababb6d3deeebde913124dc1ee9488e76df9609ee1120f22ec38f0610cc528544a79fabc7d9cbb3bcc1cb0adb04e1f9e443aaa3f3a350527a25e672a1f15294bca55f038ba8395715ba8bb9bb28775cdeaa9a72b988c5cd95d2503a006da83c7ab1610c14f9f96424704ab99eefabd54f0740a2219a5fde1c213842fd49ac26778c27bfad58313807d7a849258b76b4d608e4d7e75519445009d2811", 0xb3, 0x8}, {&(0x7f0000001240)="3bb2252afb935f97ef399b9b2cf800253e1147a5da72c13acff513f6366c35e665d29d3f417a6758c6b0", 0xfffffffffffffe5a, 0xe}, {&(0x7f0000001280)="26d7b43f1f5a3f6c20655a929fb655ba1aac11a6e7143b56369f29726d4b73efd20c680091e84bc0904a1ac7e8cc8934f4dc3f26482dd6b1fd48ea97f65d2ee77b5de1fc7af526e9ad12142d8d452c1f98c64c051e4c5cb889f5219feaf8f500b9c58d741c0aa39a7dbd56125c4424a3c48e3c7d01bd5474ba3ec8d4689259c420b541b2e3a745d5b85d1aa1ed6ee3c664c84ec9e2419120f9a00afa47c9ef4697e26e8f789a", 0xa6, 0x5}], 0x800000, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x291, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[], 0xfffffffffffffed2}}, 0x0) 12:14:39 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000b28000)=0x6) 12:14:40 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xffff, 0x101000) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x4) r2 = syz_open_procfs(r0, &(0x7f0000000100)='net/mcfilter\x00') getdents64(r2, &(0x7f00000001c0)=""/78, 0x4e) 12:14:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000380)=0x92, 0x4) bind$can_raw(r4, &(0x7f0000000200), 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x23, "b48b55b5390bdde4a9dbc4351840ece4b813eecc548f2e08249bba3070e3440ec8da80"}, &(0x7f0000000180)=0x2b) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000001c0)={r5, 0x40}, 0x8) [ 2104.763942] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') getdents64(r0, 0x0, 0x0) [ 2104.837311] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x200) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000001780)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/audio\x00', 0x26000, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001800)='/dev/snapshot\x00', 0x80000, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001840)='/dev/dsp\x00', 0x0, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000001880)='/dev/vcsa#\x00', 0x1, 0x200002) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/dlm-control\x00', 0x86000, 0x0) pipe2(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000001a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8024840}, 0xc, &(0x7f00000019c0)={&(0x7f0000001940)={0x68, r3, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r11, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 'caif0\x00'}}, 0x1e) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r8, 0x0, 0x5, &(0x7f0000000200)='proc\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r8, &(0x7f0000000080)=r12, 0xfffffffffffffe57) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:40 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)) [ 2105.041566] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:40 executing program 2 (fault-call:11 fault-nth:29): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:40 executing program 4: getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/78, 0x4e) 12:14:40 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="240000001a0025f20485bc0460aa5f0624b0fef7001c0a0b49ffed00000080fc08000800", 0x24) 12:14:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\t\x00\x00\x00Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%M\x01\xb9[\v\x19S\xc0p<\x8b\x89O\xbatt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\xbd\xc0\x14\xa8\xca\x7f\xa1\xe3{\v\xf9\x8b)\x1c0[\x99\x90nK\xa5\x00\x99\xa5\xd29\x10Iv\x15\xf5\xbf\xedL\x13\xa11\xe7\x8b\xdb\xe87\x99~|\x1e\xc3\x17\xdc\x85u\x02\xd9Pp\"\xe1\x80\xa7b]B\xa83\xab\xc4\t\xe7E\x19\xd6\xb9\xd8\xffD\xa6\x86\"MG*\xed\x125\xa4Y\x9a&\x9d~Emm\xa64\x0f\xb5\xf91i\x9a\xfa\xe8\xe6\x8fuH\f\xf1\x90\x85i1j\xb8S\x96\xf0-t\xaeF', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0X\x92t\x1f\xb9\xe2[\x86\xdb\xd8\x1d\x1b\xe0', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2105.124159] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x6) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[]}}, 0x0) 12:14:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@ipv6_deladdr={0x18, 0x15, 0x601}, 0x18}}, 0x0) 12:14:40 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) fcntl$notify(r0, 0x402, 0x21) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000240)=""/251, &(0x7f0000000040)=0xfb) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r3, &(0x7f00000001c0)=""/78, 0x4e) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x401, 0x88000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000340), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast2, @in=@local}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000680)) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getuid() fstat(r2, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in6=@ipv4={[], [], @local}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) fstat(r2, &(0x7f0000000a00)) fstat(r1, &(0x7f0000000a80)) getegid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000c00)=0xe8) getgroups(0x1, &(0x7f0000000c40)=[0xee00]) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) socket$tipc(0x1e, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x401, 0xffff, 0x111, 0x6, 0x0, 0x0, 0x40, 0x2, 0x1, 0x8, 0x5, 0x6, 0x3ff, 0x0, 0x6, 0x7, 0x3, 0x1, 0x1ff, 0xfff, 0x1000, 0x7ff, 0x401, 0x400, 0x1, 0x0, 0x5, 0x1f, 0x4, 0x7, 0x9, 0x103b, 0x0, 0xff, 0x100000000, 0x100000000, 0x0, 0x3f, 0xf012fe42ca71631, @perf_bp={0x0, 0x5}, 0x20, 0x8000, 0x3, 0x6, 0x8b17, 0x95fb, 0xfdb2}, r5, 0x6, r4, 0xa) 12:14:40 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) gettid() 12:14:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) signalfd4(r0, &(0x7f0000000040)={0x2}, 0x8, 0x800) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='cgrou\x1f\x9e\x05p.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2105.228109] FAULT_INJECTION: forcing a failure. [ 2105.228109] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.286001] CPU: 0 PID: 26971 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2105.293301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2105.302662] Call Trace: [ 2105.305272] dump_stack+0x172/0x1f0 [ 2105.308918] should_fail.cold+0xa/0x1b [ 2105.312803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2105.317903] ? lock_downgrade+0x810/0x810 [ 2105.322052] ? ___might_sleep+0x163/0x280 [ 2105.326199] ? blk_mq_queue_stopped+0x130/0x130 [ 2105.330863] __should_failslab+0x121/0x190 [ 2105.335092] should_failslab+0x9/0x14 [ 2105.338883] __kmalloc+0x2dc/0x740 [ 2105.342418] ? kmem_cache_alloc_trace+0x354/0x760 [ 2105.347279] ? throtl_pd_free+0x23/0x30 [ 2105.351319] ? blk_stat_alloc_callback+0x84/0x270 [ 2105.356163] ? blk_mq_queue_stopped+0x130/0x130 [ 2105.360828] blk_stat_alloc_callback+0x84/0x270 [ 2105.365509] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 2105.370544] blk_mq_init_allocated_queue+0x85/0x1570 [ 2105.375665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2105.381217] ? blkcg_init_queue+0x18a/0x3d0 [ 2105.385533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2105.391069] ? blk_alloc_queue_node+0x559/0x760 [ 2105.395743] blk_mq_init_queue+0x62/0xb0 [ 2105.399811] loop_add+0x2dd/0x8d0 [ 2105.403275] ? idr_find+0x47/0x60 [ 2105.406732] loop_control_ioctl+0x165/0x360 [ 2105.411065] ? loop_add+0x8d0/0x8d0 [ 2105.414709] ? __fget+0x340/0x540 [ 2105.418168] ? loop_add+0x8d0/0x8d0 [ 2105.421796] do_vfs_ioctl+0xd6e/0x1390 [ 2105.425678] ? __fget+0x345/0x540 [ 2105.429137] ? ioctl_preallocate+0x210/0x210 [ 2105.433544] ? __fget+0x367/0x540 [ 2105.436996] ? iterate_fd+0x360/0x360 [ 2105.440806] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2105.446353] ? fput+0x128/0x1a0 [ 2105.449633] ? security_file_ioctl+0x93/0xc0 [ 2105.454038] ksys_ioctl+0xab/0xd0 [ 2105.457489] __x64_sys_ioctl+0x73/0xb0 [ 2105.461375] do_syscall_64+0x103/0x610 [ 2105.465278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2105.470473] RIP: 0033:0x457e29 [ 2105.473662] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2105.492556] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2105.500262] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2105.507528] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2105.514792] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2105.522079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2105.529344] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000003a40)={0x6}, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="070010006889a3978f186339d7ae2f1e3893e75d1eb3f4b090939ba32a6b302cb6bcb9148f760722a88fae962e1732b06058dcec92592ec6dc7e47a09e8905fa3997c95054b4bee526d395a841522b540737d3507d163b1099b956b5b70a665012e4e4ff8b8c5642e0782252123f3768680cc0686d1d481af405b368bbf80142295a4c8f4194a5c2af28a308fde1dcd62efc748f2f41849abbe8e0d153e4c06cef19b835", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r3, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0xffff, @empty, 0x3}}, 0x0, 0x1000, 0x7, 0x8, 0x44}, 0x98) [ 2105.602345] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, r1, 0x1}) 12:14:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa1c0, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2105.656088] validate_nla: 8 callbacks suppressed [ 2105.656096] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2105.726972] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2105.732826] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:41 executing program 2 (fault-call:11 fault-nth:30): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:41 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x1e8) 12:14:41 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) 12:14:41 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x200000, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000340)={0x3a, 0x0, 0x6, 0xa, 0x3, 0x81}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x1, 0x1}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f00000000c0)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000240)={0xa0, 0x19, 0x2, {0x70, {0x2, 0x2}, 0x10, r2, r3, 0x7fffffff, 0x0, 0x8, 0xffff, 0x5, 0x7, 0x80000001, 0x5, 0x3, 0xfffffffffffeffff, 0x7fffffff, 0x2, 0xb4ba, 0x8}}, 0xa0) open(&(0x7f0000000000)='./file0\x00', 0x10b002, 0x20) 12:14:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:41 executing program 0: r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d5d5ecfa4fbe23a1a1e866e3899245cdaa4a7998c4418bcef92f1751af55fa5e53c12f93ce681c7feaa2f7347989d0112e00", 0x32, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)=@secondary='builtin_and_secondary_trusted\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501bf0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) [ 2105.937488] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x4, 0x0, 0x800, 0x1000, 0x0, 0x7, 0x4020c, 0x9, 0x8, 0xd6, 0x3f, 0xfffffffffffffff8, 0x1, 0x7, 0x9, 0x3, 0x7, 0x7, 0x3, 0xffffffffffff8000, 0x0, 0x0, 0x3, 0x1, 0x3, 0x4ae, 0x10001, 0xff, 0x5, 0x6, 0xfffffffffffffffb, 0x3c8e, 0xe59f, 0x3, 0x5, 0xffffffff00000000, 0x0, 0x86, 0x4, @perf_config_ext={0x3, 0x44d}, 0x100, 0x1000, 0x6, 0x0, 0xeb, 0xffff, 0x1}, r0, 0x10, r0, 0xa) r1 = semget$private(0x0, 0x3, 0x80) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000006300)=""/4096) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000000c0)={0xfca6, 0x264, &(0x7f0000000240)="013cf3bc9177dd12d784e77e96840bdb3a850be31b94028328ca95c597e3e4a6a3b14d552b91231542c56c1278ce8575c859758fd185fd267babb55c704c8c3504e6a21cee0bee18655718bb56ed9817c71ebde61201ba04596a0bc47da30137d5a14466c94fd8112f12b055b7776cdfab9303115ed9148b626cd0590f95de80cb68d0d556018d984ed8c3b1d5dc5456def04eedba665c4c3cbbab86a04f1a7b8f5b049ffefa1d7fdf768d6ab98f567e5b6c72303081e2b5", &(0x7f0000000080)="bb97ca05d5fcd31e9f39eb9311e803897e91", 0xb8, 0x12}) 12:14:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101002, 0x20) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') truncate(&(0x7f0000000180)='./file0\x00', 0x5) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000c0) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x2, 0x0) 12:14:41 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r0, &(0x7f0000000040)='p', 0x1) [ 2105.985805] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x1, 0x5, 0x3, 0xc64e000000000, "67aadf12ed6f4c1138b818995b3d48426b13d01957bf9cdafe365aad528de3cd8686d5cfd9c28feb378e7cb4abbcdda368f2ac1f0d21c2cada6519183d6bb4", 0x3d}, 0x60) r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='D\x7fN\x10\xcfvP\xb7\xc1\xfb', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) [ 2106.047418] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:41 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) setsockopt(r0, 0x400000000ff, 0x7, &(0x7f0000000000), 0x0) 12:14:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f0000000000)=""/78, 0x11) [ 2106.091084] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2106.120308] FAULT_INJECTION: forcing a failure. [ 2106.120308] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.126480] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2106.187414] CPU: 0 PID: 27020 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2106.194732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.204081] Call Trace: [ 2106.206696] dump_stack+0x172/0x1f0 [ 2106.210341] should_fail.cold+0xa/0x1b [ 2106.214241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.219378] ? lock_downgrade+0x810/0x810 [ 2106.223535] ? ___might_sleep+0x163/0x280 [ 2106.227701] __should_failslab+0x121/0x190 [ 2106.231944] should_failslab+0x9/0x14 [ 2106.235758] kmem_cache_alloc_node_trace+0x270/0x720 [ 2106.240864] ? retint_kernel+0x2d/0x2d [ 2106.244781] __kmalloc_node+0x3d/0x70 [ 2106.248603] blk_mq_init_allocated_queue+0x3df/0x1570 [ 2106.253805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2106.259353] ? blkcg_init_queue+0x18a/0x3d0 [ 2106.263692] blk_mq_init_queue+0x62/0xb0 [ 2106.267763] loop_add+0x2dd/0x8d0 [ 2106.271227] ? idr_find+0x47/0x60 [ 2106.274707] loop_control_ioctl+0x165/0x360 [ 2106.279035] ? loop_add+0x8d0/0x8d0 [ 2106.282665] ? __fget+0x340/0x540 [ 2106.286133] ? loop_add+0x8d0/0x8d0 [ 2106.289770] do_vfs_ioctl+0xd6e/0x1390 [ 2106.293672] ? ioctl_preallocate+0x210/0x210 [ 2106.298086] ? __fget+0x367/0x540 [ 2106.301551] ? iterate_fd+0x360/0x360 [ 2106.305365] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2106.310913] ? fput+0x128/0x1a0 [ 2106.314211] ? security_file_ioctl+0x93/0xc0 [ 2106.318630] ksys_ioctl+0xab/0xd0 [ 2106.322102] __x64_sys_ioctl+0x73/0xb0 [ 2106.326006] do_syscall_64+0x103/0x610 [ 2106.329903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.335094] RIP: 0033:0x457e29 [ 2106.338305] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2106.357207] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2106.364917] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2106.372185] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2106.379455] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2106.386722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2106.393989] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:41 executing program 2 (fault-call:11 fault-nth:31): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) close(r2) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xf10, 0x42101) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x0, 0x1, "e3cebe840dda4638a1b5106b80c0c467e565e16ad60d91e612f0b64455927868fad927519f0e574dde6c01b60e4fb809317fb5c642820d30d16c693ebca1a16039dc69295cd6be09fc89086f9ae8f9a68c92446f8b80a5e954cd630d487d4ef48268b41d01a958ca52494f38c7147f54f1be4cdbd7a966ca5d9efcdf1501a4787590bb266e79ba0945482a87744bb1f545e47c2181a0561ffb431315c0dee1e92229246ce2f7e77ef323041a3d4668c3fbec88ae1d46b7c689f768f42bfeb248330bcfd26cd35ce183be24895146d75563687576c9738dd4e324269abcc5c8b94d81f26878a3cce40957f3488b77a637e9fbbafb666aebe6e1921adefab97930", 0x71, 0x3, 0x5, 0x7, 0xff, 0xcb, 0x2}, r5}}, 0x120) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f00000000c0)=0x2, &(0x7f0000000180)=0x2) finit_module(r3, &(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:41 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) 12:14:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4100000001040501ff0080f7fdffff2e0a0500000c000400000022020000003eb65054e00000000000000000"], 0x2c}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x192) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/58) 12:14:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) socketpair(0x8, 0x802, 0x7ff, &(0x7f0000000000)) 12:14:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, 0x0, 0x5) 12:14:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2c7, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040516ff0080f7fe00192e0a0600000c00f8ff520000007f0000010c000400000022ff02384127"], 0x2c}}, 0x0) 12:14:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f0000000000)=""/78, 0x4e) 12:14:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = creat(&(0x7f0000000400)='./file0\x00', 0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$EVIOCGABS20(r5, 0x80184560, &(0x7f0000000180)=""/140) write$FUSE_STATFS(r5, &(0x7f0000000380)={0x60, 0x0, 0x3, {{0x7fff, 0x3, 0x100000000, 0x6, 0x65, 0xfd, 0x3}}}, 0x60) [ 2106.558603] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2106.574145] FAULT_INJECTION: forcing a failure. [ 2106.574145] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.628411] CPU: 1 PID: 27046 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2106.635749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2106.645104] Call Trace: [ 2106.645135] dump_stack+0x172/0x1f0 [ 2106.645161] should_fail.cold+0xa/0x1b [ 2106.655250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2106.660370] ? ___might_sleep+0x163/0x280 [ 2106.660395] __should_failslab+0x121/0x190 [ 2106.660425] should_failslab+0x9/0x14 [ 2106.672631] kmem_cache_alloc_node_trace+0x270/0x720 [ 2106.677365] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2106.677743] ? find_next_bit+0x107/0x130 [ 2106.696459] __kmalloc_node+0x3d/0x70 [ 2106.700278] blk_mq_realloc_hw_ctxs+0x1a0/0xfa0 [ 2106.704956] ? kasan_unpoison_shadow+0x35/0x50 [ 2106.709545] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2106.714698] blk_mq_init_allocated_queue+0x420/0x1570 [ 2106.719900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2106.725469] blk_mq_init_queue+0x62/0xb0 [ 2106.729554] loop_add+0x2dd/0x8d0 [ 2106.733020] ? idr_find+0x47/0x60 [ 2106.736507] loop_control_ioctl+0x165/0x360 [ 2106.740837] ? loop_add+0x8d0/0x8d0 [ 2106.744466] ? __fget+0x340/0x540 [ 2106.747943] ? loop_add+0x8d0/0x8d0 [ 2106.751579] do_vfs_ioctl+0xd6e/0x1390 [ 2106.755469] ? ioctl_preallocate+0x210/0x210 [ 2106.759882] ? __fget+0x367/0x540 [ 2106.763343] ? iterate_fd+0x360/0x360 [ 2106.767148] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2106.772692] ? fput+0x128/0x1a0 [ 2106.775989] ? security_file_ioctl+0x93/0xc0 [ 2106.780407] ksys_ioctl+0xab/0xd0 [ 2106.783869] __x64_sys_ioctl+0x73/0xb0 [ 2106.787766] do_syscall_64+0x103/0x610 [ 2106.791664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2106.796853] RIP: 0033:0x457e29 [ 2106.800048] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2106.818957] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:14:42 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) [ 2106.826667] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2106.833933] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2106.841201] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2106.848477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2106.855761] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2106.867048] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:42 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = dup2(r0, r0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_gettime(r1, &(0x7f0000000000)) [ 2106.878175] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:42 executing program 2 (fault-call:11 fault-nth:32): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x7) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) restart_syscall() ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000100)={0x400}) [ 2106.943025] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:42 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000380)=""/195) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000200)=0x3) modify_ldt$write2(0x11, &(0x7f0000000180)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0xe79e, 0x800, 0x2, 0x3, 0x3ff, 0x4, 0x7}, 0x10) write$P9_RRENAMEAT(r3, &(0x7f00000001c0)={0x7, 0x4b, 0x2}, 0x7) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f00000000c0)={0x0, 0x0, 0x103, 0x2, {0x1, 0x7, 0x1, 0xe25a}}) r4 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23, @empty}}, [0x5, 0xd06, 0x3, 0x80000001, 0x3, 0x1c1068f2, 0x401, 0xfffffffffffff800, 0xffffffffffff7fff, 0x2, 0x5, 0xbd27, 0x6, 0x1, 0x8000]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={r2, 0xfff}, &(0x7f0000000340)=0x8) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2107.017726] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:42 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x4000000000000000, 0x0], 0x2, 0x0, 0x4, 0x4, 0x46, 0x9, {0x6, 0x8000, 0xffffffffffff0001, 0xfff, 0x1, 0x8, 0x9, 0x2, 0x4, 0x8000, 0x8, 0x9, 0x2, 0x100, "8d628d9979c619036362352e390466be121ccb9d5ffd7dd6773fdacc9304a6a2"}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:42 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) 12:14:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280), 0x0, 0x3}, 0x20) [ 2107.123169] FAULT_INJECTION: forcing a failure. [ 2107.123169] name failslab, interval 1, probability 0, space 0, times 0 [ 2107.184402] CPU: 0 PID: 27068 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2107.191756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2107.198895] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2107.201119] Call Trace: [ 2107.201165] dump_stack+0x172/0x1f0 [ 2107.201191] should_fail.cold+0xa/0x1b [ 2107.201211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2107.223741] ? ___might_sleep+0x163/0x280 [ 2107.227906] __should_failslab+0x121/0x190 [ 2107.232159] should_failslab+0x9/0x14 [ 2107.235964] kmem_cache_alloc_node_trace+0x270/0x720 [ 2107.241079] ? lock_downgrade+0x810/0x810 [ 2107.245243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.251779] ? check_preemption_disabled+0x48/0x290 [ 2107.256812] __kmalloc_node+0x3d/0x70 [ 2107.260628] blk_mq_realloc_hw_ctxs+0x4c5/0xfa0 [ 2107.265312] ? kasan_unpoison_shadow+0x35/0x50 [ 2107.269926] blk_mq_init_allocated_queue+0x420/0x1570 [ 2107.275126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.280719] blk_mq_init_queue+0x62/0xb0 [ 2107.284795] loop_add+0x2dd/0x8d0 [ 2107.288252] ? idr_find+0x47/0x60 [ 2107.291736] loop_control_ioctl+0x165/0x360 [ 2107.296067] ? loop_add+0x8d0/0x8d0 [ 2107.299707] ? loop_add+0x8d0/0x8d0 [ 2107.303350] do_vfs_ioctl+0xd6e/0x1390 [ 2107.307249] ? ioctl_preallocate+0x210/0x210 [ 2107.311720] ? __fget+0x367/0x540 [ 2107.315186] ? iterate_fd+0x360/0x360 [ 2107.319004] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.323792] ? security_file_ioctl+0x93/0xc0 [ 2107.328213] ksys_ioctl+0xab/0xd0 [ 2107.331677] __x64_sys_ioctl+0x73/0xb0 [ 2107.335575] ? do_syscall_64+0xfe/0x610 [ 2107.339561] do_syscall_64+0x103/0x610 [ 2107.343462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.348659] RIP: 0033:0x457e29 [ 2107.351859] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2107.370769] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:14:42 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000104f300ff0080f7fdffff2e0a0000000c000100520000007f0000010c10043100000022ff0238e93e"], 0x2c}}, 0x0) 12:14:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1222) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000104f7fdffff2e09ff010000000022ff0238e93e"], 0x2c}}, 0x0) 12:14:42 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2107.378489] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2107.385758] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2107.393028] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2107.400323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2107.407603] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2107.440494] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 12:14:42 executing program 2 (fault-call:11 fault-nth:33): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:42 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022be5180edb5"], 0x2c}}, 0x0) 12:14:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) 12:14:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r0, 0x0, 0x2f, &(0x7f0000000040)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8', 0xffffffffffffffff}, 0x30) [ 2107.546966] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:42 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8001, 0x1) write$P9_RCREATE(r0, &(0x7f0000000180)={0xfffffc75, 0x73, 0x2, {{0x12, 0x3, 0x7}, 0x80000000}}, 0x18) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2107.593065] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x18e, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e520000007f0000010c000400000022ff0238e93e0000000000000000"], 0x2c}}, 0x0) [ 2107.638626] FAULT_INJECTION: forcing a failure. [ 2107.638626] name failslab, interval 1, probability 0, space 0, times 0 [ 2107.693776] CPU: 0 PID: 27101 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2107.701117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2107.706964] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2107.710482] Call Trace: [ 2107.721671] dump_stack+0x172/0x1f0 [ 2107.725313] should_fail.cold+0xa/0x1b [ 2107.729215] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2107.734325] ? blk_mq_realloc_hw_ctxs+0x42e/0xfa0 [ 2107.739177] ? ___might_sleep+0x163/0x280 [ 2107.743342] __should_failslab+0x121/0x190 [ 2107.747587] should_failslab+0x9/0x14 [ 2107.751410] kmem_cache_alloc_node_trace+0x270/0x720 [ 2107.756519] ? lock_downgrade+0x810/0x810 [ 2107.760666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.766208] ? check_preemption_disabled+0x48/0x290 [ 2107.771244] __kmalloc_node+0x3d/0x70 [ 2107.775090] blk_mq_realloc_hw_ctxs+0x4c5/0xfa0 [ 2107.779769] ? kasan_unpoison_shadow+0x35/0x50 [ 2107.784370] blk_mq_init_allocated_queue+0x420/0x1570 [ 2107.789577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2107.795134] blk_mq_init_queue+0x62/0xb0 [ 2107.799202] loop_add+0x2dd/0x8d0 [ 2107.802663] ? idr_find+0x47/0x60 [ 2107.806124] loop_control_ioctl+0x165/0x360 [ 2107.810453] ? loop_add+0x8d0/0x8d0 [ 2107.814085] ? __fget+0x340/0x540 [ 2107.817546] ? loop_add+0x8d0/0x8d0 [ 2107.821189] do_vfs_ioctl+0xd6e/0x1390 [ 2107.825088] ? ioctl_preallocate+0x210/0x210 [ 2107.829506] ? __fget+0x367/0x540 [ 2107.832970] ? iterate_fd+0x360/0x360 [ 2107.836782] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2107.841570] ? security_file_ioctl+0x93/0xc0 [ 2107.845983] ksys_ioctl+0xab/0xd0 [ 2107.849442] __x64_sys_ioctl+0x73/0xb0 [ 2107.853339] ? do_syscall_64+0x5b/0x610 [ 2107.857334] do_syscall_64+0x103/0x610 [ 2107.861231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2107.866437] RIP: 0033:0x457e29 [ 2107.869647] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) 12:14:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e23, @remote}}) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xee\xea\xff\x1ad\n\xdf4m\xe0tK\xbbD\x1c%\xc1\"\xf4\xbe\xf7\x83\xdfz\x99\v\x10i\xcd\xcd\xdf\xa6[QH\xe1<\t\xdd]\xea\xdc\f\x84\xfbG\x85\xef)s\"\x0e2\x93\x1b\x8fF,\xb8Bz\r\xd1\x8f\xe7\xfd1\"f\xac`\"1\r=\xbc\xbd\xe5L\x83\xb2\xa8\xbf=b\x10\x83a\xebQ\x93\xd0>\xd9%\xe1;n\x7f\x18\x11}\x00\x8b\xad\xa1!\xebNA)t\xdc\x95f\xda/\xfc\xbe\x82\x1a\x82\x9c\xd7\xd4\xc4%\xac\xb0\xd1\x915', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000180)=0x0) r4 = semget(0x0, 0x2, 0x9) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000380)=""/252) r5 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x4, 0x8202) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="38000000060000c43f9f0b62e66f546f000000000000000000040000000000000005000000000000000f000003000000000000006d643573"], 0x38) r6 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x2, 0xb2b5f497eaf72f6a) write$cgroup_pid(r6, &(0x7f0000000040)=r3, 0xbf) 12:14:43 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000ff7f000000520000007f0000010c80de00000022ff0238e93e"], 0x2c}}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'ip6gretap0\x00', 0x3000}) [ 2107.888567] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2107.896298] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2107.903580] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2107.910848] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2107.918118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2107.925388] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:43 executing program 2 (fault-call:11 fault-nth:34): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) restart_syscall() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x2000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000100}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)={0x220, r5, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xdf0c}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x221}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xae}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x104, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x190}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc56b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x78a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x99}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0x4}]}, 0x220}, 0x1, 0x0, 0x0, 0x4000}, 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f00000003c0)={0x7, {{0xa, 0x4e21, 0xa964000000000, @loopback, 0x3}}}, 0x88) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000480)={'hsr0\x00', {0x2, 0x4e21, @empty}}) [ 2108.046675] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 12:14:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0xe82b, @ipv4={[], [], @loopback}, 0xf4}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}, @in6={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in6={0xa, 0x4e21, 0xfffffffffffffe00, @ipv4={[], [], @rand_addr=0xff}, 0x8001}, @in6={0xa, 0x4e23, 0xffffffffffffffc0, @loopback, 0xfffffffffffffff9}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e22, @empty}], 0xbc) 12:14:43 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) [ 2108.093194] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2108.144237] FAULT_INJECTION: forcing a failure. [ 2108.144237] name failslab, interval 1, probability 0, space 0, times 0 12:14:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x34a, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000001040501ffff2e0a0000000c000100520e00007f000090146a8eac0fae56ff0238e93e"], 0x2c}}, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x1c, r3, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x811) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f00000003c0)={0x10004, 0x4000}) fsync(r1) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="000929bd7000fddbdf250100000008000300040000000800040000000000040005000800040003000000"], 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) [ 2108.216769] CPU: 0 PID: 27128 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2108.224106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2108.233462] Call Trace: [ 2108.236068] dump_stack+0x172/0x1f0 [ 2108.239712] should_fail.cold+0xa/0x1b [ 2108.243613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2108.248734] ? blk_mq_realloc_hw_ctxs+0x42e/0xfa0 [ 2108.253602] ? ___might_sleep+0x163/0x280 [ 2108.257771] __should_failslab+0x121/0x190 [ 2108.262019] should_failslab+0x9/0x14 [ 2108.265832] kmem_cache_alloc_node_trace+0x270/0x720 [ 2108.270943] ? lock_downgrade+0x810/0x810 [ 2108.275112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2108.280655] ? check_preemption_disabled+0x48/0x290 [ 2108.285681] __kmalloc_node+0x3d/0x70 [ 2108.289491] blk_mq_realloc_hw_ctxs+0x4c5/0xfa0 [ 2108.294179] blk_mq_init_allocated_queue+0x420/0x1570 [ 2108.299383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2108.304934] blk_mq_init_queue+0x62/0xb0 [ 2108.309010] loop_add+0x2dd/0x8d0 [ 2108.312488] ? idr_find+0x47/0x60 [ 2108.315951] loop_control_ioctl+0x165/0x360 [ 2108.320294] ? loop_add+0x8d0/0x8d0 [ 2108.323934] ? loop_add+0x8d0/0x8d0 [ 2108.327570] do_vfs_ioctl+0xd6e/0x1390 [ 2108.331466] ? ioctl_preallocate+0x210/0x210 [ 2108.335892] ? __fget+0x367/0x540 [ 2108.339354] ? iterate_fd+0x360/0x360 [ 2108.343171] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.346346] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2108.347951] ? security_file_ioctl+0x93/0xc0 [ 2108.347971] ksys_ioctl+0xab/0xd0 [ 2108.347990] __x64_sys_ioctl+0x73/0xb0 [ 2108.348006] ? do_syscall_64+0x5b/0x610 [ 2108.348021] do_syscall_64+0x103/0x610 [ 2108.348041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.348068] RIP: 0033:0x457e29 [ 2108.379842] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2108.381316] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:43 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000100)=0xffffffffffffffa5) r1 = getpgid(0x0) write$binfmt_aout(r0, &(0x7f0000000240)={{0x10b, 0x84c0, 0x2, 0x2f0, 0x1ea, 0x0, 0xb1, 0x7}, "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", [[], [], [], [], [], [], [], [], [], []]}, 0x1a20) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/igmp6\x00') getdents64(r2, &(0x7f00000001c0)=""/78, 0x4e) 12:14:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000000c0)=0x10001, &(0x7f0000000180)=0x4) r3 = add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="dcfca195bd8a726905f239b4b17d1d5ddf487edde38e5400751e82870567fd27445a4973745cb6559b4d1d92a72364b9b8f9d403388599d2ab75b620eefe2be99b48d1874094f7b00f721b41f578af120dc8cc6df3dddac900f49078d4d61f82960f5aa7a1daa74b4e51a502e80321a4f19783236d6b323c116f178de25e0c864a43c5d1832a940f3f51a7d07e21efe8d9c8634116b1886b9e90f9a9", 0x9c, 0xfffffffffffffffb) r4 = request_key(&(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f00000016c0)='posix_acl_access,posix_acl_access\x00', 0xfffffffffffffff9) keyctl$instantiate(0xc, r3, &(0x7f0000001580)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', './cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00', 0x20, 0x40, 0x20, [0x65, 0x77, 0x77, 0x33, 0x63, 0x37, 0x64]}, 0x133, r4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000540)={'raw\x00', 0x1000, "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"}, &(0x7f00000001c0)=0x1024) r6 = openat$cgroup_procs(r5, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002740)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0xa, &(0x7f0000002640)=[{&(0x7f0000000080)="5e739cfbd2f1a72cd734ce18730112879d0104d7a3c462170eb77db8e83ef74c0546e60f2515001ec75e0a6f2c2c193117198d833eaff86d39b10aaaea813c24b34f411dae9e3df228c8edb87592fd727281bded2f49866970d37e0e3cceca2dbe334dfe07b9419a68dfd3bba925c08ae20bf9a9c195f1b880b7e983a57435bd3899546f20622bfc8f7e5909bca9861b56a452c6155e876963ad1f6d928fc870c9c6c9cb6bfb136a7318cb6749286787382a772ffe290e62b4ab055042330cfaea21d0a6c89af603e289f51acf78ddca4853d7487899ca5545d96764c7b5358ea4e4c85888972d3ff2b61818f615c52d47", 0xf1, 0x3ff}, {&(0x7f0000000240)="c366a749d865fe227148541482e514b33fad450e6510ebf2c2686bc62ffc658a35373f5479ac25cfaad355166f832d13b4bf512904274a17d7fa981b8721706f0babe7adda69146f08dab2290c2243734b784d17f89ccf9124a7994c4e49f80ce47a6e57ac5b589d7cc16a7e7bf18198b7c656f00366193543233dc16f543a755f0aa45b21af8bc4c2d812d25b2257ebd82a8d594e1757ecc60c3d6ba356340750ad74dcf5b3783051ed88b608a2d1a9193c2e1569250fb117cb1066a9411903e7509a8edd18a5ae91f9b05dbaddfaac6e0e567b2f1b925fd6ff740a02f84e1635dd99140869473f9ea975e89c602cdcdcb45f", 0xf3, 0x200}, {&(0x7f0000000180)="0b4e953d9c09f6535a8bbe9a14ae92f3fc4069697ce9194fc505ff7ae955c02bb5f5cf35c8f61be615d59b77b34dc217a8ea917ea72594868035fa739549de71b455b4663e3c7db705f9e78301c26e63d8cff981fcef9cf692d9c9a352b20727ff667960d8ab882508560f6b8df6994179267dc725", 0x75, 0xffffffffffffffff}, {&(0x7f0000000340)="cc968aa9fe509f044e3d08adff4468383de037b244e48c36be8c38c9194700870b4094d46295c2acc97e0167980a74ab7b5ecc1f22bfc53f714f6735351e80370f1f78764fb8550bf84327595db01e8451011221edbe91755b19bf249e57538fa2163a95e42f14838b3967b5e7cef662a0069176a820f28620305e0e9906b307fd52ff0d4b496e4428434caee1cf224771df7e6660a5e5325edb92b635ca13d7a055b0eb6eb9be1c2549b027cf20b2efb72f987fc450976ef8b15e2973c02ce78d6dedc4f9e36edaca142519c3cc1de00bb1a70ccc7f355242e54db4021a5638d712a6c3bde7a338745b91fc3aeba6c78a0d131ab80d1ebaee35f349d2d3f8bcc93edfb0b3fe65acf52d04190631cb36f550c39d5dbea1c90976871f85f9dd84c05e51a6bef0cc391028a1a8d2f3f92a942d83081fdbe2daa4654e938b40a4c1f9c457d9039c2e1deccca705b1f788ffb201a0102d150f460e5f5d5c9d81ede0f4a53c8780f863ec970aa583e6776a26eac56d266d0ebc6ed1a391547bf40c6206f63a99c75594cf7bd4a88f60878f690f9f23a827887784ad4e53fec6addf89f0b3f9824eb040740f768041472f7b70927d4f5c597d0f3a4c40dc0ffecf95bcf2af7dafb4a2eaac7762f89dc71c351583ed99c9a0ae42425eb22c28d00f2a93eb5946e5a8d67688adcea3e8c8b0ad4a35187b0f3fa601f3fe7a5b0be690acd27d80dc49e2ae2804d0c3d06afd1f951064b3d05d58d893eb2d2a2878af4f0f3ceb4b0429dc9a3b59cf035d0a214768405c9058d2a3ad8cc3cceaf144fa85fb2129faa7e3e0cb6408e3fb75b92081d9e53b20421efe5b17b0fc3629057bd07d55953caa9f61cc1a5d83170c5ca106ba2bc12b58816c0c2f2178cfd4becbe7fe75667e99d0bc30bb85edd30a295eef9f87c1d2155c598d95061ee309deaee1be9e88881572617c936fc8d5a7b1aee432308b02d4e740e0269b8ecf9b1f999bbe1e86cd12348b6e019b74b4f5c3ddf53135c2842626cfa7290bddd67192a47b24326782fbe5130ff26b86aa610df7f3569b736ac0a78a8e08d4634084d9b2db884da0e503eac8fdc3263daea22a2c987f630116ffa19a791d21b62eed432b2a06237d5277c940c7b35d005243eb44cc301aee9257d1a911ed7d3e1cb75f2578804052035316ba46e6011e5ee72c30a14c862e3d145ff1fe85523dd645478d193ea2241ad1f51c64070cde01503036460772a659d9085d029623d40b3691567e8a7a8912d21771394640491977a6b2c41293a2e987b9ab9f0a60eb3b66966a03b1994c18ab19f988ab82d3c6e9bad637e170a02999438870c3a2cf253144329bc526d6c78a54dfa4ccbea63453819603c1a9e3f4f47f4248dcd33f050871b7ea57372cfd1ded7c6476a4df8666d11933e534d28b2b226d8b93a0b9daa828bad67d464e6dec0f58cb02174be481cc082e4c1acbef425d67d837106719bda0fac15472137fc5b44384269484aecbb560603f8a10171c1878830911102c7b14fb6e601b743478ffa71f999a4ce1048010d2c2b558ce1392bdbb39e47c7969cdbcdd73ca060b87f70e1a0355150e4142672329a356f47729ceb04f34360779ff7f4683f2bdab82b5a2985c6526311558d9bebfe60be2e575c4fdfc132a3b5e722baee63b8e4acd67840fa7ed5c60f5871743e8ecb98f36aa741038a7b8fccb658b538c77ad4ac9fa0fa2ce46b9db82d34aecc686522f48f7610fc6458d7af21e69957827277dc4b0b0fecdc9a6492e67615672180a415a777b126a9588e96514b3d8d26ebce8fe8c9f01fb5c75618c570cec07094923542def7e6691e7e6031a67c74cd2e8dd24cecb6874abc45ddd9b952bf617f639a5945b6d90046bf54070308493a60c0cfc2f276bee8fbc723973085109d38634db028daff4fddad1bbb75c9820629b5bb8dc9080e277931ea495653c4074e005ac21712c3bb98303526c6c6e46a6f6cebeb8f0810e50877af3bdccb0607185157c2cc790169a81de913bd059fe11e95ff89fbcabff1b7111688f1378341479a3a9be660a61e5c4a1a882a056e60d068a84530e7c1c16a9082c02ab93c633d0875226fda5c6a252f06dd852d56750982446b930a74f0f5f0521a5e37b291b11af377050ba5fb8050ddf996a12efbe30b55b53ff26943e5b72a43b4b94497297562b86fc62a4ca82a7a6bef2d113ddd0d37734d1bc3d0cc53a689a1d297030c7dc5d6616a83cb3b0cdce9586ec632315142621f8d211708ad1c75aa315b86531372e6ababa0ba86a659af44986975840734333ce90c73fe15c9ec3e5a8b2eb52deb81fb4c890499051be9e57baaf53f4a5b9f0a697c0c0684fb8b2cdacf857bd12e6373cf9921f7c028eee2c2cccd4a6fd14244b602a637c865fa10d920f56e0fcf2b55bf6907b94dadf256c87423a1f009ab8d96a6077f406e40fa5caf93c027eb352045eb1531d2207ac482f8584de533cf5be590bedd46748479611bb73327d9a0ab72dba794bbe784d53c9b7b765de16bb80f8a7bb19fa95f7dd53fea94d675fd06437ce4d3a27d72f8fd80bf7bc60513a29caa95ea6047bf1abb958650d19cad9439702ca87b858d12f965098ae8c8d0d65e372e2fddf342fecf8056d656f8ba13363679a59efe57b337684754d30c4ce6cb6178109f6bca7e1518fe07b95a033b23421ae25e476058a327a9bc976ac8488297355a76eed53ca4ed1a58c993a155d369b2bb6a9c0e93660520563ba420da22b894e91b676973f360052098100a2d33f5e0534373dbb3a2ef5abb198d882363d6d239938704461acfc233fcc210be41524e47a4672517eec70ef0bc137a4d412ae38cd10e0d45ca9a00a995b7f0485d5f48ccb66a319a09423a5d22b1d56b6b6482c8bb34d8cc687de305a0f9d7dc6e1dd6b5dc17c364dc3610533d2bb6e4c804e7755672a82c3560cdb7e0f874fe0ef6dfb4e14dccdc61309f08a53d2fb8192a762d0a95d3c4c58b26247e5fcddc8c49c77f0dd799f41dcb73623c0c38ac8c8a1c30cfd2b310f7de81bcb78b6c03010809928afb5af79f52f5fb4f3c972efef41e7e88e7e942ffb63417726ddc32cc4dd2422750373402d71e6b9b3bb33e76fa626fd7e0363ffefc6843c9225fdc8aed3f4b42cabbf1dd78e40c54db5ce329b7f3f61d3fa2363ed1947896ab88d4ac787fe7457d7c7fe1000f0c9f9bcc8a3a5d58c3332f840fd77432e01f1f8739e67312a3b5cfe0c00287e4707ae7fcb64b03870132a08b1acb0eb03a1c5e0784d4631dc066ad8b91308c2fe31f5c877e82658d27141d1220046006383e725bfccfdd46c9a5d1472b248dbea2ebb0546a9ebdc4163975b72df81873c6e255e8a283b0cf32049f7b106031017415ea17cd56f80b57185d456f34085059e839027c29615dceae32dba0a1b74a57c1db3df8bda6e269da3a06068d15a3c787fcc0d0af2bac99f415fae2b809311cd043443a79ea7da0457a4ef6c459bd6564455ef974e09ff16e3f937da836413b4016091b3df2fddea70d48c11acb80ad6668168035449a524d8d98555de88e2be36ee41b7be1c2e6c61aaa116d0b68d89030e19fe3fd18b36f41c2fa0507ca6e944fe9a9f27b5c3e1b1f43e43007b88c90851530ac3b56da750e542dfa15b9d9c7a4717b6ba69cb1577af3a660f2c02ca5300ac8c0d0ad318e4924f0e71360b24ba8bfad17b36a27c7a31711c53537446aebf8b1b9d78a8a706b1fc0703265a678c7b1440716898a76ed5bd39e5346a27dfdb675eb3dbdd76eebb221a5445b9d859f1dda8100d6b431466f01016f7f2b5036c94cff8d5bd3a7a71677472c2e58f4b7a4da0b1548b73fd7eab07dde2daf6cae1fc08431597b77df7e6cb237cbf9619cf1db7381116fd411409b4c39e308c6bc191a13379588d9f1f4d82400c6cfda0d87158453c3233a36c0881b81fff099bf91a0694e33fa46fd5eacf87b770404537f588a565ce0a39581b1e67d4b8380e41c648721c6af08c711115d14141d57ed683ee8a021740a274492ff8e9e407540892de3eb8de22ed3fae4b67fff5fb861ba452619a3e06112590c6529f38fd1c2e296103a571ff7b87329a9a9a5b23c579243b540d8bd2afb75dacf206c81f4804c95a724e6e038027e8c6fbe3655fef56c48eb7854d1f4710bb691ab8c9a1fd18beda7c7ca7c958871838eb0126adba491580ab39395595ec50e8fbae300aeed5a389ada475d46aaf84af17f523389747b76c88f8871d8cd4ea2651291a42274091b3cd15fcfa2afc1f2528691b4d404b4d6b105a16fb2e00871fdd7d85ebcaade263130edb739252978814caed043edfa1b9ad6fe896485f41306b5d0db49634ce4492a57bb10470329e837b89b9999ff4a6775006dac41982bdcddc17a757e7dad8372f27ef1928ca27b7dba71bf696bf51fa6c2440cd8f557e02f489f809a019e323edd0322241c6e042f8897cfbb7cd5117c68623f3b9ca3215226363741884e7f1c2b5dcb8f197fe078fa3436760bb83c43d64e6b2ba8ef8f2fdadb8609ce2d1998a9e32b2971f2c9f26dc832cf7ea39101ff922fac9a36b8b6048d46d4565b3f854e13f0691f4530f5516bc86021614f1454be3a928e869e3821c0214ffa56a48666f75d8afee3f6c0a01743404e8a1c1385910601a0d361c1b1e1fbad41a4541cd94906d9575f9e1c20dd066184e94b79e81d9f13e59756aefc1b8e63be7e4ce4526668d2f2a65ad2af42783b3ec0756a8a2bdc60d25f53db307f57b2b41281fd0dda6f9129bc3ca3adab780c83f1f146962cb5c22a98247b7e44315119c533539109415b85edc357235ce30ff28bf48f2f7098a3d602db5fb3198bec2ff406d81b6139504cf9c7457f8e23af8070eea0802585001218fe7ec97f74bfa3ef93ca26051256006f5f7e7f934d304ee436bd890b057425d71ccd723f9b25658edde821e74aa2d633e05e6840e4d9181b9c0842690f7633ee65ad8755fc14f5d89636049cc0b92eee44d48e20c59d98e5cf09585b686941809f735abff8df2df651e6801b1987953f93843c9d968d055c67e7b232a7dbd7e71a812cdfba60aa2fc392d73ec8876ed716a8e2859ff9da76fdd5662b33a78567c8ec86d1c671567b91c53a2ccb9e6334e5e59014840c897528236cc0ca7813178414f26a465632b522df0ddf51df4aabe4d35bb2322b6ca49c21ed059f357e9ca3a4326cb03fe44bb64c4a3fb7abddce3a83eb5cb38b2687791745b7b2c18c29c788cff4fc914d03e3e11f81c811a28d86b8f088d8d0a4c396660e22de07adf08ea81e003d4ede712313b0ab2f11d22a06a56541fb080a870b365a6112e74607961694af927d278727c7660df828e614676fd1bdcbf7dd321c6c746fb86998be1e1fa0042a83baa27e68fc8374ea6c1b730d4b9d8f7772bef84178bfc7a3be4df5a8017361ece834e1a60bb29bc71118ec7bfcf53fdbc1f944285101d1470e0d0f387913c58a408f0d54ccc3b6229b7c286903ca12050b628f2756403e7c71c4f697d78bc1d5b0dd81f17c639a11c7b123a4e1f8cbdb4f7e3f1afc9cf33766915ad0eeda15e099a998fe9855e891ebd96f42e6aaa7eef059b6306826a09a0b21996b03431f679db88476e1a558dc7db8dd752437f180833e5a8a0dc543e2a9d708f50d21d9e2a5e827377f5f8e53f56157a1f4f1102fdac3004284595f0514ad89b9cee12e1b0c016f16a793b16fd11d4d05a4b84f12ee0637b7eceb0e1a31e49320df566d6fd760fc326186c5c8d8f82c9db2f", 0x1000, 0x4}, {&(0x7f0000001340)="3f1f79ab178e8f54cd6b2f50640a72a28c352ade7aeac5de8e65c8a08844d241f0b28dfb586c663c1e90a35b4582f58b511baf03542d18d593ea16e600f9855b0352d07a32aff7328fc993ffb6d591f426fc7c3ac054923256e18c72228c54434244f7208d24240849c59760b03110649c524620e8d3a3", 0x77, 0xfffffffffffffeff}, {&(0x7f00000013c0)="bfd6df9a4c5f624bd2bfe6a921ee06d23c503cee117298f875f98dcc5ebe147bc1d6be401cdcfdf7a9e3435b61d58596fa48e8e8eaa54a73f4d3697421a043d0e850ce099158a1ea520f47b810f5a724c052cc34f317516726c54a28528b4ce5a553d99a8960cfa91498c26c1e74749b4fcb097c89d83b9b83712237dc70a654f9e63b967904aade03c12fa9b0510a29313d9c4c82e5e3737eecd8c018", 0x9d, 0x76a}, {&(0x7f0000001480)="d7b537411304ba32217341ee41ce6a82", 0x10, 0x4}, {&(0x7f00000014c0)="3c86d8b53ae4362819183c25c00ee7884e9251f992326283b10b8641beef3aed1cf1a13861191ad5aa6975af10c03ded0f6cfeb508ae54e3f35c4782b6f4f2b62181b1c326f0db5b35", 0x49, 0x7}, {&(0x7f0000001540)="bb2e00e98ea221dc9b036b23760e9b97520ab9036c8c578eea5415d00766eb75844d1cde52d17b6bfc8ab55edb274c109f55c971b1fe96f892ecd1fe6e02030b25a25a070d65febfc34c694215e21c1678122e6005e6cba34b825ea0a0d270c1a6a1736d2f6671dca44fc11dcba714bf51c9d97a68790cd9ab583aaecfa4aa53659f39393d51119854bbe1016d60aed997a01a828874e71ed3f5552fadeeb183e953cbb8bb5e29359e94c8e318a48e8389e302175f3874dc5fe8efdb8486403362a8e365", 0xc4, 0xfffffffffffffc00}, {&(0x7f0000001640)="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", 0x1000, 0x7}], 0x800, &(0x7f0000002880)={[{@map_normal='map=normal'}, {@cruft='cruft'}, {@nocompress='nocompress'}, {@utf8='utf8'}, {@nojoliet='nojoliet'}, {@hide='hide'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}], [{@uid_lt={'uid<', r1}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xbdvmnet1@)trusted'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'x\xea'}}]}) 12:14:43 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2108.381326] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2108.381342] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2108.381351] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2108.381360] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2108.381369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2108.381380] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) 12:14:43 executing program 2 (fault-call:11 fault-nth:35): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2108.517102] encrypted_key: insufficient parameters specified [ 2108.542548] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2108.557178] encrypted_key: insufficient parameters specified 12:14:43 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="17bface97727d9334f15b59fc4b7b8771ac3064debb695242ad10432204095e966721f76f03207d9640433502d7d9edecb8cc124ae279983cac8bf5669c5b922") write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000040)) [ 2108.565564] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2108.624110] FAULT_INJECTION: forcing a failure. [ 2108.624110] name failslab, interval 1, probability 0, space 0, times 0 12:14:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_map={0xffffffff, 0x400, 0x200, 0x70, 0x9, 0x10001}}) socket$nl_netfilter(0x10, 0x3, 0xc) 12:14:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg(r0, &(0x7f0000000740)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x15d, 0x8001, "b75b1b34830e082e7fa803ef4c9164754ea4c2771d2499b323aefe85b5d107f0c87125befe90160d17c8f7982f605ac14ea523b6d8c3f19c9b007dc7482bed", 0x2e}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000080)="eefcf774f211aef08c9f9d8a68ff72c9", 0x10}, {&(0x7f0000000240)="8dcfd290f588d56dcc5d5e6cf8fe93f5deb46238d13bbed81071c2bacae99003b01813396490d15c652ed27f16cfaa940479384a2c34b0df71ad9c92b9a36e4d5091dfb5623b9d3093f6a32465b6c5ecd9055f6bb295fce563f184215cb2a1a7c0d90cdb5e4a5cf5dff1ae1cf3e91e9f97ed6ee9e39de63e12cfbb386af00b580992d7a4d237874a01bac9e6cc8824d0465fd8958ef107d5c0327ba1ca22afb9096ec47e053ed55950b76795f08cd1530b5276cb4b409d5efb7ffeb89dfa3438d698d022087959b5174bad048d53fd9e9ae1b31a367436dd938311baf76da1", 0xdf}, {&(0x7f00000000c0)="fdff9f719249b335da1585018fec6b8989f2749ec20482509cd303463cbe", 0x1e}, {&(0x7f0000000140)="a1250eb0cb203a64ed77ba3a9006a13d1aa2971e94aa4d22729f4c5a0e6722d9534577399f4eae2b5a8a977a5594ba5b263548018a5afa76bab49a5477b9ab6a447930d4408591a1887c6a6ae368c03f26eab72c3f1f98be6cc9c6a065ba402e698c09c25212942c393c7d703ff086fe509551948f213e380795ec182d", 0x7d}, {&(0x7f0000000340)="b15664ea82271a0fd2f717d9837fe2c527ba88d74b02ba32e4aad2d50f87db83036692242815561be213e9999fec11482983388f03d6ee953221b2b0807aa4d540940a960724b5a1949da4a640e9bba512fca42946e8bc26ebb62fce45c07210642c87997e9bf1888260fedbe24a607c041007b0208a95e48dea29b9ea089f0d97faa31d6a07729c2d377894e081170da23ad9315ecaa6f035f56782acb6c5a0cd31b0afe68c437d82cc609a00321efa9c45e113391c16f657473f591f95a772a6805f7754b8288e86a8b091c96acb5a5bd118cd5ea984036a2d4c49f7b33b5034aec0", 0xe3}], 0x5, &(0x7f00000004c0)=[{0xe8, 0x13a, 0x2e58, "c4d54ef723cc80215703bf63e066aefabef3be4fd73f811ca7003510e506435c2fc4acc975656429155f98286257b86a42a5de979a6fbfae14e74635986378871999787795b5905978f8eca774df2d6ff5850a891c4052486de98db9de7b49a8d7dfed0c84a9fdafd2c160774a84ef2b01b2a3f273da0014a499079e56345c59b0169352a510b8e5510fdf8143e66100d8f12ad51abc7dc43d7e6b58d7980119e9062a3a286bb16b795239151b938e49aa77ab7d88f2061c8d69dfd641678d426a9efd75ef6eb7b81e2f1d9a0ed82ac66ff7"}, {0x78, 0x1ff, 0x100000000, "faa455fb91cce46f30b8e76c806982e4ee990d727a2467dd5099f056f3cccc54cf47bff1a403c56a24a1f370be77dfea3080f02fd98f9d2215dbb329f4abe1f109f434ad72e92cb73bc81145ae40b947c8edd04c2833e049cde9548682df8e96d8020112"}, {0xe8, 0x0, 0x5, "3e5bb58a1b46d3b4f506f480df774981f9086f4fae2d8da076346e1a33519ae31ec8fd71c2e6b2e5235e2d7d9298e91a0021d0f1e533964dc549ea88f0279c6e317a5c72b0ccf9a73c3eb0a4f6993862bad3e938ee6e244c87cb3cf86913bf00636ea026ce8b9ac7deceac9a261e6536b945da7706d06361ad5637c68f9dce0c5ddbe62834f2215d73cb5101189b342ea1bef8b55c548416a512c13464b6b5948a62ad6c6c4182330a61c5f147c58aa7599be0ae94894367e1a714931539be87a37cb3e112c441bd059dc59d429c8fb5a08a"}], 0x248}, 0x4040004) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) 12:14:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) [ 2108.671268] CPU: 0 PID: 27158 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2108.678593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2108.687951] Call Trace: [ 2108.690560] dump_stack+0x172/0x1f0 [ 2108.694212] should_fail.cold+0xa/0x1b [ 2108.698121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2108.702720] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2108.703241] ? ___might_sleep+0x163/0x280 [ 2108.703278] __should_failslab+0x121/0x190 12:14:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={r2}) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) rt_sigqueueinfo(r4, 0x5, &(0x7f0000000180)={0x39, 0x1, 0xffff}) [ 2108.718159] should_failslab+0x9/0x14 [ 2108.721969] kmem_cache_alloc_node_trace+0x270/0x720 [ 2108.727092] ? rcu_read_lock_sched_held+0x110/0x130 [ 2108.732115] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2108.732137] __kmalloc_node+0x3d/0x70 [ 2108.741211] blk_alloc_flush_queue+0x102/0x2d0 [ 2108.745810] blk_mq_realloc_hw_ctxs+0x732/0xfa0 [ 2108.750487] ? kasan_unpoison_shadow+0x35/0x50 [ 2108.750516] blk_mq_init_allocated_queue+0x420/0x1570 [ 2108.750534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2108.765844] blk_mq_init_queue+0x62/0xb0 [ 2108.769910] loop_add+0x2dd/0x8d0 [ 2108.773366] ? loop_lookup+0xae/0xc0 [ 2108.777096] loop_control_ioctl+0x165/0x360 [ 2108.781421] ? loop_add+0x8d0/0x8d0 [ 2108.785048] ? __fget+0x340/0x540 [ 2108.788512] ? loop_add+0x8d0/0x8d0 [ 2108.792146] do_vfs_ioctl+0xd6e/0x1390 [ 2108.796038] ? ioctl_preallocate+0x210/0x210 [ 2108.800453] ? __fget+0x367/0x540 [ 2108.803912] ? iterate_fd+0x360/0x360 [ 2108.807714] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2108.813251] ? fput+0x128/0x1a0 [ 2108.816558] ? security_file_ioctl+0x93/0xc0 [ 2108.820977] ksys_ioctl+0xab/0xd0 [ 2108.824448] __x64_sys_ioctl+0x73/0xb0 [ 2108.828360] do_syscall_64+0x103/0x610 [ 2108.832273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.837487] RIP: 0033:0x457e29 [ 2108.840685] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2108.859586] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2108.867304] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2108.874576] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2108.881846] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2108.889119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2108.896382] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 12:14:44 executing program 2 (fault-call:11 fault-nth:36): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2108.938484] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:44 executing program 1: socket$unix(0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000001c0)={0x2, 0x5, 0x8, 0x9, '\x00', 0xffffffffffffffe0}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) getpeername$netlink(r0, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = openat$cgroup_procs(r1, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000003c0)={0x3}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000200)={r0, 0x1, 0x100012000, 0xfffffffff0000000}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000380)=0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) write$cgroup_pid(r4, &(0x7f0000000080)=r5, 0x12) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 12:14:44 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) 12:14:44 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x40000) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1, 0x6}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x30}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 12:14:44 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r4 = getuid() write$P9_RSTATu(r1, &(0x7f0000000400)={0x7a, 0x7d, 0x1, {{0x0, 0x56, 0x9, 0x7, {0x8b, 0x0, 0x4}, 0x80200000, 0x0, 0x7f, 0x7, 0x7, 'TIPCv2\x00', 0x7, 'TIPCv2\x00', 0x14, '!bdevkeyringvboxnet0', 0x1, '\''}, 0xf, '/dev/dlm_plock\x00', r2, r3, r4}}, 0x7a) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0x6, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0000273d7000fcdbdf250500800000da1fe05c4eb0fe5ba670a125190005001415da05306ccd451c00020008000300ffff0000080002008100000001000200ff01000004000100395822720e7bef40e7d21c339d6889cbfae29c89f03afefbc5fb8845049041e7fd443dca5634bd"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x44000) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) [ 2109.085089] FAULT_INJECTION: forcing a failure. [ 2109.085089] name failslab, interval 1, probability 0, space 0, times 0 [ 2109.141855] CPU: 0 PID: 27185 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2109.149169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.158709] Call Trace: [ 2109.161323] dump_stack+0x172/0x1f0 [ 2109.164965] should_fail.cold+0xa/0x1b [ 2109.168861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2109.173994] __should_failslab+0x121/0x190 [ 2109.178243] should_failslab+0x9/0x14 [ 2109.182048] kmem_cache_alloc_node_trace+0x270/0x720 [ 2109.187155] ? __raw_spin_lock_init+0x2d/0x100 12:14:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) write$cgroup_pid(r3, &(0x7f00000000c0)=r4, 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r5 = socket$inet(0x2, 0x361b52f9f145520e, 0x7fffffff) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000040)={0x81}, 0x4) [ 2109.191742] blk_alloc_flush_queue+0x8f/0x2d0 [ 2109.196255] blk_mq_realloc_hw_ctxs+0x732/0xfa0 [ 2109.200955] ? kasan_unpoison_shadow+0x35/0x50 [ 2109.205552] blk_mq_init_allocated_queue+0x420/0x1570 [ 2109.210754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2109.216318] blk_mq_init_queue+0x62/0xb0 [ 2109.220385] loop_add+0x2dd/0x8d0 [ 2109.223842] ? idr_find+0x47/0x60 [ 2109.227313] loop_control_ioctl+0x165/0x360 [ 2109.231636] ? loop_add+0x8d0/0x8d0 [ 2109.235266] ? __fget+0x340/0x540 [ 2109.238787] ? loop_add+0x8d0/0x8d0 [ 2109.242427] do_vfs_ioctl+0xd6e/0x1390 [ 2109.246324] ? ioctl_preallocate+0x210/0x210 [ 2109.250739] ? __fget+0x367/0x540 [ 2109.254197] ? iterate_fd+0x360/0x360 [ 2109.258003] ? __fget+0x13/0x540 [ 2109.261377] ? security_file_ioctl+0x93/0xc0 [ 2109.265789] ksys_ioctl+0xab/0xd0 [ 2109.269247] __x64_sys_ioctl+0x73/0xb0 [ 2109.273150] do_syscall_64+0x103/0x610 [ 2109.277056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.282243] RIP: 0033:0x457e29 [ 2109.285443] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2109.304355] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2109.312082] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2109.319352] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2109.326618] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2109.333888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 12:14:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x100) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) [ 2109.341162] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:44 executing program 2 (fault-call:11 fault-nth:37): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r4 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet6_dccp_buf(r4, 0x21, 0x4f4533ed4caf2a20, &(0x7f0000000540)=""/162, &(0x7f0000000480)=0xa2) r5 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0xc18f, 0x0) setsockopt$X25_QBITINCL(r5, 0x106, 0x1, &(0x7f0000000200)=0x1, 0x4) write$cgroup_pid(r2, &(0x7f00000004c0)=r3, 0x2fb) 12:14:44 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r0, r1, 0x80002) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000040), 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000000)) sendmsg$nl_netfilter(r3, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000000c0)=""/53) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-)\x9d\xe2@\xadB\xe8B\xde\xbd\xf9\xf7A\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH') getdents64(r2, &(0x7f00000001c0)=""/78, 0x4e) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000000)) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000040)={0x9, 0x1ff, 0x8000}, 0x6) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80100, 0x0) [ 2109.423993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:44 executing program 3: add_key$user(0x0, &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) [ 2109.504844] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') 12:14:44 executing program 3: add_key$user(0x0, &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) 12:14:44 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2109.562843] FAULT_INJECTION: forcing a failure. [ 2109.562843] name failslab, interval 1, probability 0, space 0, times 0 12:14:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x400000, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x800) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f0000000380)=""/206) [ 2109.617846] CPU: 1 PID: 27212 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2109.625140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.634485] Call Trace: [ 2109.637091] dump_stack+0x172/0x1f0 [ 2109.640729] should_fail.cold+0xa/0x1b [ 2109.644604] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2109.649703] ? lock_downgrade+0x810/0x810 [ 2109.653832] ? ___might_sleep+0x163/0x280 [ 2109.657967] __should_failslab+0x121/0x190 [ 2109.662209] should_failslab+0x9/0x14 [ 2109.665991] kmem_cache_alloc_node_trace+0x270/0x720 [ 2109.671091] ? __lock_is_held+0xb6/0x140 [ 2109.675132] ? should_fail+0x14d/0x85c [ 2109.679032] __kmalloc_node+0x3d/0x70 [ 2109.682833] sbitmap_init_node+0x29e/0x510 [ 2109.687077] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2109.692516] sbitmap_queue_init_node+0x40/0x710 [ 2109.697199] ? blk_mq_hw_queue_to_node+0x9f/0x140 [ 2109.702026] blk_mq_init_tags+0x119/0x2c0 [ 2109.706158] blk_mq_alloc_rq_map+0x88/0x200 [ 2109.710464] blk_mq_init_sched+0x20c/0x750 [ 2109.714690] elevator_init_mq+0xcd/0x160 [ 2109.718734] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2109.724000] blk_mq_init_queue+0x62/0xb0 [ 2109.728049] loop_add+0x2dd/0x8d0 [ 2109.731484] ? idr_find+0x47/0x60 [ 2109.734928] loop_control_ioctl+0x165/0x360 [ 2109.739229] ? loop_add+0x8d0/0x8d0 [ 2109.742837] ? __fget+0x340/0x540 [ 2109.746305] ? loop_add+0x8d0/0x8d0 [ 2109.749916] do_vfs_ioctl+0xd6e/0x1390 [ 2109.753794] ? ioctl_preallocate+0x210/0x210 [ 2109.758188] ? __fget+0x367/0x540 [ 2109.761629] ? iterate_fd+0x360/0x360 [ 2109.765427] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2109.770947] ? fput+0x128/0x1a0 [ 2109.774218] ? security_file_ioctl+0x93/0xc0 [ 2109.778608] ksys_ioctl+0xab/0xd0 [ 2109.782043] __x64_sys_ioctl+0x73/0xb0 [ 2109.785916] do_syscall_64+0x103/0x610 [ 2109.789792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.794962] RIP: 0033:0x457e29 [ 2109.798135] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:45 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x7, 0x40, 0x101, 0x7, 0x3}, 0x14) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) r2 = socket$kcm(0x29, 0x7, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYRESDEC=r3, @ANYRES16=r3, @ANYRESHEX=r0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64=r2, @ANYRES32=r3], @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYRES64=r0], @ANYRES64=r2, @ANYRES32], 0x3c}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) [ 2109.817018] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2109.824703] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2109.831952] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2109.839212] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2109.846462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2109.853714] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:45 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@ax25={{}, [@null, @remote, @rose, @rose, @default, @netrom, @default, @bcast]}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180)=""/202, &(0x7f0000000280)=0xca) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x4, 0x8) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') r2 = getpid() process_vm_readv(r2, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/255, 0xff}, {&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000480)=""/171, 0xab}, {&(0x7f0000000540)=""/116, 0x74}, {&(0x7f00000005c0)=""/153, 0x99}], 0x5, &(0x7f0000001b80)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001800)=""/113, 0x71}, {&(0x7f0000001880)=""/44, 0x2c}, {&(0x7f00000018c0)=""/152, 0x98}, {&(0x7f0000001980)=""/243, 0xf3}, {&(0x7f0000001a80)=""/187, 0xbb}, {&(0x7f0000001b40)=""/63, 0x3f}], 0x8, 0x0) 12:14:45 executing program 2 (fault-call:11 fault-nth:38): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:45 executing program 3: add_key$user(0x0, &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) [ 2109.941183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) accept4(r0, &(0x7f00000000c0)=@hci={0x1f, 0x0}, &(0x7f0000000040)=0x80, 0x800) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @remote}, 0x10) [ 2110.016891] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f0000000140)=""/78, 0x4e) 12:14:45 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', 0x0, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) 12:14:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f00000000c0)) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2110.110379] FAULT_INJECTION: forcing a failure. [ 2110.110379] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.158351] CPU: 0 PID: 27246 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2110.165649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2110.174996] Call Trace: [ 2110.177596] dump_stack+0x172/0x1f0 [ 2110.181247] should_fail.cold+0xa/0x1b [ 2110.185172] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2110.190312] ? lock_downgrade+0x810/0x810 [ 2110.194479] ? ___might_sleep+0x163/0x280 [ 2110.198646] __should_failslab+0x121/0x190 [ 2110.202894] should_failslab+0x9/0x14 [ 2110.206697] kmem_cache_alloc_node_trace+0x270/0x720 [ 2110.211803] ? check_preemption_disabled+0x48/0x290 [ 2110.216822] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2110.221840] ? find_next_bit+0x107/0x130 [ 2110.225906] sbitmap_queue_init_node+0x29e/0x710 [ 2110.230669] blk_mq_init_tags+0x119/0x2c0 [ 2110.234838] blk_mq_alloc_rq_map+0x88/0x200 [ 2110.239179] blk_mq_init_sched+0x20c/0x750 [ 2110.243439] elevator_init_mq+0xcd/0x160 [ 2110.247504] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2110.252800] blk_mq_init_queue+0x62/0xb0 [ 2110.256867] loop_add+0x2dd/0x8d0 [ 2110.260325] ? idr_find+0x47/0x60 [ 2110.263784] loop_control_ioctl+0x165/0x360 [ 2110.268127] ? loop_add+0x8d0/0x8d0 [ 2110.271767] ? __fget+0x340/0x540 [ 2110.275233] ? loop_add+0x8d0/0x8d0 [ 2110.278871] do_vfs_ioctl+0xd6e/0x1390 [ 2110.282761] ? rcu_read_unlock_special+0xf3/0x210 [ 2110.287609] ? ioctl_preallocate+0x210/0x210 [ 2110.292019] ? __fget+0x367/0x540 [ 2110.295499] ? iterate_fd+0x360/0x360 [ 2110.299359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2110.304903] ? fput+0x128/0x1a0 [ 2110.308211] ? security_file_ioctl+0x93/0xc0 [ 2110.312628] ksys_ioctl+0xab/0xd0 [ 2110.316091] __x64_sys_ioctl+0x73/0xb0 [ 2110.319992] do_syscall_64+0x103/0x610 [ 2110.323895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2110.329086] RIP: 0033:0x457e29 [ 2110.332294] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2110.351193] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:14:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000a605910bcfef01040501ff0080f7fdffff030000000000000000520000007f0000010c0004206167a9b000000022"], 0x2c}}, 0x0) sendmmsg(r0, &(0x7f0000005500)=[{{&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x100000000, @dev={0xfe, 0x80, [], 0xf}, 0x2}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000000c0)="75b2554f8cfaf96d9d9a2d0eff114235a4681abe773a0a5c0ea4b4389c7cbf66a4ce4365e487ca3df13c4c9a9a60d5f0addab55854f310442484ca909f822ef2252a78fe3c014eea6b98e99438039865813eb0c28ee9f6a345de66c6ebd680ca3e9d7a71a2f8d9c1a0ab1ee93d6f4b26e4b4928f1fbc1e111db077b3a72084bf4ab3e60f0ca64e5f55ae2832b9d352d264b5412a698a25c24559c6d3f2d58cf1e94ce0921ff8ea0e4919ddea88a9fcab96d12202eefca30a600e610ae1b627bcdc623861e536965c158daa0ce5a4593db51b335b161be23b105bdfd2d9ca18", 0xdf}, {&(0x7f00000001c0)="645cb6fe109a0ce61a1c393f30d2b4d7bd1cb0af0815738230de6d4b12cf4383adcfe46152f4eb27872d168e2af91b6e96c87e863d53677715", 0x39}, {&(0x7f0000000200)}, {&(0x7f0000000240)="b548b3730807373eee4f77013b5c31aee4b6ffcbcc62d680d341782d46a600c1115c27e0998e8dc7d09c9c438e057bdd19744c05e0d3480ba2bb4d97b1a8000bb6784d32f4175be6fed81b9534ab456e7337166bb83c6458b96d331abd2ba28e8158352bb35a1d3a26103d40995bab391be9e1e854889f46bbbc52888b14045e4627327423e17ce90965b384c1b3e6afad5bb2e0b583894040f4b4635e9072661578121a617c2d5c06e7354d85a314bbfb0e0df905b89187f5826d8d3c5b6d8d1d8c01043018c1a960f10da16c", 0xcd}, {&(0x7f0000000340)="be3cdf24809036749acc7b0bb22254e73bdc29716765049ec306fda96cf1c7764914b99fd4b161d450a2a88f7e37db386d9b41e113b32a4043ed95c8ccaa4299431a8195346127d1c9fc5d8119109f239c6b6f54d4196dced4a645083e", 0x5d}, {&(0x7f00000003c0)="9cb15076d58c125bf307d3468e6d7b2e32680046fe4e70e239b0bb5edae64c682575ef873c5025ff9b377597559a5014b2d81b9e35f62ea0a5540893f0add87d43d9ac293cf77fa204b7afbf6e8c80d5b11926e2363ef3382f50f55520f096420f09b51c6ac6265b4fcf508a048bf183291ffdabba7724355f293123ae857527f8a598ce38739aded4b98f55d144eec8a10b1ab448640d40af273c40e00fbf22ce47f68c29f35e1b7034e3e32d5dbdde3e515cd70e8ed95052855525085db9250a3dcb261471c51200cde8b3d029ce2aafaafa", 0xd3}, {&(0x7f00000004c0)="c7ef7e5c874ce9bcecf66bc8b15dc44ec3862016c65fe1c2027cfe9fd080a5cf6e0eece6359db2ebc477e1b91c1e5de9", 0x30}, {&(0x7f0000000500)="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", 0xfe}], 0x8, &(0x7f0000000680)}, 0x100000001}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000006c0)="8751f6fb5c7f83e285dac73a0b6a632a9ec8db8cb19d994cc0f78405dcfa3aae92f9d58c82be679035f71c326f1c5ab7465911ad9453c193aae5a03a0678016edb4aa72826bf9d69c30b9a2ae18fd3c925b25711e789ac40199c024a441d542661", 0x61}, {&(0x7f0000000740)="dcc28d4a8921c2abe378fa59c6485caa02b91f875eac3ed7dec0ac16bf7432ab25349b27cf57cf2c560d43a8f8b1779fd068b531533023d8652aad3020db1af257d0b7eb287c0fff1c26e193012c36d1aebe318897368a369dec887fcd2e43752a97392ba2bc7536eb91a03d20a1848a8becb245ad86d45371ec64b50667e4af2ccbd3677917517af9f7d5d4a068595b10e590f0515e1214b4d2e0ea2d968e308dfa46792bdd3d1f313ff44974881e", 0xaf}, {&(0x7f0000000800)="a8510d3485c22a409a2a1a1c2563d89a5986432cbf3562a049fe35b20f9ceb6381690c3396edb314ecc8c532", 0x2c}, {&(0x7f0000000840)="463f860a8b9fbd5863618f5dd9fdbbb941ce2e1d447730dbaa594b0209d4757358113529dd97ead1c86f090e583d396c295d414d3bfaaaa473ec8a6e165b965bf64068bc295ee2bedfcd", 0x4a}, {&(0x7f00000008c0)="92b3f95f250b10a8c289730ed602f7365372dd95531eca9d2e42de1ba8f8c61558029955f1b238e3d94ba950ed8eb836979b56e5082bee537715ec850b585d6fc1886479e84d2122ea458114e74efe10b27eb33b69304e5f08c8c2add40f7f0369937682b0416cc3180d94679db13b218c1201a7f99d5b8a4f4525106ab004729d76e543760a48c9fa964cd482c2146ebd394c06128d1b46f129c1d20752e78d08", 0xa1}], 0x5, &(0x7f0000000a00)=[{0xc0, 0x84, 0xfffffffffffffe00, "e0c7cf1fd6a12bc4105a3ec3f130d1a09b322f0a4c12865e97ca40dcc5e9e154d5593a3c245309e57e829b3fd4f714de9585120ca5d22cade274e50c770203e4e4c0f8d3b99338696d69c7fe2a32e37fc3efe91d89ea4e5d63645ac04da86dbfc9b87396c9e916abd2a31946d7fbb54f483afc89d56cbbcde7735f3341097c0cc535c427a07ad4fa8fbdc3a4a9b3d715e09a55766c67d72c2a56d6999ccbcd901ae7bdffa0b7a4f14f4153c4bd"}, {0xd0, 0x10f, 0x0, "6071386ef270ddf5eb99f6c1642e6dd9be7cc3353375fa9fde72f33bd0323091d3e6c1ed32ae8f37de48e7c80e1e6f18c7beffe627ed11a36399f84925fe4bc013f09a621526880ebacb3c35dbfbe76abae1419384ecacc7aa7c08f1ac5f0f27ff3ed9c52d1fae1ec65fd0292d758377f0c37dc80a35253971ff328586e38e31878fa7a8c33569ef1439426e206c92e8ffece344142e0aacb51280d023793dc6c6cf57207eb3c6ef6524c60d3528a39376ee1abcc8bb50ab826b7b83"}, {0xd0, 0x11e, 0xffffffffffffcc24, "930ebfff4952b8b93bcf3d5062ba46315f2168edb5cea53330af2e17ca32ab3c9095df2991360ee935a3bbb46d5f441447e20ab160667ac24f29c7b51653e98c183a86385a8fb4168a9b69a30a449c8f1655e0a6bc97c76d852104b3d5760d4920d95e1ee44bfcae723e06eda7a0d14c42f66b903ab20381fa0f3b0fb31617ab858f2f99201cb85d0fea360712245fb2b78c3c542ed2eed5fb219ee7e8368e0a98a6fc6bb14f83ffd597cfb39164d6b56da37fcc41ea59ca9c8cf7"}, {0xe0, 0x11b, 0x80000000, "88507d1c4969ef110f22af9979fa1c3b702d5995da50f0f91b688bd72a95e46fe3988f0057f618823b2af10db85b988da431ff58c5b5c01f94cfcbac1077ed226aa6b8990fd7c839e0ebac2bc69dc5b2d14034477a3f0519b4a15723386d315be212978e22945919802d86f49b68a9834c29743718b7ab10cb215d330a940927247c045f8ee516eea641054202134acba5e6b0cf7960b6b7d0b5a14c558a112ed5dbc8b61062c08d40364a0ea2d2470f09d37ec2878e4be2ae108189f35745b8ee3b856299fe13f24c8f0b"}], 0x340}, 0x1}, {{&(0x7f0000000d40)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000dc0)="07224bf5c17d5adc715f3cc837d052733cb5ad65cfaefc792de4d4dcbc478a40d081b8ae2f5ad4a0785f7dd659849912dace8f03da431bb9512565d67cc903f02dfee7c8021ba9628686b0ff201ba6649d57b4938eaaf76029846b9bfa2bed6fd6c290bec7153132dd4b994e511c5e7355d4ad57127edffa082f445a21dfd89070dbccd05f8653b4189eb842df7b70ae44b720f84a47365d9b57bdfdadf61ba0b16323fa2ecf95efbb13f970f7f9af3ae257079b012906c91a21f3d5edf094bdfb3ee2871c07a1f700d9821fa48683467f853a3f469f0e74f3a0f89fb6d16c58f7d77603c47733c2d7cf7056940f76fc4c", 0xf1}, {&(0x7f0000000ec0)="6d058e6fefb1399a2aa61fbf6e", 0xd}, {&(0x7f0000000f00)="91e9653d99fc19c1cb2292985f8d444fa997f3672592399be71c1c4e21aff3b353774ecdc56fdb406cf6f98ec2cb90f3bee270eb4cfdee", 0x37}, {&(0x7f0000000f40)="a0526feab8c50aec677a6c09b1a12baa9cf2c5281f86b0eb51386c1f2dad6bd26a296373ef84461f0fce169728eb683b16473a724e87f96f456bb169e40af8c99417dcd0a036a88f9a2964f740537dd079528b8d173cfdb81c2d050898d3aa6a539a4429260491da488d53b4d9f8279f04d4fb49f1c82c2d28", 0x79}, {&(0x7f0000000fc0)="328e40c3a6c0b2d07a7141b9c315a0e35bd4c19a1c5b5bc1f1b4c7504f1b3606f237c0fcaabcb3b1e01c52dd2d30094dba78cd3dc607c0a15ac22d38af4b7a82e03c78f1428090556aa58971641c5405a0e0dc30e821d3b8e0ec1d42b9df9e50b3e9766d6ee72370bb192b724d03cae61f7ad1312bbe2169bffd87", 0x7b}, {&(0x7f0000001040)="5b11528950ed80ece507847f2f44450aea60ef3a3c7cd12bfd3dd897e6acf54c3e4d2e169cfc9ca415111ee0030ac7c398a9e8647ebe45a7df11d9bf3243993cb2eb73e532f37ce7c8f2217ee2cd0fbdca2e403e8e92db6fe56bd37a79c448ec4ec9cdbd1c81c0a65073551958a71aa3b3b508b9ef51cff0f2f9bdb5ae893b7212bf4fd424150eda968c08b8dd5d5f06a63eca83aa9f36fc9560278cf020b4cb44e43e7cb49a2a8d372792503b1a0567baef48d2b231abee73d4a92b64883bc988c64a686fe8de776be49b8992c2286a5e73f3d73627", 0xd6}, {&(0x7f0000001140)="97f06ccf8f3a7f3e48db8dd071eee45fb540fcf3be39bab8206f586ffab3ed6d5eb002b93ae640a4c285d64c3e8a2296976c8375ba9411a5cc67e699c7e9cc306614f184beb334bb23fb1ae15b3b4040447469814cea8e49570ffa382e95fb315961c777f772ed55d144cf819a0d6757d3c42d3681105eac8d2bdfdb2b823eb358e5df6153b95cbbb9dbb0b72ee44b5a9e30de66e03fb5f5ff6bf967b97486ce70f90605a9e087c2e163748b597b3264e17d03d5be5752093babb80f3b5c484de514012723c8106f8a49c34c3fb612cc3596d01b8b4a19c2", 0xd8}, {&(0x7f0000001240)="4d2eecb51a4e64900958480a6f52c3f33c05ccef189ad83a06ac158f7d62bf720773bddac15dacc7b6ba1ccde69002339bdde7def55208312692a5db629a1d9c27edcd49a5516a084d42da70c0ab5730551ab7679f4e7b02e0e76bf08d5e3a521412454ac4f15999bc24060e938509e0d8db487a219b0b9e63e9db073a5b04d84ac97d0ef9213092ac3a2c88defc418667a616b96ced738c39c5fa3dd3754c1600ac582ed017d14cff71576c6ffe177ccd5c18674637d71523a75d", 0xbb}, {&(0x7f0000001300)="f4182c895ae1883235178b5c2d7d02241507f6045d8997ec51fd11cd6d7830ab45e132d1015b433da0af476efb0a3d7c20ddab8b22253a6e64f6ce37e0933fafc8d75528af9c7ea0af1094647798e29042543c0dd43d287068bc3723fbfcc0780bb2440cf6bee8d55087c3421e284ecd36e488154e5466ca158a2515c0c30cb113add3d1d97d3f1ddef952da5de9c0a116d237517a047038a1a52252aa955f087d096100082a3c487adf", 0xaa}], 0x9, &(0x7f0000001480)=[{0xc8, 0x111, 0x0, "2f607aeb5ce58e6482875d4007050120111207da2e9d681a5015e9d44938adddc4391e2351e6f4e4a94e55b1811b9483171cf02cc720069eff594c98548acfefc53d9b46069382fd39d7e5b043b72849ce5b295cd3d7db19c7b8c4d57468ca9a26fd9cb76476eb76d5121e4e368bff8fe3f8b3c9f483bac24a747ac77b3f39592e086ad73158cda798695cfc092dc9d67e204ec54a88939b4c1b6080063973093aaf7f16f1d3196d984d8aaa0eb194a2ad"}, {0xa8, 0x113, 0x7, "0cc03e5b9f66d926461b942763f986461fe45e9c397acb3dadee26304e557460ec89e4a6b2d5edfa849cf3206ff85c630023069452d4c8aafd6b5c1ae822fcba0f2def21c41583808ba0aa2e56774bce1df8cc4c0edb2830a679b374f584bbf81defe3f6731a442d6dd379cbb46db210c11681532e2f416b662c56b490007eaacb388333d2921fd013321094fd3aab60ab9ad593e01fd7"}], 0x170}, 0x800}, {{&(0x7f0000001600)=@l2={0x1f, 0x81, {0xffffffff, 0x1f, 0x6, 0xfffffffffffffff7, 0x401, 0x2}, 0x100, 0x7fffffff}, 0x80, &(0x7f0000002840)=[{&(0x7f0000001680)="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", 0xff}, {&(0x7f0000001780)="0d958ec1e7842fdf0642c333470b455bfdca85fe138b6029e2806b636b36b2094948c0f3090b16a8f5d3fa41f9d8282b815e95262eb0fc8c0baefb1e2442c7140bf596db50e3ea7f5ea16749", 0x4c}, {&(0x7f0000001800)="477862e8bd3c007fe15f9b1888ba5a64bb230829ce80", 0x16}, {&(0x7f0000001840)="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", 0x1000}], 0x4, &(0x7f0000002880)=[{0x1010, 0x10a, 0x8, "8db5c4a775cfb3d6a8806e6acaf6c27ad74668bd23017bd41e3b3186fdd8bf7977fac918dda8b8f2b74228de5d340731f31c81e83e54a22fba9ca79a53f2d3b361eafb03276fcdc8ace666c58ef2c8e1a207f49202a5bdd94b119d9e02feecea31a3d2c22b3c03f51ac51099eaa830d7c6f3d2954dfa93dc115b028555df61d5e5373840f6b5a8501fbc9afbe1648ba1675d4a0eb1ca0695a9d387cb2f97cdfc93ab40716aa2e6c321746032510edd0586c77646305c2faf8f27b263c454c10c80680fa4998c7db4a96b9e4287951cd232a108a9d4e70ec88717f928105e1f272f52b030e266197379876ee723d960ab65eeca6f20026978bbf63299b147be5578148403e618e526108c2315b2a426c7798015ea5c3c76fabc8dfdb6f4fb034cbf50d856a28aab6402de0f6c297c207d6d3ba03e341b7223f5a5493619430ba20b7da914781d952a19878b6781ebc88cb351f9d9ca639dc45ac2993de7808ec4626f3a572cae3d496ff15bf1841865605e42e59cc89b6c02cc6a1da9deb94e454b3a4e042b8e12050fb353e1fd13460f6072d37d1c2daecdc4e688a70f345d6edf4cc2696df520f18cd950f402cffed295ef093a4f8a2e3516b280cc7a79e83859582b07ff7073fc465de3c95b8d775a5d4597850973d077792ed427edc5fcba94d60c72274fc723f7830bb1cbec959b2c9638bbad5ced8d52c014b2a503d17f096146fe4639a688989576de36a957e1f2ef5dabae39cdfe368b8952e63cb1cb43ecba9b0e08193b8662dbde5b3c6a298599475e3c733a8a4f765b7137d398a0c575201d55d8c1369088c0b66eb90caa6bb2f08221ae3ce7cec85d435755e6554178f96fa97d394644c82c6434aafb650bcb2d5d58a7825b84a17759ca4492dd5b285ac244818e2345f4497bdee5eb4162cd238c59cdbdcda1b74da7d3d1c7a7f95b76faeceaf55bb32aab1799d8150075d3dfc50e2bce6b03297753f2eeba2f7668b23576528048fb274b6b75ab50ae2b2ced7901924d845748e339a8bc635c9196858e3bb1c3ef341329b58b79666418dfe4be3c2ee471f77e4e3a4898e929476c07a35e94200f02b3f266c18309584780a7765b75e936b04af83a33f7b5d84a0293f7372ced766ad5ce11e8020fe46c4b968f821cd1a153808aeb3d7b649a7b36c92ac555e6b312bd5d7f4a987efd8e8fe54120bf517c2dc22171fd2d0e84bef0b6d69a06d54c74f2de10e87d1d60d5576256ab1f78f5d3427f215f37f6bab6e321cfe7040c853a930da0d5eac10018fc668eddb7a483c98e2b62beea87f7bf0be19baaeef7d7542c1ecf929b5d7bf9f335415e8aae501e4c679398289d776faf2a0c734c743e5c5f1bfc6b574f19725b057ad0e2554db318d12a24c3f19ce97a31190714985d37aa29e04defccc3cf6514a2bbea7e88d6bdbb39e9e9e746b1da4852b35c1f704a4772500a476b7f1850a6562e8dc937c2837f6de0a9bb62b17388a6e7ce722f93941453c8aa51131de1889c6a07a466a43efcbbd6e5bca4ba79bdbede4a40c8245e3156d8d3179031b4f17787b3e33974276f03821c17885ed58d2c7ac748e911a4a0571a550e00731c9b651067050bd8fd44c44c9a49604d90f2705ec55bff58af20da5dca617c53fe425e43218e5bfb960445746d8a86763919bc679fee340b89459a1bcb94f3aaaf8d024ae6d6c6a0b270752579f19ff3f262debe97d1f3184ab09b3d938ea8429c0d83b3f5a8f8dfd4b8e540fe35ab42cc1e4afb5e069a42fd94af0f100453690d078ae6c5e139148551fdb11497c51f4560008cb14531b282d45411ffea5d1a909f567d82c8239ac29b653fc577e1e7cb851da9afd5c45e0deff4183158e68f9fec89393552c97877cdbd102b06e3aaa36fc34e2ef7d87acef388343d49d5839f37faecc3bb3746739979efc1fc5efd3857500ba8c2e6ec678d30868b755f08054be8a264fdf83309dfd34fd02d59030713d391fdde6fe0a70f2dc75c7eb5ace320758d3066ae7fe39a5d56c265dcb21c2908b32ad5a11858154fddf36b19155b7a3a7cb81b1cf72dfb42c72a4f53e3608528091f334ab87ec259f342d9c7f756480efe378da436976b10d3334e448c646cf587c07ae28bec758ecf02fe4ea7a95bfc01a0e2cf296d5f53999707c35e4ba9b179de9c36663355e4980f8f91b85486be8b3b01637e1a156d7cae765a0c449c12a3f2c02583b5bf06bc8fdee93ced4556fffffc89dd303814b809cd4261c0b8f49ed1928a74a2571aacdceed548be452badcdb6ce953607dd721c83faafcbf1eb560c34067fb9c3a3c05a4015afa48f85ddd5df846a6bd56dda41ee27d390ac33b61494918c475da77ea1e44a3a8ba47ddb356483addd63e6128400392f69a2febfcef88b0db03973316d539690a394b1bb976349c8885c986cf57bc9eea387f401c4a12dc098851598d62ac36f7fc595900f2b0c48fd430ff33ca22657e9c6a7d35936e5535672c9db34afa143cfc2b016161b75799031e9fc5a887487c065c39bf0d5ee596e087b1e2e8ab173ec4ef3984fa43de9d7a97a5d89ae82841b3345555c2f1aae2fb652000b56b9f61ac750074beba0f93b9b0004f23a20b55b3741b505993e8672df4724bc5d374f684b9fba800ba610c59f092f44a20d1aa8bfd2ddf3ff68506a8b18dc5c799d8b4f226f6d1f30cfc81a1e0369373b28e035c13935b39a3e925960ee9e33287ec6c01ae66809de0c0859046dd284848eedaa4ef2abd30edf51a16698235b5983d867648fc27b053ffea62a28352dcc51cfe8f49f597d7d4fb156b9e223e25484ce3a8c2a59febcd5379f6bd5e6c52f2ecb825256936e7e0bb4582a0a6b72f24f0a775f54d73a07b5c8eeb4c88c411161be6dd776dbecb734ce8ee00fdc67739ecf01fbe17bb70ccc1c54b1cfa56e816e11f9145713cc9a5dbcac309cbc3650a5d9cd29317ce30165b21a3f89864e4fe21e630f4f10822e768d6eca6a020240e1c9115738e198d5c3ace6c579df2b80bc82f819c57d57b772d965aa3819bed65a62a1664a0edf567d8265d708c753b685e22761c5612e45b3858720db9247207815268cc138313c786eca6d18f86c75893f7eb4b9b7fb9352af6074b14ac059cc4d33d6fcbf61a1a315597fd8b4a756094eca52bb9bf78184f8c24aeb8275427bf55e6ed1753902e7bb86c39424120927147a6e433eed90491d9546e976ca106ab96fff2e8cf8f12ce9173e3c8f6bac21b9ad761f22d0c515660262e536dfd7a205521e920e3e367fbd2a264c045830624157f6fca51de5cd64a26949a6d032f0edd68fa4663ed8e35affbb24d95f5da88fa075fd8ab2c855bc25e41bbe35f093b1e11426652cf7a707bf58c6c48a77c7a22fd4f229b7872e31b462e4a76adcf3a8d0ecb2142194a04983df07c1c8415a7695e6bca73df905ac39b8d8131d0dada0aa7869104cce3eef208725cdcc68d6d34c6742c6d270c3ea4e1291d555a3c5f28b1d6f39c3a1a3184f69a3f6ecce74750c06b3efbecaf10ea0725b352d45e158713abfdaccc6499e17c5b323be9e22b1b798a3840f7894411c7462c74c90cfe72f61d74c1cfa98a32202196efa59fd140862ab019ad743ce4faf6198e8ef85881d3c399a280fc3bc912a97130231a78af9f278108b8ee7d5760d4a2e58dcff9dce814ffb62f21c6dd077500fd5fefd733f2d2213e54a8d3b840a2797cbae6820eff44d379268914471ee705ccf97ae018958ef121c60c636e7ce352d382946c99d114fa93683a482e383075228d8eeedbd28007eaf7f504c791f9c3d126d1a279fc6639fa8a2ac20ecc23e2762002c11aff989ec3ec35cadb98b8a280eae32e72b8549da9b951caab0c7f1bc551126be0c509ac6f0357b09c2878362cc473016db571492463c4d57e6a839afebb32808ba379bee1f7f4cd1bff358fb4437b4483d78d0d5c188e75eae346ccf3dd6cf4e9ce819d2e06fa9f817d44ddac8c7a631ea04210da23eec9d4d276409eef13e50dbd8d8301bac0886067cac0c557e2606f9ca67b213734a6d990a325c3880f17a0b11c03c8bab0fb1b3baed1a1f3fb76c736eb91a051233a479c1999344ed6716970e171dfda7cf93a657245033729d01201c662e489c1df15c34d28e5e9b6a9ec099b76d8e03e846eb2c2ad88519c5c57c628f3e5792d950089ef9fc9bbafdba9c9d501668fe5ed10407817417f6b20d25d55eb5e4e6cb1b067f4f149fd65061bc1daf0062c9c7d00c946e5b9949baf7aabe65bc5b917efee9c9494ba426bdc5fd97fe528c4ce9860fbebb56bc9953d2812347e8bd5e6e6c59e5c125631a0b00b07f3ea245847235713f09c17302c85a6b0b22dc748487f862bbca39a83d3cb2379ef3e0d7934c8c0fa95c914ecf49af8a9ab2a4f7654b204bbaa06bab772fdd9e9d4f772ba7b566e2fcd27fed076821dbe25ddd36234e31b4cd29e8731c54bfce1e6f54f249e18254db598283c9768552d0a93f2cc16360bd3d6a2681dbfd96f4992cf2bd307294ffa7632b6b5d3839200f95195fab70b9bd3c3bffd7828c05f29f767589e4ce5e5a3035c4ab04dbedafe9d5e37ef942cfbf7563510cc6f83b6515e77b16aa1cb3e93bad883ee69fed730cc7e584064baa5414e7973388367820aa3c143cabddf81e85075bb9bf4e5d8c6037a7f4396cd5494ee61e57e8aa02cc0a1086ac190c27f7e30dcfd396023686fa5ada37622e22fd62fc5fd39ac0d5aa06d21212ef8d4980e51e9780d95317094c30391d24eb33354858484476d803e72689d22443370b13a4b6e4a25fc06d556e7310ff1306639a4ecb0f56bd550509f4b53e4ce01c660501a7f1af194e3fc4f02b1192dee62faab9e44873c11a515d2b01c5ec35476add6a4abfa4a8e1f6615c4b4066079d0b9f31049bab5cd7444ae04c20c56f5d2473ab565a3f8eefff73acba7b88bc894820f4c379b2131a72fcc706d38b4e8de826e4c697c3a9c81857cc433017349b79e7bcc90b24a9855f872a7956e96d4c37d77eed6cb0f84db3daafe994a715fce6961782a316b77aeafadd769fa5530b70ddcac3fd150af6d0d82bbff46d783512a747f8ada523f7be5335fabda3ff333bb66bbe96a98e916b9310c32da490ee7612c930c2bd3d9f51af089ebd8606aafaf1f09f15e1984959272f0f463192af91f0d4c91afeae6071ed9410b995724877a3a4103f121f17c1102bd129c2d3d97e21d03b502eebcc85ddb7d103a5df6bf5d8074a3317bd71a4ec10d0f82b385593257dd6f537d4867f94b1d377e71b6d7f0872b1f2a2147eb227a8be834414a111f29c93ca77934ebe1ee200acc5693ede237a76464329986d42a5073394efae4a26900a4772c03fbcb184be006089c99b204ae734695de2a56f1c44d9015a260a73127ec4ee3dfe40525025727876745716ccdc2da7f1a42ad4d0c0f598e823cbe6411ccfc40d455ce5c0a6d69e892b1f4e54d0379445116acb1b1b7fc3efa9884f9d02f11ee006b116d024ffd981890dfc1924e9810c9a2bb1e6af92f6f2dcf349d70ff6fe8b9b156338b5bc5f3dbaa775fea49cb001e4e66b486e481bc39445daa004e3d9d2f4c2c7e33ee319501d59643f67bb298203d5d10df1ef279012a13e314f8fa9f0c158ca75e3f43b62436837dc627955f742dced07c1d38aee7e08ced48107aff81988a7dce60b64607aa713998e43e3c6d213af4af4938bab99e99707c2ea085d7af698446bf468dc5a8cb57050aff054b7a118fdc42408fe9568cc25e6939140a1"}, {0xd0, 0x13e, 0x5, "53dd3d71ec0cccad2e02be944bda468e41c263a0f1dba34b4325d14aafacd9df788c259d2829f0be0a3a0213db1760f4e019a49895447104ec102780073c09b3ea6c93e161ff64cc15d66820247fbd3aa0fcf79508288655e60163babe0cd52400f45c7340232c2234954f61ef6eac4ac0a8c0381c650512484fff4bb19836ad726a3e87d38b11e37407c72f23940225f9c9d3b3de6fcb77f6d28b0491dd463127f24ae987d9bc1486ebf4343d01f66027b5682f70fec05645d36521ad"}, {0x50, 0x112, 0x5a30, "de9c774ee9bc2faf4bafca804d9a73f7a171f0e13bdaa879026706693c962cbe6f7f0a8c65878476d34c52ec74ac3f757e9dda7d1789a80ff3c9d4453f"}, {0xf8, 0x0, 0x3, "51a19c5b53edb991176de0e10ec2218ab8da2fa646f90e373af270f7dab9f44ca0b849d622e62a5148d3d5225dc34cc951c2bf14b5d91d735f131a9b938500f8f0e8ace5318672dd42892d7eec00ad642c4526cb65c81d1e3e09cd49fbdadc9a3146514233e7facaac60b49db6bfa5408fd1138b5338e5c802f1d74ee9b48a558d781c5458f78aeb65fd15c349477e843194f4859a8e02c26ad2c6d4dca0d445bdc308ae213d961c5141936932e29ea6620c9cd477df47dc1ad91940c1b1c2ec671a8a810ef25b1ff9fc9742dcdf0a133f33851dbdbc70752a8598dfa34071e4ca69d2cddd"}, {0xd8, 0x29, 0x8cc9, "52c05313bfff9abd7e4c715c85c681c1979ba5bb50a3e19891830bc58d78ab23b54ba64881443db05777e9d0ad29e832d0c8eab2ed7714947f26672b69e4a0585962d4e70b324fde3ca2474457de0af3ef45d0f2e266d2dfadd065004353d62e5a99f2fe33a1df001e7959328fee268fe617a6081461440f537cf5d5ba542656e4796b24a50405ae738fb517b48559346aa8cfc53cd2d82a72de8bf26775c121597d54bcc4a0c1cd1d394206821f80282afdad20e4e8c4cd8d84e1b1c5d539193648d14d60ca"}, {0x60, 0x102, 0x3, "2244b8397cf18f2b1925cad8f85e3457a5a25d0c1fd5cf27c12bbad7df0404dc12e6648d89346647b6892abde97199d7145359a799fde463eda464a952cd2c70e8f5c3bf146a05d200df2b2a85f0ab"}, {0xe8, 0x10e, 0xff52, "f582bd28f7d37fccf3e2f43cdf22475824ab55a3ea9ad73127481935841489b2cdb2ed5b73a5ac4e49944aa8cd7c17205fcdffeefebcc38a0f7300504250e51bfae694f57289ae87ac904b0fbfe22c3c7abd47c856362d10b5404e53b5072e36e9215b0c702d07609676eed8dbd1d15302e1064718482081ed399ce5f3c505648ceb585e6d078b03c79a0629ee4c0a3af06bae64a6f48fc6cb3f22f29116885fbd4cf61c8b5b6a2fcb180c2a653e59427c1fbb3162ad98f01f45f48103680e7e634decac73f9fa55970a3acd3c84750256"}, {0x60, 0x88, 0x6, "9e390d8b66cb922e2e5cdfc374973db54f25f656d64747f92f390cbc6da206f184dfec41a1dced7257c618bcfa3e6fcb5e2a790212e7dc08c2f0ae15913c3c680d7ad4bfc587ca0975bf76"}], 0x14a8}, 0x20}, {{&(0x7f0000003d40)=@in6={0xa, 0x4e23, 0x7, @empty, 0x6}, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000003dc0)="99627fdab35499e1c65baaa87291b8aabd30f609f0cefb6636cbfde9a4a57a991e21dffd2d55e3d3dc6f599fcec1b466d202ee6bc8c6cc147d1915aae0ebf9365e181264540b7b93c42b06a7e0c186b807f98a376879074768a53dcade923e4bbe9b98da2d8332450d0c5e1912724d0005c78fd5d01eba9ef5f470f70178f09b0b7d5e2df11d", 0x86}, {&(0x7f0000003e80)="f301e6d80f0d06f14eb71937cb08eb76c77c8575e35fc3ce46a1d6790f6bc6916d1890686847922895c2f70766f0c8792eb573a748527dc5f6e993961d9e04b6199a3b21c9fd6875c919143ef21f5634daf1ece0e5d4d712a21a71a2afc304ff7caff963e08a13cf5e10be73032f2dc2d5c2c4e5f91ba971f30d2a141b2fe85244736451b38aadd2ad0ee4099414cfea98512d659b898c2a8923d9fd2dad1dae8ff0a83f488f14705048281763d9f75c8e3c0c8d29355912214b83b67194482b9d78e2aaceeab6fae8288665a44ecc79df25ec3cd63410668ea61a827839e974a4", 0xe1}, {&(0x7f0000003f80)="a7e87478ce51d9298139397443f57f751fe3", 0x12}], 0x3, &(0x7f0000004000)=[{0x110, 0xff, 0x100000001, "499138bc8d6b97cad711e3f94680ec3e367c1491f415522061ba54f5b0b7e734da8a53539412e0f96ba0824ff02b648784f4a3fc5861db0432cc2e21bbaad42fd8ab0016b6162f8817200612357de828ce3df763ca61244f0c2fa4cc3630552378b66d580433650fdbbd4f6aca0fdd27bfc04e87679cc60d99f98604091dbbf41e05d71613faffaff307708a2f32e5bc17cb46a8111cd943340d17e1d27459ef56499e1d67c68ce678016de23559f91effbe478c30dfe76aa1c005675346c53f40d76952d23093b2be98ae369f439d316b5584187ac3dbdbff8614282487987ef481f2405d9796e87ede6fb5718ec59f8d40069657cc7e2f0c5415a8cd"}, {0xb8, 0x1ff, 0x9, "456bd50fffed60aec5ef840e1b2c7ecc27a922fa337a9679732548eeec6e3f642bb1ad8ead0a3dd7d485f96a8b2e31f9bfd0c12292b2ac4d2074b77e74e4074ca60a02fa131c55f736d42e451be399ef58f7a56c48bca639823c85b3fadbac747ba14fbc825b77466f51e9e34a5ea32cfe6172b5b97dc404469ccbce00a7901c4df7be8a246b53aeb9804010c1255bcc638b41f1d3bf543fc42d5b4137d8683caa7c01"}, {0x100, 0x13a, 0x5000000000, "9acf82db29172bbe5aea485c60fd44afe2a6eaf3aa039451bb192731275ecd70efce70ad7951ed330880ac7c643695c4969b8cffa61ace0d2fa2b056de7fe4e20803b1a4e5da6fed768298d7c87a88975fd9e8141d679ea528ad7ad979555763f112e4b434ec2a36e3d65513b436aef605111ec71b2e8d3d61e89d173fc597c19e6525f0842c7f5cba4f8d5fc791f2daf24b400a19e4aff5de583044e90caedf5e8a03487a005b8c744b65235a6d03faaaaced562430f180c3d58f19c6dbd41814fef040e7e6e3fb3a124e41442563d6f92c832e5f8eac9cb046b282e42f2fa73c540af4070c9421ecb0e4"}, {0x88, 0x105, 0x4, "2228e2cdf6318660749de843f9f9e6ccf96f567c9bf79af54263fdebe421d38bf9e50c4ac431005b565fac37b752301a258fbfab1c02c1384e01a2017d07b04221d341447da69e1342f01c0dc6037ec258a039cdcc772ee136c6e985a20e6b05ebaa19b0c4e0d56a085c2c462f0d108857bb9909faacc6f5"}], 0x350}, 0x100000000}, {{&(0x7f0000004380)=@nfc_llcp={0x27, 0x1, 0x2, 0x2, 0x519f8f45, 0x7, "f3d3486da8e270cd8431ed5c839768f0c5feef21a775cfaaff36a8aff44a33990336dbae207bf859814fd8392ba4cca721d1baaa64a60cc47b88053f00c9c2", 0xc}, 0x80, &(0x7f0000004740)=[{&(0x7f0000004400)="751e22a7ba4f16e00cdbcc1167c42766eb7cd5b23e4f1e105d03caf61af5ffee0ad5cd5fa174a035c86164097be5803b201264e548b5692870b6c6ce84dae454e690fb4d57d68d09beea52e68fff0103e77bfa2f75dd5585783e792c5d13835eaace058cbff9830175120571d8e7d5", 0x6f}, {&(0x7f0000004480)="c78ac7ed10f1157be2df5a1ecbd088b1845425ea951c1769749a0d3d35684c0b0eed1a01bb8beb0d542322de", 0x2c}, {&(0x7f00000044c0)="c420255ab4b35a2a01739f63517be8410fb5c861746eaa23eefebc2ebf5c74c8a0fda8c658f3ce4335e42b7a4895feb984bc5c807c0e2d9c954a54f0a823548e0ca1072fe8ceef601191f7d10b0eb7fece3e3dc293c24f5ef80b4c4423044020c6dd65efb311caca81", 0x69}, {&(0x7f0000004540)="93446b6250106de8c568fa9001ba", 0xe}, {&(0x7f0000004580)="ae3315cbda5fb686c91e6bea77155c3d506cf2057f7a4df799d02649253a9895ab5b10392762d6899d4f0b6cf1d91cc61f09b7bd8928d185361bb55b9a999811e431328eb74f396ae5611a9a2a2910688469d412ca0de4381bace4420937f7385b73d5ee25c07093e680489116da7a50602ecd7496a528b1e37b29612ea69b6993941484c2611d35264a4b972957e55a2ceff66b4227d69dd5869b6e7e193e77936b054ed5b94723cd0ee3", 0xab}, {&(0x7f0000004640)="ea0ff5225e4e430c13cb439ee8f3fac400e550f22b00b4c96d08d4cac7a68ff61be6447884e6f7a84137259b5b7fc9670e83b759d62ba3b40452e8a31d787674ca3907c335c5dc9172e38659387364e8d593c532c8e5e8795eaec3581c377789cf40e257e30a160ef9b9bda4cd8c65706fdd8d29a6", 0x75}, {&(0x7f00000046c0)="226fc8537a8af031ff131eb19b1003e9ef74d4c20dc2ed2556f7359428da644478e76642f6826c015ebf78d0ad0841f69e577a4365e490451f0f578f3fa1726c82846ee40e484c841d78747c", 0x4c}], 0x7, &(0x7f00000047c0)=[{0xb0, 0x10c, 0x0, "b55ea547bfc9c2ed7cb5baa1657b47bea59d6c7a100fb3383f73ba9f89c4c3876a68b9d6bdfbf802205a9f4b99a1e0570113643e97cdd99da65814e389c6d01593b6df7ed4e2a369f6a9e85a075c8e0801354d9dfd3aedcfca2894bfd71cc9b2d40939ae3da50c515cf591509dce1f2db9896cf8698cf4042973fc0c921c34a43426add064336da3e966b1c98f1c9fdf306a927fb7844268f66ddb"}, {0x98, 0x108, 0x100000000, "1145f7c7a91db65f84367c7d958bf8e55b6ce0e5be274c86d7345403543f787975f29c003e9e4485cafcb99b6397e539484d09e0e1f744b1a8adac0df38d9b8868f77d6776e62dddf9ec82707c4995be1cc0631b54942e3383e41ac9d384b5ac9caaf71429c6c428e77c61d4685d0548f19373b2d070fcff15dfd08ace9e09c85eeda224"}, {0xe8, 0x110, 0x5, "8de98809dc3b3c06838ea2d8d8905d87392dbd8e4a318dd95c75a0a14b66f4e5adf36a88cb1ad92412bb35022a7195ca6221c09b0b04f173df560173af0c01f8301a80cce2ef317c2dbf1be85da44df572473f453b27f681e0fd4d911fb329490b1fa83f816f2c0499bd8ae19fc5805cbe7f6c4eaf71ca37a3067d5ca84e766b19575b2d527d1d62049d80c692ba33d66cb69c9960bec889dc9fc2fba16d5cc78a04540ae8d623597612a86d9f907ecd2c7dcdb2a6fbcd39fe2fbc3a78ed8f64d697b19761b03a0c4373934d68ca109a2367"}, {0x98, 0x117, 0x1, "f8397a6f94b8958b1fccd63789b24e3d7497699037698c697adaf5c7f36900749f485a7ba74abefc451d683ab9cafa0de4477f112f5bf48b60a92014ccda27f65104d90c73012c0424ece5106bd53b56a90b3ca476b5570481d47b898e02f3a8c7dd10da71d5f9db7ebf90fda31a88de17c5d8b62b1283ed3c8e7d15cea072ea7109"}, {0xb8, 0x11e, 0x1, "cd6225d693a71eeec211352a58860cf54c92e3d5131e5af86c3b19d8068a0ebfd02f31b28825a9be63ac89470f6effd3bcad7f1b272b40f8aaa0c2d3bad51bf8d4672fc81b2d2bbd71f8f44e87ece993b1889e0a23fe84b0bf36a913d72d2764bc256c6b8200c85ba9f78f285a57c3a3f7cac9e65f9b9308c3abeb24ee53bb56f652b9864d78f3e809ab328c5d6a1abd54af07d8d82f4ec97fb7964a5cd13a789b16ad8192d6f5"}, {0xa0, 0x10d, 0xa7a9, "14cf4b1b58a7b53e4e474fbf42bf25898fb810ac24184eb3aa3952529d2b126841ec6849cbb751457889a3e2c332957c1aa2cfc29bff5394cab291ee78cde952c13e35eebe2a43120bb8a7780247f842b94acd6a0d7a6d994fab4819c91abb419a88768e2b0f4e6a4242f8760378a0753f1b94773f0a4be5e010327f3c33aab83f298b469bbbc33c2d1bbc1a52cd1099"}, {0x30, 0x6, 0x7527, "5812274cd3fdf367205221aa7375504d1f67e17df0ff6ea8744b7a"}], 0x450}, 0x81}, {{&(0x7f0000004c40)=@caif, 0x80, &(0x7f0000005200)=[{&(0x7f0000004cc0)="f4436a8984fcbccb512fa12369b4adcbf37e5198c0154dd77c47f2f28155e5d47cc32af43f86a604ac1b7c26b264835a00f6b213033ce5696ea79c71f27570ff7729651c828d1784f853da8a4a8416845e6dacd1b87b39941d484e9bcbf0", 0x5e}, {&(0x7f0000004d40)}, {&(0x7f0000004d80)="c63494a29fab79d2c4a5ac1838e18918810c8c11236461cc07b8688d4d95ac9fd2bf4cfb811c32c14f684a57dee5e09dc9072105b6bb77d28efa607e0425e79ec2d4565fb850e07a0f008bd8f84435a03de0897ae714146ff6ff9b4889fb981097020b61e451ac78822a38d90bcd8ea68b5b589dd9925b2b7a05936042a0cbb0caaf0030150fe5331dbfa75e17f60558", 0x90}, {&(0x7f0000004e40)="c2d9ea2c1947aefe593905d4f316fc078059bbd01143841b8b32b1f0eaa5ab28fdc4fcd063f62489c8c4c8e68060dc437995ee40e6400941cf682d4bc9", 0x3d}, {&(0x7f0000004e80)="2bb46b5226398992aabfbc1c1f7f863daec4179f2b994ccd33a26ef32e02e128aa8cbbfec6af39d8d2db55c0655805f32c7c27f38027295b0942920b8f699e63e36c1f62101c2076e791d4f8379914e2821533a69c30c3bcfda5014d291c335061cacd388a6804a7999f2ea5225cef90b0bdc6679bebdcae0ab7577784c9d53d984c2099", 0x84}, {&(0x7f0000004f40)="4504619c26f9d2d25da31db7d7af6f499366fa1be911de8155cd9f193f6ba3c53c4392b24691ee849e12e8a6fd69a6e89ee30c8ab994ca85f09bb88b9e10426c2ae9a00f6c09d0c6d67ddd6d626c249294df6a6b841126c1b546aae5016ccd07c1", 0x61}, {&(0x7f0000004fc0)="cb43b7b6459a7c02e2981c4bbf5b314ebc01d972038f4c93e1a707932aec42dd7e98e96644021bb4dafa9a8403c64f80219001562195d24c1314d825abc2770cf8772bbfad7ada2ddf687a5c04cc512ced807ba5dd70746f1975d50dfdd7cc6d864b150fa20fffe9451474a07b77dd43e7fc747f7d5029b1a59912a1c233260a1dcfb634b748b4a558820f7f8905064bff5d9d9683aef90c62338cda62ec673fe73db95e78dd43c6f25d51de7a7ee6ebb4a8065fe381087e83df68d7d7e1fca7babcd02a7cd7ead2db8ed3ee1d1a29725010980f8955cd5f788b640766a308f4297c6921e5a9ec9806ae11ce4522", 0xee}, {&(0x7f00000050c0)="a9ea5a40bd91f1dd586bbfdb1eda027c1b1332239a98575e849705e1cc173495579e10541e2dd82e5d9db0ac02fcfcff87b0daa2199f31c6ff67aff241e24835a4f926281eec47cd21a898de3ccb2473388d09d77b51a35e5699f4b0de7367f69e2353bc7176aa91d58c0325c89437ac4d5dbe1f735fb4565a7e17dc6505173786ae9a3a577b510f7f9e074b3b34fa626782b12d4268c9dd3fe6dfd565a21a391fb0dedf4404b36b07bbe752645ac6", 0xaf}, {&(0x7f0000005180)="91c3ffd5ed8d8a5ce7e4a47e73ce51dc1c41e4fca6d60f7ec8c50b52de224ebce8e1f9b4ae1bb4a225d57de249d0d7f0208b47a4225d43937a87bc49ce94acff28c0461c35fb646812111efa7f79f351a6b931c98544380f57d2a6be55d0827c47fd", 0x62}], 0x9, &(0x7f00000052c0)=[{0xb0, 0x11, 0x8001, "69ffc3b4d7c20149d349737f5dc583db3d223dc52a41d4453c93b88db591c90da1755ba53d42086c919992504f51066acfa3058c4eb3f1b33c7848a850359af94350826053102b5e5a3d56cd3faaae5469ee38745843ad214c5f5617503886c0604e6b06415c5deda9041f4283b020ecf39c560c554ba904a1ce9abc568a64bda347008e7bddb66492a24c729a9265df5e58b971e31be664c0b3a39047"}, {0x28, 0x111, 0x7ff, "05bee4617e2c40cd41ba4baffa40a34f3ada"}, {0x40, 0x1, 0x3, "556558fc880018860ba86940edfda56cc31c808e07482b324383d6b9537e68873ecafe795ee1bc3251c983fdf7bc"}, {0xf8, 0x0, 0x20, "5fc805dcf84809237ae1227df480e4851940ea958f6696ef66ee73e5cf6e5e926492ef9c3eb6a5dcacdf9bacb631faebf24a61f3abec54d7b1b4c76900f83b60ab8c35f769a61fb18f5a524b256c49cc1ddde8d9bfd7a7313f27548b629649bea9871b10a3b5e15dcd4f5b5316d8e960637aed9dcc40c40ddfeae6677728a9461511889ed976f442e2de9abf308e186e951f98a3edd276aa147016b36938b6b89bd0cf6302b9a8e9898848db3d95a4e91cb260edc449e17a75c0c4c9498b6d7e9bd6a792dcc15952fa35749db2a15c48fb7da1d488992e0e2acbfa16c220c965eb"}], 0x210}, 0x9}], 0x7, 0x20000000) 12:14:45 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2110.358900] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2110.366165] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2110.373429] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2110.380705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2110.387969] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:45 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', 0x0, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) 12:14:45 executing program 2 (fault-call:11 fault-nth:39): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0800000c000100520000007f0000010c000400000022ff02383076"], 0x2c}}, 0x0) 12:14:45 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000000)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) 12:14:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:hald_cache_t:s0\x00', 0x22, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2110.513445] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:45 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', 0x0, &(0x7f0000001c40)="e6", 0x1, 0xfffffffffffffffb) [ 2110.567225] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:45 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x20000) ioctl$KVM_SMI(r0, 0xaeb7) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) 12:14:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x1f4, r2, 0x202, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf2}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20368c86}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x219d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x94c}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1fbc}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb23}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @mcast1, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x10001, @loopback, 0x7}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x45}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x4014}, 0x4008845) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0xffffffffffffff74) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:46 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) [ 2110.739009] validate_nla: 8 callbacks suppressed [ 2110.739019] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2110.775108] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0x27}, 0x4d, r2}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x10000000000032, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r4, &(0x7f00000001c0)=""/78, 0x4e) 12:14:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x80) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000080)=0x1f, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000180)={0x0, {{0xa, 0x4e23, 0x100, @remote, 0x1}}}, 0x88) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000380)) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$nl_route(0x10, 0x3, 0x0) [ 2110.782920] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2110.841273] FAULT_INJECTION: forcing a failure. [ 2110.841273] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.863604] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2110.865924] CPU: 1 PID: 27289 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2110.885543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2110.894892] Call Trace: [ 2110.897485] dump_stack+0x172/0x1f0 [ 2110.901157] should_fail.cold+0xa/0x1b [ 2110.905049] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2110.910150] ? lock_downgrade+0x810/0x810 [ 2110.914330] ? ___might_sleep+0x163/0x280 [ 2110.918491] __should_failslab+0x121/0x190 [ 2110.922743] should_failslab+0x9/0x14 [ 2110.926546] kmem_cache_alloc_node_trace+0x270/0x720 [ 2110.931649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2110.937184] ? sbitmap_init_node+0x149/0x510 [ 2110.941599] sbitmap_queue_init_node+0x29e/0x710 [ 2110.946360] blk_mq_init_tags+0x17b/0x2c0 [ 2110.950509] blk_mq_alloc_rq_map+0x88/0x200 [ 2110.954862] blk_mq_init_sched+0x20c/0x750 [ 2110.959125] elevator_init_mq+0xcd/0x160 [ 2110.963194] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2110.968491] blk_mq_init_queue+0x62/0xb0 [ 2110.972560] loop_add+0x2dd/0x8d0 [ 2110.976051] ? idr_find+0x47/0x60 [ 2110.979515] loop_control_ioctl+0x165/0x360 [ 2110.983838] ? loop_add+0x8d0/0x8d0 [ 2110.987464] ? __fget+0x340/0x540 [ 2110.990920] ? loop_add+0x8d0/0x8d0 [ 2110.994561] do_vfs_ioctl+0xd6e/0x1390 [ 2110.998474] ? ioctl_preallocate+0x210/0x210 [ 2111.002885] ? __fget+0x367/0x540 [ 2111.006342] ? iterate_fd+0x360/0x360 [ 2111.010145] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2111.015681] ? fput+0x128/0x1a0 [ 2111.018973] ? security_file_ioctl+0x93/0xc0 [ 2111.023390] ksys_ioctl+0xab/0xd0 [ 2111.026853] __x64_sys_ioctl+0x73/0xb0 [ 2111.030751] do_syscall_64+0x103/0x610 [ 2111.034643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2111.039833] RIP: 0033:0x457e29 [ 2111.043024] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2111.061918] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2111.069624] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2111.076896] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2111.084166] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2111.091437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2111.098718] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:46 executing program 2 (fault-call:11 fault-nth:40): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000080)=0x80, 0x800) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0)=0x7, 0x4) 12:14:46 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 12:14:46 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2111.197569] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2111.206979] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:46 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 12:14:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rpc\x00') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0xfffffffffffffdc4) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xf961, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f00000000c0), &(0x7f0000000180)=0x4) write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x800000000000, 0x8, {0x2}}, 0x18) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, &(0x7f0000000200)={0x9, 0x9, 0xffffffff, 0x5, 0x4, 0x1623}) [ 2111.252125] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2111.259629] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2111.289501] FAULT_INJECTION: forcing a failure. [ 2111.289501] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.311990] CPU: 0 PID: 27307 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2111.319337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2111.329076] Call Trace: [ 2111.331674] dump_stack+0x172/0x1f0 [ 2111.335320] should_fail.cold+0xa/0x1b [ 2111.339239] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2111.344381] ? ___might_sleep+0x163/0x280 [ 2111.348545] __should_failslab+0x121/0x190 [ 2111.352788] should_failslab+0x9/0x14 [ 2111.356590] kmem_cache_alloc_node_trace+0x270/0x720 [ 2111.361694] ? blk_mq_hw_queue_to_node+0x9f/0x140 [ 2111.366716] __kmalloc_node+0x3d/0x70 [ 2111.370522] blk_mq_alloc_rq_map+0xb9/0x200 [ 2111.374848] blk_mq_init_sched+0x20c/0x750 [ 2111.379094] elevator_init_mq+0xcd/0x160 [ 2111.383166] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2111.388491] blk_mq_init_queue+0x62/0xb0 [ 2111.392583] loop_add+0x2dd/0x8d0 [ 2111.396040] ? idr_find+0x47/0x60 [ 2111.399502] loop_control_ioctl+0x165/0x360 [ 2111.403835] ? loop_add+0x8d0/0x8d0 [ 2111.407476] ? __fget+0x340/0x540 [ 2111.410933] ? loop_add+0x8d0/0x8d0 [ 2111.414566] do_vfs_ioctl+0xd6e/0x1390 [ 2111.418457] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2111.423040] ? retint_kernel+0x2d/0x2d [ 2111.426929] ? ioctl_preallocate+0x210/0x210 [ 2111.431395] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2111.436176] ? retint_kernel+0x2d/0x2d [ 2111.440079] ? security_file_ioctl+0x93/0xc0 [ 2111.444488] ksys_ioctl+0xab/0xd0 [ 2111.447947] __x64_sys_ioctl+0x73/0xb0 [ 2111.451838] do_syscall_64+0x103/0x610 [ 2111.455727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2111.460924] RIP: 0033:0x457e29 [ 2111.464111] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2111.483019] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2111.490730] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2111.497999] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2111.505279] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:14:46 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000000000000ff0080f7fdffff2e774b1710306c063d520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000080)) 12:14:46 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40), 0x0, 0xfffffffffffffffb) [ 2111.512558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2111.519829] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:46 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000040)=0x6) getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) 12:14:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8180c102}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x35bc, 0x1, 0x8, 0x400, 0x70bd28, 0x25dfdbfc, {0x3, 0x0, 0x9}, [@nested={0x1b8, 0x68, [@typed={0x14, 0x17, @ipv6=@loopback}, @typed={0x8, 0x24, @fd=r0}, @generic="ab976c5be221fb70c6740ab2de37538e0458345356ee70a78ffaa445ea9d2c2cd61aaaf99fa7d4d1272ec918dfa5d2d0d2bac3653154094a1884d8c369f3204427aba03012f28f36cb80c9f41b2d1bb04273d6a7593dc58070fbe91feaae13e056b77c8b16bea3773c4906bfaabdc69053202024d72c60f16385c9678dffe4d5c5229fee48855e30b51df4083660d9a5002e20b519975687fb779e52075a9063d688b09bb5f8039b9ba8107be3869e0383d35fa5", @generic="9b430b9f14521120f9d07d6e1c89bf5c7e876e3db5af12e5ad72d34beaa8140f4705453ac876d91c743cace23916358679ab22d02044df48b28d0c83dd45ad63cd23857eb855cc6eebe4a25a17b469e475f967652e56e64f36bd65aa8ff9c5c0c9350565a6bb21d973bbd8dab7fe67828823637666a4041988ca55fe0c6aea36c9caf632a11505a62358c83a88e9062b23b96ad1ba76c88936d52dd5219dbfb28194d87ef7823b0e0467a99d927fb13912a41217bae9b8a89962b9a163a6272278c39f30ffa64d9789904d03a8bc1c3283e41afbea8dbfaf6c3eb3bb160ff8fe334a"]}, @typed={0x14, 0x46, @ipv6=@rand_addr="5c3329696a3c07ee6d4564ebcaaad642"}, @generic="18f95503588e904b0bfc898387d3ebfcded8ad5b8ff20c740e08329493254953259337208df21608015ba539c8c72b6cbfab840933e9a2a85daa39e514eb4fb38c9416a8f08b4862a537853257ec4c2477a87db5801cabcc02e613497f6d866fc6390f0f42e10ef9fa483b927d4a5b321c8ca5dff053ad75a5c616f6b27647cacfe95c70901adc729410387ec03b6599c012403ad240dad47c6c3641ee2a96b179a18b7d35ce4289b743992f78f59e8b5d2ed5c9125d9cfdf380ef59c80d4858015716e47eb30cb2410a7af84aa68db80fa4791e6a4453b235fcc6664a07bdde64ddae03d618dfe3cd089e2fcab4147abcac20dff7f57934baf1be78d229465214177d1d5ea5ead17ba96e22138ba67a66d5bfe55678afb523375d7be70d9d5289ddbc8320b292fabd9466624ab11a528a866ddc20bb13cc2199b22d3440667d731a3be8e0bb993e5d56aed581bdfcca971232192bc3eaeeac92192176638b617789c87786fd8bc755c14291d1edaa3c1fd81fbd81162cf8a10f578298c28423a9f5a81a1b9c36e78cda4c90a2d446680eae310efe9d9ebab8417305a245ba1eee8c802c1f749af288e550ab3a558fc5075ff0c13a9a79d1827d0462657e5b45467e084985ea3753fb5a03787d2c83affc05719eaed4b1191d2c4044c340d92ecd154b9d76327edc9c3c28e91fb4d977542d67e4d904ed01818dba20c4a2330bfdf8ba2446a1920cb36c2ad01ce540003ccdc0167f17474d77a3cce7e6b2bca521b36d4976a47c57713f6ae160020987e0498d29c2d46da809b6939aadd0529957b93bef7fad1dc7c419fbe08a676acfe7b0212a5625208409082df1753c7814c3ec168aa8bc0ff6eb3616a0f561606a3925e5586a93729ad08756d6b71a41cfd056f9acaf981e2e5347491f4ac32e44cf2efedc03be459392c6c0617bf188d2fc2556219947ff44f13d74cbf2ef6a31c66b420049ca419dd99b2fd018c1c555ff166e33a248937319bd0f81adc0b177d1ec5df89c3360dd191251b5eec4f75398587602b98b46462955aa018028d999400d4f1ddd5106fa48d27d1613b6665218e0ab9cb31b8da5441abd3315632d903ad3c2cd82e29e868ca3c5f3dd653d425852b13eca8cca8858f29c168e736acb4a9ad1d78dca57b15437a5b4e91de06e658e4d6341a1b83bb0a8e55d4fc14b0f46779833e5f9e2d7b98392ce09d0ba7ee765ce7fcf40f69b2e772a407d1bb7dfea83d26d035771322e48b2fdae92b3ea47f5a8060afc8e2f2f36eaa188d16dcc563e331968c3653fc706747e5fb041a25e0a16de979cfca3ea409b411e78bc20e52f3f82e58435acd70a5fea2e7e50e2ba8ee3c9fed592965e1c2d00bec2fee42d1ed4f04ace4135837040a84331e45a6d7a067995d21aecb766a2f38a342d0602ca67749f5746fe879d5b4d473a47c726c13a6e9278438fe0997eb76ba27c6eb209a1e5362ced1022487d22b271a8740f421c47b7b9369ae0901c422061153a47c9f060127ca5e7b499365f5767a238e09537480a0ca6f3ee7d21c569c394359bcc7327682fa239c96bc8aa0082cd4808019cdfd477059644e353afb44ad0f64ba77c4e97178e6d3efb5f10f339c1d89257cd49117fafe271982912ffb71a9334d51f6bda78a498e6c2d19771da6bc485912eb3c7858a2a59c3e6ffe5c97f29527f346c04b82106ab1732107e978d800dfbbae83ef47b21e2edab544b8fe889089fe64d5c716f621eb4f2e41bff92ce3b27ca838968fd957ccc908a6b7176b4896b560a37da66adb278c81ee513072a2b58ec01bb9e9c373cfb684d3cb16c0d3368c28339d3151d2b1069977931f87b84213c442ecaa006cd32c92ae363e97a616d3bb87b179750ac31450a0717b4ae93becba9ec59c2cf3d5f9ab7883001e34530b215991107eec66b94347bcf16ad1547682643f5d4e754869fde0d2e13081bcace1ec273fe923a09d73115f28d2948fde547da619fe65fda12ed845d040b73642f5b136931041a174c1330e0257f228139600c92b45540cb202059bdeab13c1ec513aca95d43adeb92f0cf9f48668f20ff04adfa544f7dd557af2c35777703e068bd40af27a96994eb5ae7ff79307fb1a5f149eba19f9909557ab688cbe80d6e403346eea8c49bf14aef3bad13d4be9f4aeea6347d50ed4db9e796a133ec596bdbd286f14a73429ce697cb8c94269c1732c058cb6a74395910275977152699591287136fff24770eda0c5cc8be56f468e6d08b95044fb74e25d03f351db678fa326b0132584a6c98ade1f1cff827a47f9f448ddda0e788442300d7f73dc8b6b72c9f533005f72fd1a85150b6a3234a371286d8f90dde22564cf7922a2cd4f3395ef8c380495480963a69542695e5a0abac3967b95d1f823bdcb6d6c515c14c95a9a18fafcc7dc1097621a32705f2b3d8fd998bb240a127009b463ba096930d0c6e961b3b68924bdce54ae8ed0e0acfd1297a3df092994293a7eb110293ad059f1c806aee8387616aa1c755214c517a3b2208b9d118028781f030b9bbd76654f30c4ea6c73a29681f5e387f232140e814541ac601122d60eef03126b3169cc682648f31c82d89282c3d2b27ec46504d64dc9bef10047cf00799467ed27c47c24b721eabf242b6c77f6c0ae3465f490f65fbee099d6a9546d5e5e9935ddd2c906603d918a3faccf8f2db9c31d073c2e9f3fb5b69f336d329f8fc8cb53930059086f08d9e6f49b9106860540f47d8bf93bfe34a52854f86b41a4dc2995609db1653c0464a6ea8238b16705886ec722b08b5bbec976496200360e8834fb72f21bc82f7bf0d89447aabff32b038c8c9de91f35349f7bb22c76d5dca69a8edf9826eff2c3ce36ff5acb08fa6d8cb3681b52f3eff29131e44c452828afb843fd3896f3f4eceb21615c6ee1972bfd00122668653f7ba49fa17b8febfcf8a6ef69b252051d294caeeab7cc24b48d8319fe4964d6c74ae7ad267c7927ea6f4b4f3d553bf8e98238a98d4a06d3bf6d4f491a73ae70d39195229423004816703ab1733b9b5eb3782e05410ad312c6cb17628847943c2275ba482173325081a351446f60d1bfb7a0ecb6917ade2030559547490256d76567b23a2be01083539a0892dfe51bac52ae47caacfbb1e61fc3f92927dad5bb6984e23eb563068af164750c3b428e235540e1c9d5bc6f2acb2393af3da7a59cf08cfb81a6766d0f8f7c5da649dbc17efec16c94010a25ea7c61f903ed39a2d1b3893f5408e77e88c457d9de1f8ce4ad8df8fd9df9b05cec8a42e228a3287616cd9da80f2b83cc78960ad6066952f72f5ea13f5b18d6295e40ab7787c006af749cb10855c87ed106a375adac44de9356aedde9dfd59c9313346fc1501444f8fe19651f4a39a5c215e6bb08fcbf7fb2ef45be0e18d52ab5062b9e626cd571ccd0905fe84f282719b225e93658dc44bfba8515824d20b3f5f633442225a974371f8976a1ed0e608b47b4a832bd0bb5270e095026e66598680753f1ce6e9760eb6b6b43482e7401691044b8f9d6fbe0d145e8fb0f11eb74e23444c4717c3869e1bdd90be02537085bfee3868726af86a01495ca73f02d477cf304d060db324307cfa3a3e9b18c7c4bdac6a60759919eaedee6183029d641a8d58e4cb69100d008306c476f470009f66b64cf4e552abef09592ce663c56c643cf93999752a442623c63ee1ce1879fbc05f4eb3a572ff6f692385af7f7a09377cb64202915c797c27359300fce1c2ac4bbc2ecb3ce98ab38edeb049670a698876931e3cb1b1327e4e25aea5dbf846506b1fed27ddc2f3786da09ecfec2f6f44bde4fb8f33492312b86f57cc2b8b9a9dbe0657e835f7ae56d1091b2102f3705443ab503e15d20ba35faafae82bb1965e07e878eb341aa22cf9ed38948893947242feb5c1b722e802d03bba34320852dc573e7a608e0ed0a29a95ec5c271a005388c4488ddc038f66e158c57f49fe03dcad08d0d6330b04def6a6dfb7e96bd4e526b9ebfcf3f34775a0853c856f59cecccaa3a0358f1e39ef35d714e1145036f24c19f086e7c0cd04be1129e501cb2c3c5d33be14fe12e75c160fdc0722debad7a3877fdef1790c2d8ba2b67bf00ef1f2c4c234e0e4892ac45407c46cdf98e79075f0ea51556e70ec2068b8313b20473012d6417ea247e1a5733839a456695bdb3575d766a4de2ceac238b0232b731d7faef43ed5548032597da54ef4ca8554cbd105026dea79473d38685b10c49d5092b2af5be0090dce3997bb8adb757d5ce6c1c1ce9fb88c367035feebbc870a043095a1911a4f7c6ee4aa2294de073d48b23f8c809cbb2551429a31000b2c0e22b5ced248745d98550046765a33e5a3848452ec25b7bfaa19ba94aada619e298165ea7149896bb1015cd330352da327a8f21116ebb8f815bd54cdc695173484d5f5e1848163f1df2bce4e1ab968e8d543fb6daa39cbc722436356504d781fe9a377840de7f4780b63f91bed26b91954287f4aa98d9df0f189adca197eb9dcdf374e47c2e4d0a4015d79454c4e1bf6a88583294b6fb6a8e76e056bb21a08bcd0641b3b83287cd8a44d960d48e82f9e35ab9a35f1f7cf32cefc5a8e10a54ad68c32a08700d03e56742cd51be9b1c31a2d26c626d0ec0d913b8c1d5f456066d3bccec706aee8ab61ac04a410d4cdd7ecf64fc2149031c464728f265401eebf6aa1db06b89774b594697c234cb65302ff9c6266611e115d47683bb5aa405e86e47c018c6ccad759d262d712a7cc3f63f4329bc4639f3301ab54b3d1978e656835f504ff308b7779c6c9b757eaba22bd3135d85eba29115d6681450d2613990267ecb2f0043e806dd7cb013909350737e3f4cfc9316f09dbe7c080047f57729512e721f223eade1cbc29e1bf85dffa920913d284683749cb9071051b8b6e324fe722e5e2b6e8606dc98f43841547b93de777a807a2ba621af5e4d1d938c4c3d83d9027705c6ad1db585c925161537d85e3be1ca890725225adc7604d3ed31aede3615d389d674f8e5473e0005598eab7cf2f97033ddd158d898e97c7ddc1f7f94b0975fdb65366854597cb0ccba2f6b945be6dad0cbb045f2edba6b48ba7c717a04f2f1416bdfe1a6a15a2d371351bd4044062c34d3b6a90e609d20c119389c66ef9623066f5ba827d19385ef42b6d6da67da8438bb028329e170b5289eac54ecb54eba631029d6ff6bb818c8481477fa6eb7004dc29f64018f18695e3e497a660655ab93b7af8758ce81c5435b48416bcbada32090ea2d632797eae851bf62f16de09b308e99a3aabbc40533544d71a252a1e538cf0b427900cf39ad563bfd9278aef2c148aafda2559deecc65f7edc2c660f7219ea07c2cde20a5d6bdf0c5a651b0c646a7442f6260a41a6998cef119669e587840d1ef876c3794cb270a0a687344ad3876659ed31d724a40fc5f1962ff7a3abefae22985441f15a1d71edcc45775ff4addcfa5bd35bb1c19d3d6ae145c61655e502ca9056f6320119d19bef90d208687236e7cc3cebade3e1de6a75bcbdbc77c197b91ef50d408c5fe2ebd70e818460db0065bc9b1a3a5809dcedc4eb2ebb4cc5425fe4d831712ccde3072bfba877ddcfb383c9a2ef032d6222478cd9fc2abe596e7ba4c940bab3e29a1dba0cc0ba0abe808769a0ead06968a7d92864ef3cc3dd1a4700bbf0c96667cf473e06d81a22920d5d8bf39145fcd0dd9aa3cef754209b1e65969ba55d5d4338f491c44e59335df707c3ecaea1903c6571156d379f759bb340d3682c26cc", @generic="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", @nested={0x304, 0x53, [@typed={0x14, 0x5c, @ipv6=@local}, @generic="879495ece847f417fb7995da3659d2bdbdb8097a0cbbfbfe1bd808c8c7a5a64a6652a26e3f0e0f7b657d3906daa9ac0a3cb24a919bdfe25e7779860c484fd262eb03bffe6da894a7951b02955fe1a41f55c2512cb87a483b14fbf27727317ec513c98faee09012495cf4b9a2395b3be146be19d6520be2570fb6fb618d712f94a0e16e3b19c3b69b8e5fa40a0e16334b73136a517863dcc130b8efc1094c30945c79a05efcb8b7ca784738696d998216cf8093c665024e21b897f995bcad7b08d383fae1f90eb27f9c203f4657a9fa0ebb6d651a5b7aa8ad35550e24d12d5984d18b540d0f", @generic="45aea0473780e94a4b2ec7b38317564a047be9295c6c04e569e76f3b71a4b30e8d2e0ff91a3c04a8ac4ea2858fba45d4de51f3943deca1e0417f53a8fd089bb8d150df26", @generic="46237484", @generic="c571d5508d40560f7ac9b5a8d11160df0f16e667ed37ffa7dbc0e4c46fa34b935822786583530c29382d7c4768902280ae9834d8879dd26aa37dcb0c69bfec681a07c255e2a4c09b605ebe36d222637dda90b9d37577e1af2af79dd3dae827aab8ded140a1f34e587d0e7a416a938437c30ca1d183bbeb92660dc7aeecd73a448b05d00492f8ba53e435df1cac7e08dcf332a4416959c0b01d8d64063e79b112a0d31d0080cecbe6733a00cc462285d8ec6db9b511fc3fe7daed0a1ca9ff5624efca0fe0ac531d5ca91036e8fbb003cde3611e38a8179bd662e72a164b0804f5fa4a9cd9d2d5074b2ca3554c7b9df174d8295d93bd6119", @generic="7cf70d12b57f92bf627f7186901eb634c9627a4195a37c9074bf02f3e0dfcbb9fd3bae6af1f7de4e2c6d47d61fb48d63547ab157eb40ab549c0d3fb9acdee6f5e685c1754b1e7fca703ca04f4379b50acf6e7aa8cefbe48084fb5cbd4d6ca59c1108c76e0245dc510a3fdfbec7b31215fb5cd24790bc524df9d3d501d5f278d2d1cc6e230dcc73d7079448abed695879d7565ccd674c8de8fa89a6cc54f6352bf3f9f3ff89eb3302e9a0a3f6cbef45be6ed342573d68ad2f32c20b8fe5fe31e74d6a1ebe856299"]}, @nested={0x10d4, 0x39, [@typed={0x8, 0x2, @fd=r0}, @generic="737991c9ae61b351ef9bf818cd64c416df366a24f74517b675966bdc202a7e025ae810ba66d71899220d7f6cb88e8f723de552d1051d59d0c4d76e02c7a8077a6901639116fd59eced810c5de85f5fe4c535a16c761f0ea5066b7c3b666112245c3ab1f7ff411230148aa590a17da64dbe2775392ebe7de6d6501a5062d73848bfd97e547e43a0936db9d1113cb3ccc8365b45e21a284e125cc3b8f776de66", @generic="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", @typed={0x14, 0x90, @str='{}cpusetvmnet1\x00'}, @typed={0x14, 0x86, @ipv6=@mcast2}]}, @generic="c7"]}, 0x35bc}, 0x1, 0x0, 0x0, 0x40000}, 0x40) [ 2111.638173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:46 executing program 2 (fault-call:11 fault-nth:41): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:47 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40), 0x0, 0xfffffffffffffffb) [ 2111.677063] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:47 executing program 4: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000080)='n\x94\xfev\xd2\x01;\x8d\xcdY\xf3\x10\xa0m\xac\xfc}\xben\x80\x01\x8e\xd8\\\x86\x80\xad\xdd') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) [ 2111.746613] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2111.783505] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2111.787077] FAULT_INJECTION: forcing a failure. 12:14:47 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2111.787077] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.830823] CPU: 0 PID: 27332 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2111.838099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2111.847444] Call Trace: [ 2111.850041] dump_stack+0x172/0x1f0 [ 2111.853684] should_fail.cold+0xa/0x1b [ 2111.857586] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2111.862688] ? lock_downgrade+0x810/0x810 [ 2111.866843] ? ___might_sleep+0x163/0x280 [ 2111.870998] __should_failslab+0x121/0x190 [ 2111.875237] should_failslab+0x9/0x14 [ 2111.879050] kmem_cache_alloc_node_trace+0x270/0x720 [ 2111.884156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2111.889692] ? sbitmap_init_node+0x149/0x510 [ 2111.894124] sbitmap_queue_init_node+0x29e/0x710 [ 2111.898894] blk_mq_init_tags+0x17b/0x2c0 [ 2111.903052] blk_mq_alloc_rq_map+0x88/0x200 [ 2111.907378] blk_mq_init_sched+0x20c/0x750 [ 2111.911661] elevator_init_mq+0xcd/0x160 [ 2111.915727] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2111.921018] blk_mq_init_queue+0x62/0xb0 [ 2111.925083] loop_add+0x2dd/0x8d0 [ 2111.928551] ? idr_find+0x47/0x60 [ 2111.932027] loop_control_ioctl+0x165/0x360 [ 2111.936352] ? loop_add+0x8d0/0x8d0 [ 2111.939984] ? loop_add+0x8d0/0x8d0 [ 2111.943623] do_vfs_ioctl+0xd6e/0x1390 [ 2111.947540] ? ioctl_preallocate+0x210/0x210 [ 2111.951952] ? __fget+0x367/0x540 [ 2111.955413] ? iterate_fd+0x360/0x360 [ 2111.959229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2111.964771] ? fput+0x128/0x1a0 [ 2111.968065] ? security_file_ioctl+0x93/0xc0 [ 2111.972478] ksys_ioctl+0xab/0xd0 [ 2111.975937] __x64_sys_ioctl+0x73/0xb0 [ 2111.979829] do_syscall_64+0x103/0x610 [ 2111.983760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2111.988948] RIP: 0033:0x457e29 [ 2111.992137] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2112.011048] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.018752] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2112.026015] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2112.033294] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2112.040560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 12:14:47 executing program 3: add_key$user(&(0x7f0000001bc0)='user\x00', &(0x7f0000001c00)={'syz'}, &(0x7f0000001c40), 0x0, 0xfffffffffffffffb) 12:14:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff66f2e0fec7bec0443e"], 0x2c}}, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = geteuid() sendmsg$nl_netfilter(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1a0, 0x1, 0xb, 0x0, 0x70bd28, 0x25dfdbfc, {0x7, 0x0, 0xa}, [@typed={0x4, 0x1c}, @nested={0x170, 0x7a, [@generic="b469495c372982e04e163f8f21620ad529470b871e2da1a15c0a46232125d52b2e48b9ea73990c363a1fe9dd7987354154e2b856a6ba40744c65246ae093f07e3e97f78e1968833d4009422c1e315a030392de8fc02ee34f9bc5878974e993af1e12da03afe04ddb43d500f33d16f3a393cfefe1d5f9bf5e63af9455810cbe001ed03912796ce716e464379d947d984844d53ac8b5c45cf2011ddb353d2eaa", @generic="02f8caf5ae4a11ed20b908f132d77aa19173fefa71fb5cf5200d2b60b50d518209f4d42a534f150e40b2216b21ef6d62c0f5ec823bedd573ba5462835d4cbaffea86daef9d97ab45a573d40293bb10daf3f095237cbfc1bf50e1a1cb24af7f7e31fe55c5e36d733a4004d3f3d1bb2b8f57e3f0d8f3afd1bd1376747330980fdb3fe7936d47688f548b282e4932d3de6cde6d60fe4ffe47d71e92f4b0a36e1d38a84136deefa71a5a7e02df1bb47492cc9db7fcc0b3652beb2e3a229f770aa569cef5ceda1bea9b2d67cc04"]}, @typed={0x8, 0x3b, @u32=0x3}, @typed={0x8, 0x5a, @pid=r1}, @typed={0x8, 0x58, @uid=r2}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) [ 2112.047825] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rtc0\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f00000000c0)={0x7, 0x100, 0x21129a163065e316, {0x1, 0x4, 0x100000001, 0x1}}) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000200)={0x15, 0xf4, &(0x7f0000000380)="5a21cf427bd23c669cce12b75cb5420ed56a3b9b6e5dfd4cd23ab7b5217cbcc1496dd283a28064f5048170d74ae9039dcab093c9f44d92422e64579ad4d8772b19aab63889f54e5b772652d532f6ba4362fefa46a030ee3d9d6997f2dfcef366e0f40d21a57d3d24ef4291fa9ba36857171d8e634f1db16998f453705db6108a134f9ae005269d510a1568198df68950f348aec45ab4d515321ae4221a6df6aa78451c630effe9e6341082327e7b7e9e2f73d7cf82d7015d3c0412ad17847899c64188e4ce9155cb4671efd7108d25216079ced61c016ce8a96ca54f6418abf6bb42df3d07e56a1ba880c2ce7f64e3b0e1b1f1df"}) exit(0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000180)={0x8001, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000001c0)={r5, 0x7fff}) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2112.098193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2112.124567] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 12:14:47 executing program 2 (fault-call:11 fault-nth:42): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b80)={0x0}, 0x10) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000c80)) close(r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x32, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b630000997d184648cc41a2623e5f630506694849ed409fd984fd35b420ba4f5362bf1ed9f45f6b8eb2f355ef6cf602a2e7"], 0x0, 0x100000000000000, 0x0}) 12:14:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0xffff, @ipv4={[], [], @broadcast}, 0x100000001}, {0xa, 0x4e23, 0xe3c3, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9}, 0x8, [0x93a3, 0x5, 0x9, 0x48a5, 0x7, 0x1, 0xf79, 0x9f]}, 0x5c) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2112.223107] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = semget(0x1, 0x0, 0x42) semctl$SEM_STAT(r1, 0x6, 0x12, &(0x7f0000000000)=""/162) 12:14:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') r1 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r2, 0xffffffffffffffb6, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, r1, 0x2d0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 2112.307014] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2112.335620] FAULT_INJECTION: forcing a failure. [ 2112.335620] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.344337] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$getown(r0, 0x9) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000c0001ea5b973936a400520000007f0000010c00040000006007e12222ff000000000000000000000000000000"], 0x2c}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000080)={0x100000000, 0x0, 0x201d, 0xff, 0x80000001, 0x100000001, 0x3}) [ 2112.369197] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2112.378246] CPU: 1 PID: 27358 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2112.385549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2112.394899] Call Trace: [ 2112.397520] dump_stack+0x172/0x1f0 [ 2112.401191] should_fail.cold+0xa/0x1b [ 2112.405095] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2112.410213] ? ___might_sleep+0x163/0x280 [ 2112.414382] __should_failslab+0x121/0x190 [ 2112.418629] should_failslab+0x9/0x14 [ 2112.422442] kmem_cache_alloc_node_trace+0x270/0x720 [ 2112.427551] ? kasan_unpoison_shadow+0x35/0x50 [ 2112.432143] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2112.437248] __kmalloc_node+0x3d/0x70 [ 2112.441096] blk_mq_alloc_rq_map+0xfa/0x200 [ 2112.445423] blk_mq_init_sched+0x20c/0x750 [ 2112.449684] elevator_init_mq+0xcd/0x160 [ 2112.453752] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2112.459047] blk_mq_init_queue+0x62/0xb0 [ 2112.463108] loop_add+0x2dd/0x8d0 [ 2112.466585] ? idr_find+0x47/0x60 [ 2112.470041] loop_control_ioctl+0x165/0x360 [ 2112.474365] ? loop_add+0x8d0/0x8d0 [ 2112.478007] ? loop_add+0x8d0/0x8d0 [ 2112.481651] do_vfs_ioctl+0xd6e/0x1390 [ 2112.485575] ? ioctl_preallocate+0x210/0x210 [ 2112.490001] ? __fget+0x367/0x540 [ 2112.493462] ? iterate_fd+0x360/0x360 [ 2112.497302] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2112.502858] ? fput+0x128/0x1a0 [ 2112.506149] ? security_file_ioctl+0x93/0xc0 [ 2112.510567] ksys_ioctl+0xab/0xd0 [ 2112.514042] __x64_sys_ioctl+0x73/0xb0 [ 2112.517945] do_syscall_64+0x103/0x610 [ 2112.521839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2112.527027] RIP: 0033:0x457e29 [ 2112.530224] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2112.549120] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.556837] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2112.564106] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2112.571377] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2112.578649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2112.585923] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:47 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="380001040501ff008001005200e8ff7e0000010c000d00000030ff0238e93e0000000000000000000000"], 0x2c}}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000180)={0x1, 0x5, 0x8000, 0x0, 0x7, 0x1b, 0x4, 0x20, 0x8, 0x7, 0x6, 0x3, 0x0, 0x1, 0x6, 0x7, 0x421, 0xc0a, 0x85f8}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/f\b\x00/md0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='anon_inodefs\x00', 0x42000, &(0x7f0000000100)='\x00') [ 2112.738512] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x101, 0x10580) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a000064cda79fee8707000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:48 executing program 2 (fault-call:11 fault-nth:43): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:48 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x248000, 0x0) [ 2112.797149] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2112.908290] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2112.950424] FAULT_INJECTION: forcing a failure. [ 2112.950424] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2112.976272] CPU: 0 PID: 27383 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2112.983562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2112.992914] Call Trace: [ 2112.995530] dump_stack+0x172/0x1f0 [ 2112.999170] should_fail.cold+0xa/0x1b [ 2113.003067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2113.008177] ? ___might_sleep+0x163/0x280 [ 2113.012337] should_fail_alloc_page+0x50/0x60 [ 2113.016831] __alloc_pages_nodemask+0x1a1/0x710 [ 2113.021506] ? __lock_is_held+0xb6/0x140 [ 2113.025581] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2113.030596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2113.036144] ? find_next_bit+0x107/0x130 [ 2113.040216] ? __cpu_to_node+0x7e/0xa0 [ 2113.044121] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 2113.048976] blk_mq_alloc_rqs+0x223/0x7f0 [ 2113.053135] ? __kmalloc_node+0x4e/0x70 [ 2113.057117] blk_mq_init_sched+0x266/0x750 [ 2113.061385] elevator_init_mq+0xcd/0x160 [ 2113.065463] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2113.070761] blk_mq_init_queue+0x62/0xb0 [ 2113.074825] loop_add+0x2dd/0x8d0 [ 2113.078323] loop_control_ioctl+0x165/0x360 [ 2113.082647] ? loop_add+0x8d0/0x8d0 [ 2113.086281] ? __fget+0x340/0x540 [ 2113.089748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2113.094509] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2113.099279] ? loop_add+0x8d0/0x8d0 [ 2113.102919] do_vfs_ioctl+0xd6e/0x1390 [ 2113.106815] ? ioctl_preallocate+0x210/0x210 [ 2113.111232] ? retint_kernel+0x2d/0x2d [ 2113.115147] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 2113.119913] ? security_file_ioctl+0x93/0xc0 [ 2113.124331] ksys_ioctl+0xab/0xd0 [ 2113.127789] __x64_sys_ioctl+0x73/0xb0 [ 2113.131684] do_syscall_64+0x103/0x610 [ 2113.135587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.140795] RIP: 0033:0x457e29 [ 2113.143997] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2113.163078] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2113.170781] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2113.178049] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2113.185930] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2113.193202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2113.200490] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:48 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:48 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="eda720b6eb0581b5ff0080f7fdff232b0a00000000010c000400000022ff0238e90700e0fd6cb81ecbb1e03cee03f3b0ec9dbcb91be82f7b37fa961e029f9c6eea98369a1ddd1f0c26cd337f424064b61090c8e471cd8ebdd3758472b9bf55e08132e6f835c019add42e71be8ee0f0c3cdc6847b9098835a6ad80bcc800a7fd223ae7fe35b43580b8376ef8d21d82fd4d97ca347d42da18c619f1ddc37a17be30469e24e76c3000000000000000000000000"], 0x2c}}, 0x0) 12:14:48 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b80)={0x0}, 0x10) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000c80)) close(r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x32, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b630000997d184648cc41a2623e5f630506694849ed409fd984fd35b420ba4f5362bf1ed9f45f6b8eb2f355ef6cf602a2e7"], 0x0, 0x100000000000000, 0x0}) 12:14:48 executing program 2 (fault-call:11 fault-nth:44): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:48 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0xfa2c, 0x6}, 0x50}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1f, 0x400) mq_timedsend(r1, &(0x7f00000000c0)="106b98ba5666739a887732302f428768de8484649ddbd7ac1f", 0x7, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r2, &(0x7f00000001c0)=""/78, 0x4e) [ 2113.343961] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x401) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {0x77359400}, 0x0, 0x7ff}) [ 2113.407430] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:48 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x620000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mq_open(&(0x7f0000000040)='cgroup.procs\x00', 0x41, 0x5, &(0x7f00000000c0)={0x0, 0x1, 0x1, 0x8, 0xffff, 0x1, 0x9, 0x4}) [ 2113.469672] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 2113.503564] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 12:14:48 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3f, 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000080)={0x9, 0xffffffffffffffff, 0x4, 'queue1\x00', 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r1, &(0x7f00000001c0)=""/78, 0x4e) 12:14:48 executing program 0: prctl$PR_GET_THP_DISABLE(0x2a) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x313, &(0x7f00008a7000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000020c000100520012cf0000007f0400d1afb7266c28134b22ff0238e9"], 0x2c}}, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x10001, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000240)={0x81, r1, 0x10000, 0x6}) sendto$netrom(r0, &(0x7f0000000040)="63681b9c704023d835ce4c750418bc7c2884f8517b8adf7025b9ee8200f11c117e9532bf9f20a9902fc32e5cf8560866f456fd2a7884933709f2a5f2a8b060dd41e3b70cb47b4f10a23f34477dbf7a1be003810e2f5011d1c3e12778abd717a9589314c76c459fc8d1c4d14fddb89d62204fbb6e41c588f7e6d01b32e64543353894eb605df8e3d86d6d44ec667d43684e500cc4101e3fbc7281cc9da99e9818d85d2550f29e6e47be784ba34026acefb4b0cf7c3e5af339c0b820db711742b407b80de115ce8e556bc135f54382f07b9aa04219f75af9a163ab0a033e2ef561d73641c367dd5c6dec049d58e7b163114aa6f3624ea8f509", 0xf8, 0x4008000, &(0x7f0000000140)={{0x3, @bcast, 0x5}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:14:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0xffff) [ 2113.627642] FAULT_INJECTION: forcing a failure. [ 2113.627642] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.662535] CPU: 0 PID: 27415 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2113.669829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2113.679180] Call Trace: [ 2113.681782] dump_stack+0x172/0x1f0 [ 2113.685417] should_fail.cold+0xa/0x1b [ 2113.689336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2113.694445] ? ___might_sleep+0x163/0x280 [ 2113.698603] __should_failslab+0x121/0x190 [ 2113.702843] should_failslab+0x9/0x14 [ 2113.706647] kmem_cache_alloc_node_trace+0x270/0x720 [ 2113.711755] ? kasan_unpoison_shadow+0x35/0x50 [ 2113.716364] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2113.721483] __kmalloc_node+0x3d/0x70 [ 2113.725302] blk_mq_alloc_rq_map+0xfa/0x200 [ 2113.727917] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2113.729627] blk_mq_init_sched+0x20c/0x750 [ 2113.740359] elevator_init_mq+0xcd/0x160 [ 2113.744428] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2113.749739] blk_mq_init_queue+0x62/0xb0 [ 2113.753808] loop_add+0x2dd/0x8d0 [ 2113.757298] ? idr_find+0x47/0x60 [ 2113.760763] loop_control_ioctl+0x165/0x360 [ 2113.760779] ? loop_add+0x8d0/0x8d0 [ 2113.760795] ? __fget+0x340/0x540 [ 2113.772181] ? loop_add+0x8d0/0x8d0 [ 2113.775812] do_vfs_ioctl+0xd6e/0x1390 [ 2113.779702] ? ioctl_preallocate+0x210/0x210 [ 2113.779716] ? __fget+0x367/0x540 [ 2113.779733] ? iterate_fd+0x360/0x360 [ 2113.791374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2113.796913] ? fput+0x128/0x1a0 [ 2113.800201] ? security_file_ioctl+0x93/0xc0 [ 2113.804631] ksys_ioctl+0xab/0xd0 [ 2113.808097] __x64_sys_ioctl+0x73/0xb0 [ 2113.811989] do_syscall_64+0x103/0x610 [ 2113.815886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2113.821074] RIP: 0033:0x457e29 [ 2113.824277] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2113.843204] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2113.850911] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2113.858176] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2113.865457] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2113.872725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2113.879990] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:49 executing program 2 (fault-call:11 fault-nth:45): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) [ 2113.937306] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xf9\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY}\xe9\xa0\xb0\xbd\xda\xc9\xbd\xf2\x19\xa0\xd2,\xed\x87b_\xc4\x97r\xf68u\xf4ng\x1b\xf3g\x0e\x167F\xceo\x1b\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\f\xcd\x0e\xb0\xa0\xa2\xf3\x86N4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\f\x1eo\x84o\x12\xa5\x00\x00\x00%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x05\x05\x14$1h&\v;C', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) write$FUSE_STATFS(r4, &(0x7f0000000180)={0x60, 0xfffffffffffffffe, 0x7, {{0x7, 0x9000000000000000, 0x70, 0x100000000, 0x7, 0x5, 0x9, 0x1}}}, 0x60) socket$inet_dccp(0x2, 0x6, 0x0) write$cgroup_pid(r1, &(0x7f0000000240), 0xffffffffffffff45) ioctl$KDSETMODE(r4, 0x4b3a, 0xedf) 12:14:49 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x410000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x20, 0x0, &(0x7f0000000040)=[@release={0x40046306, 0x1}, @request_death={0x400c630e, 0x1, 0x2}, @decrefs={0x40046307, 0x1}], 0x41, 0x0, &(0x7f0000000080)="76104c9665de4bd19978b225c8d0bfabe3afc523035bfb999029b7d9b436b8bd3b0774b3c2afe1ddd2e2587e5fd834620426ca72749c6fb3eb125dcd353daeaed2"}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0x57, 0x0, 0x4, 0x0, {r1, r2/1000+30000}, {0x5, 0xc, 0x1000, 0x80000000, 0x9, 0x2, 'qxaN'}, 0x39f1, 0x2, @planes=&(0x7f0000000180)={0x20, 0x2, @userptr, 0x748}, 0x4}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) [ 2114.068171] FAULT_INJECTION: forcing a failure. [ 2114.068171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2114.123507] CPU: 0 PID: 27433 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2114.130815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.140169] Call Trace: [ 2114.142789] dump_stack+0x172/0x1f0 [ 2114.146436] should_fail.cold+0xa/0x1b [ 2114.150354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2114.155461] ? ___might_sleep+0x163/0x280 [ 2114.159631] should_fail_alloc_page+0x50/0x60 [ 2114.164124] __alloc_pages_nodemask+0x1a1/0x710 [ 2114.169771] ? __lock_is_held+0xb6/0x140 [ 2114.173878] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2114.178895] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2114.184445] ? find_next_bit+0x107/0x130 [ 2114.188520] ? __cpu_to_node+0x7e/0xa0 [ 2114.192421] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 2114.197283] blk_mq_alloc_rqs+0x223/0x7f0 [ 2114.201454] ? __kmalloc_node+0x4e/0x70 [ 2114.205443] blk_mq_init_sched+0x266/0x750 [ 2114.209708] elevator_init_mq+0xcd/0x160 [ 2114.213773] blk_mq_init_allocated_queue+0x1136/0x1570 [ 2114.219070] blk_mq_init_queue+0x62/0xb0 [ 2114.223139] loop_add+0x2dd/0x8d0 [ 2114.226598] ? idr_find+0x47/0x60 [ 2114.230056] loop_control_ioctl+0x165/0x360 [ 2114.234392] ? loop_add+0x8d0/0x8d0 [ 2114.238016] ? loop_add+0x8d0/0x8d0 [ 2114.241663] ? loop_add+0x8d0/0x8d0 [ 2114.245322] do_vfs_ioctl+0xd6e/0x1390 [ 2114.249214] ? ioctl_preallocate+0x210/0x210 [ 2114.253621] ? __fget+0x367/0x540 [ 2114.257081] ? iterate_fd+0x360/0x360 [ 2114.260879] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2114.266413] ? fput+0x128/0x1a0 [ 2114.269714] ? security_file_ioctl+0x93/0xc0 [ 2114.274151] ksys_ioctl+0xab/0xd0 [ 2114.277606] __x64_sys_ioctl+0x73/0xb0 [ 2114.281526] do_syscall_64+0x103/0x610 [ 2114.285450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2114.290639] RIP: 0033:0x457e29 [ 2114.293830] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2114.312733] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2114.320436] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2114.327721] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2114.334988] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2114.342250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2114.349542] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 12:14:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x22) 12:14:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f0000000140)=""/78, 0x4e) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000040)={0x3f, 0xfffffffffffffffc, 0x2, 'queue0\x00', 0xc47b}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x6, 0x4, 0x1b88, 0x101, 0x0, 0x2, 0x20}, 0xc) 12:14:49 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x5, 0x5, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) getsockopt$nfc_llcp(r1, 0x118, 0x4, &(0x7f0000000480)=""/187, 0xbb) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000003c0)={@loopback, 0x0}, &(0x7f0000000400)=0x14) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r9, 0xc0305710, &(0x7f0000000100)={0x0, 0x80, 0x9, 0x5}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'nlmon0\x00', 0x0}) bind$bt_sco(r8, &(0x7f0000000280)={0x1f, {0x7, 0x6, 0x633, 0x1, 0x7ff, 0x7}}, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001cc0)={'erspan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001f40)={&(0x7f0000000040), 0xc, &(0x7f0000001f00)={&(0x7f0000001d00)={0x1d8, r2, 0x0, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0xfc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x618}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x91ed}}}]}}, {{0x8, 0x1, r6}, {0xb8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r11}}}]}}]}, 0x1d8}, 0x1, 0x0, 0x0, 0xc000}, 0x40001) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) 12:14:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffffb, 0x1) r5 = inotify_add_watch(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4) inotify_rm_watch(r4, r5) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) setsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000180), 0x1) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) ioctl$TIOCSCTTY(r4, 0x540e, 0x2) 12:14:49 executing program 2 (fault-call:11 fault-nth:46): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x2a4, r2, 0x81c, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xf4, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x22}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000000000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}]}, @TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xffffffffffff8001, @mcast1, 0xffff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @empty, 0x493}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xff, @rand_addr="3b05efe648e3e217cfcaa39e4bb3f7ef", 0x1}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x2a4}}, 0x800) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000100)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000000000001}, 0x0) 12:14:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f0000000000)=""/78, 0x4e) 12:14:49 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) [ 2114.521480] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:49 executing program 1: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) 12:14:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xffffffffffffffae}}, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0x461, 0x9, 0x5, 0x0, 0x4, 0x0, 0x1, 0x2, 0x7, 0x2000000000000000, 0x3, 0x6, 0x80000001, 0xffffffffffff0001, 0x1, 0x293, 0xfffffffffffffffd, 0x8001, 0x1b9, 0x7, 0x0, 0x692, 0xffff, 0x3, 0x9, 0x8000, 0x400, 0x80000001, 0x3, 0x7fffffff, 0x4, 0x8, 0xe5, 0x400, 0x2, 0x0, 0x3f, 0x0, @perf_config_ext={0xff, 0x1}, 0x20000, 0x40, 0x7, 0xf, 0x2, 0x401, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x10001) 12:14:49 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) [ 2114.626998] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:49 executing program 4: r0 = socket(0xa, 0xe98ad4377cd5e367, 0x5) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0xffffffffffffff88, 0x801) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000034c0)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) sendto$rose(r2, &(0x7f0000000100)="689443187ca4480f68bb76edbd83cb91d84c243e5c465bba941a763986be33ec3edfd0177d242d52b10aea8239737843e0a18557372202d5c03498f122ee42a2e21113b922a75054ec537a1eb90643665961e7c83578b2d25523fd2580a4b8a670d14c71442f4b19e884afe4231a1ef24d", 0x71, 0x4000000, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @default, @bcast]}, 0x40) r4 = syz_open_procfs(r3, &(0x7f0000000280)='\x8f4\xc8\xde\r\xf7\xad\x96mr_cakle\x00') epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000240)={0x8}) getdents64(r4, &(0x7f00000001c0)=""/78, 0x4e) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x4, 0x4) 12:14:49 executing program 5: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x311080, 0x2) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @multicast2}, &(0x7f0000000100)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000005c0)={@mcast1, 0x0}, &(0x7f0000000600)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000700)={0x0, @local, @remote}, &(0x7f0000000740)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000800)={@dev, 0x0}, &(0x7f0000000840)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000d40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d00)={&(0x7f0000000880)={0x448, r2, 0x310, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xea47}}}]}}, {{0x8, 0x1, r5}, {0x19c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3fe00000000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r10}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x7ad, 0x7, 0x7ff, 0x1}, {0x200, 0x1, 0x1000, 0x4}, {0xfffffffffffffff7, 0x1, 0x0, 0x10000}, {0x800, 0x28e, 0x2, 0x7f}, {0x7, 0x7a, 0x1, 0xee0e}, {0x2, 0x8ac, 0x5, 0x3}, {0x2, 0x8, 0xfffffffffffffff8, 0x27}, {0x0, 0x3, 0x3, 0x7}]}}}]}}, {{0x8, 0x1, r11}, {0x14c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x448}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 2114.747918] FAULT_INJECTION: forcing a failure. [ 2114.747918] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.788416] CPU: 1 PID: 27470 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2114.795725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2114.805075] Call Trace: [ 2114.807675] dump_stack+0x172/0x1f0 [ 2114.811319] should_fail.cold+0xa/0x1b [ 2114.815229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2114.820358] ? lock_downgrade+0x810/0x810 [ 2114.824525] ? ___might_sleep+0x163/0x280 [ 2114.828691] __should_failslab+0x121/0x190 [ 2114.832919] should_failslab+0x9/0x14 [ 2114.836713] kmem_cache_alloc_node_trace+0x270/0x720 [ 2114.841843] __alloc_disk_node+0x70/0x420 [ 2114.845993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2114.851552] loop_add+0x3aa/0x8d0 [ 2114.855023] ? idr_find+0x47/0x60 [ 2114.858501] loop_control_ioctl+0x165/0x360 [ 2114.862828] ? loop_add+0x8d0/0x8d0 [ 2114.866451] ? __fget+0x340/0x540 [ 2114.869918] ? loop_add+0x8d0/0x8d0 [ 2114.873538] do_vfs_ioctl+0xd6e/0x1390 [ 2114.877428] ? ioctl_preallocate+0x210/0x210 [ 2114.881840] ? __fget+0x367/0x540 [ 2114.885301] ? iterate_fd+0x360/0x360 [ 2114.889103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2114.894639] ? fput+0x128/0x1a0 [ 2114.897942] ? security_file_ioctl+0x93/0xc0 [ 2114.902354] ksys_ioctl+0xab/0xd0 [ 2114.905815] __x64_sys_ioctl+0x73/0xb0 [ 2114.909735] do_syscall_64+0x103/0x610 [ 2114.913685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2114.918914] RIP: 0033:0x457e29 12:14:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) gettid() getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0xc) write$cgroup_pid(r3, &(0x7f0000000040)=r4, 0x294) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) bind(r0, &(0x7f0000000000)=@sco={0x1f, {0xfffffffffffffff7, 0x100000000, 0xaeab, 0x7fff, 0xff, 0xa7e}}, 0x80) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x52, 0x4, 0xffffffffffffffff}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x18, 0x4, [0x5, 0x2, 0x9, 0x101]}, &(0x7f0000000180)=0x10) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000240)) [ 2114.922103] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2114.940999] RSP: 002b:00007f8ceff71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2114.948704] RAX: ffffffffffffffda RBX: 00007f8ceff71c90 RCX: 0000000000457e29 [ 2114.955964] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2114.963228] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 2114.970493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff726d4 [ 2114.977766] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2115.028219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:50 executing program 2 (fault-call:11 fault-nth:47): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000180)={0x3, @bcast, r2}) 12:14:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)=0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f00000002c0)={0x90, 0xfffffffffffffffe, 0x5, {0x6, 0x3, 0x1, 0x8001, 0x7, 0x5ea, {0x1, 0x1, 0x4, 0xda5c1ab, 0x6, 0x7c, 0x8, 0x784, 0x6, 0x40, 0x3, r1, r2, 0x20}}}, 0x90) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f0000000000)="9503bcf2285f8a25f92dfec974de8a042973ee7e1c05247373c98b3c3f3a5fac97a5ef091f3c6516b94edf9a3065153d286c28da4ed9aa4dfe7f09157fa11f0cc458ae813864ba955e3427d62e4610b7092b80e46eabd17c") 12:14:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000540)={{0x3, 0x6, 0x80000000, 0x400, 'syz0\x00', 0x48c1c419}, 0x1, [0x9, 0x4, 0x2, 0x5, 0x6, 0x3, 0x9, 0x2, 0x20, 0x6d, 0x6, 0x8, 0x5, 0x800, 0x1, 0x5, 0x7f, 0x400, 0x8508, 0x7, 0x6422e162, 0x5, 0x1, 0x80000000, 0x0, 0x90c, 0x2, 0x6, 0x2, 0x5, 0x1, 0x9, 0x6, 0x5c, 0x7, 0xddf9, 0x900000000, 0x7fff, 0x10000, 0x8, 0x4, 0x7, 0x2, 0x9, 0x7fffffff, 0x2, 0x6, 0x8000, 0x7fff, 0x6fd, 0x2f1f, 0x5, 0x9, 0x1, 0x80000001, 0x2, 0x200, 0x3, 0x8, 0x9, 0xa, 0x9, 0x37b1, 0x4, 0x8000, 0x200, 0x2, 0x5, 0x3, 0x7, 0x7, 0x800, 0x8000, 0x5, 0x3, 0x9, 0xe8, 0xfff, 0xd9b, 0xffffffff, 0x100000001, 0x7, 0x7, 0x6, 0x1, 0xfff, 0x9, 0x6, 0x0, 0xffffffffffffffff, 0xbe96, 0x3ff, 0x81, 0x81, 0x6, 0x8000, 0x100000001, 0x2, 0x80000000, 0x5, 0xffffffffffffffff, 0x1, 0x10001, 0x6, 0x8, 0xfffffffeffffffff, 0x2c87, 0x1, 0xef2, 0xffff, 0x80000001, 0x8, 0xff, 0x100000000, 0x9, 0x10001, 0x9, 0x7, 0x0, 0x0, 0x3, 0x4, 0x3, 0xa9f, 0x3, 0x1, 0x9, 0x493a], {r3, r4+30000000}}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2115.067170] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x0) write$vhci(r2, &(0x7f00000003c0)=@HCI_EVENT_PKT={0x4, "51c898ea55f21e05a40c57c17e956661f652efec7c5f23111eb3e111df50001e77de19421475ccf4cf7838e08c747a2c12551d06e154b6518d2d47f8436634f7"}, 0x41) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) uselib(&(0x7f0000000240)='./file0\x00') ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0xa) getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000440)=0x4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:50 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4000, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001240)={@remote, 0x64, r1}) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000240)="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", 0x1000, 0xfffffffffffffff9) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000013c0)=ANY=[@ANYRES32=r0, @ANYBLOB="060000fefbff159058ff9870ae99f2db5639eb92"]) keyctl$setperm(0x5, r2, 0x20) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000001280)={'icmp\x00'}, &(0x7f00000012c0)=0x1e) set_thread_area(&(0x7f0000001380)={0x116e51d9, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x80000000, 0x400, 0x91, 0x0, 0x1, 0xd3cd}) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$KIOCSOUND(r0, 0x4b2f, 0xffffffffffff1986) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001300)=0x0) connect$rose(r0, &(0x7f0000001340)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @null}, 0x1c) getpgrp(r3) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000001400)) 12:14:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = accept(r0, &(0x7f0000000000)=@pppoe, &(0x7f0000000080)=0x80) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0xb01, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x2, 0x4, 0x101, 0x1]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001040501ff0080f7fdffff2e0a0000000c000100520000007f0000010c000400000022ff0238e93e"], 0x2c}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) [ 2115.260034] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2115.266948] FAULT_INJECTION: forcing a failure. [ 2115.266948] name failslab, interval 1, probability 0, space 0, times 0 [ 2115.312102] CPU: 1 PID: 27503 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2115.319398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2115.328748] Call Trace: [ 2115.331361] dump_stack+0x172/0x1f0 [ 2115.335015] should_fail.cold+0xa/0x1b [ 2115.338909] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2115.344026] ? ___might_sleep+0x1f0/0x280 [ 2115.348175] ? ___might_sleep+0x163/0x280 [ 2115.352376] __should_failslab+0x121/0x190 [ 2115.356625] should_failslab+0x9/0x14 [ 2115.360434] kmem_cache_alloc_node_trace+0x270/0x720 [ 2115.365543] ? retint_kernel+0x2d/0x2d [ 2115.369448] __kmalloc_node+0x3d/0x70 [ 2115.373256] disk_expand_part_tbl+0x1cf/0x3b0 [ 2115.377781] __alloc_disk_node+0x11f/0x420 [ 2115.382035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2115.387574] loop_add+0x3aa/0x8d0 [ 2115.391029] ? idr_find+0x47/0x60 [ 2115.394484] loop_control_ioctl+0x165/0x360 [ 2115.398816] ? loop_add+0x8d0/0x8d0 [ 2115.402441] ? __fget+0x340/0x540 [ 2115.405906] ? loop_add+0x8d0/0x8d0 [ 2115.409546] do_vfs_ioctl+0xd6e/0x1390 [ 2115.413452] ? ioctl_preallocate+0x210/0x210 [ 2115.417876] ? __fget+0x367/0x540 [ 2115.421331] ? iterate_fd+0x360/0x360 [ 2115.425135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2115.429909] ? security_file_ioctl+0x93/0xc0 [ 2115.434334] ksys_ioctl+0xab/0xd0 [ 2115.437803] __x64_sys_ioctl+0x73/0xb0 [ 2115.441706] ? do_syscall_64+0x64/0x610 [ 2115.445697] do_syscall_64+0x103/0x610 [ 2115.449609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2115.454815] RIP: 0033:0x457e29 [ 2115.458009] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2115.476924] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2115.484651] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2115.491929] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2115.499213] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:14:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = dup2(r0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="780000207d0200000071000700ffffffff8002000000040000000000000000000010010000009d000000000000000000000000002c006c6f70707030766d6e6574312876626f786e65743073656c696e75786c6f73656c696e75780c6e6f6465762d11007472757374656470726f635c6774683127010026fe6dad6fd319e7165be4f4b0154937ce84c8fe4d082830f23447ae2838ece6b2587de8ae0d080bd3bc010dff97b43be8fcdfa9042b2a66c7fc07d127680e340b19aacf5d101d6cca58d3b6d7d824d282"], 0xc8) [ 2115.506489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2115.513811] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2115.557001] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:50 executing program 2 (fault-call:11 fault-nth:48): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='.G\bk\xecoup.c\x19\xac.\xdf\xd0\xb3\xdb\x93', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x4000, 0x0) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000440)=""/199) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80000, 0x0) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x420000, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000180)={0x1f, 0x86, &(0x7f0000000240)="a7707ef532a712c1f278d89f1fad724900ad2525b5dff4668bbf0ffee38ace22328d398f9f5fd0143abe7fbd4d9f91f865a3883837eb142742eb56e8e0c294f78a7165545805160a3969a3c34793d1cf05f0007ac995f8b1e0c79bab8ba9eef9155c36791f43293f4b297dd9ecfff9effd99aa85c218876cf821aaeeed326e6d1806d80227c7"}) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r7 = getuid() mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x4404, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@nodevmap='nodevmap'}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/vsock\x00'}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r7}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}]}}) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:14:50 executing program 0: 12:14:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000040)={0x1, &(0x7f0000000000), 0x6, r0}) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)={0x0, @aes256}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) r4 = syz_open_dev$midi(&(0x7f0000000640)='/dev/midi#\x00', 0x0, 0x200000) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x0) write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12) r5 = getpid() ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x804}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x68, r7, 0xc00, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x42}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10000}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x48000}, 0x40000) r8 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7fffffff, 0x200a00) syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x4, 0x80800) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x70, 0x20}, &(0x7f0000000180)=0xc) ioctl$KVM_GET_PIT2(r8, 0x8070ae9f, &(0x7f0000000580)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f00000001c0)={r9, 0x3}, 0x8) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r5, 0x0) 12:14:51 executing program 0: [ 2115.720625] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2115.790145] FAULT_INJECTION: forcing a failure. [ 2115.790145] name failslab, interval 1, probability 0, space 0, times 0 [ 2115.807624] CPU: 0 PID: 27533 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2115.814906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2115.824256] Call Trace: [ 2115.826876] dump_stack+0x172/0x1f0 [ 2115.830508] should_fail.cold+0xa/0x1b [ 2115.834402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2115.839509] ? lock_downgrade+0x810/0x810 [ 2115.843664] ? ___might_sleep+0x163/0x280 [ 2115.847816] __should_failslab+0x121/0x190 [ 2115.852052] should_failslab+0x9/0x14 [ 2115.855859] kmem_cache_alloc_trace+0x2d1/0x760 [ 2115.860534] ? part_uevent+0x120/0x120 [ 2115.864429] rand_initialize_disk+0x40/0xc0 [ 2115.868761] __alloc_disk_node+0x23f/0x420 [ 2115.872999] loop_add+0x3aa/0x8d0 [ 2115.876449] ? idr_find+0x47/0x60 [ 2115.879914] loop_control_ioctl+0x165/0x360 [ 2115.884232] ? loop_add+0x8d0/0x8d0 [ 2115.887856] ? __fget+0x340/0x540 [ 2115.891327] ? loop_add+0x8d0/0x8d0 [ 2115.894970] do_vfs_ioctl+0xd6e/0x1390 [ 2115.898860] ? ioctl_preallocate+0x210/0x210 [ 2115.903274] ? __fget+0x367/0x540 [ 2115.906746] ? iterate_fd+0x360/0x360 [ 2115.910551] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2115.916086] ? fput+0x128/0x1a0 [ 2115.919374] ? security_file_ioctl+0x93/0xc0 [ 2115.923788] ksys_ioctl+0xab/0xd0 [ 2115.927742] __x64_sys_ioctl+0x73/0xb0 [ 2115.931629] do_syscall_64+0x103/0x610 [ 2115.935530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2115.940712] RIP: 0033:0x457e29 [ 2115.943903] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2115.962805] RSP: 002b:00007f8ceffb3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2115.970505] RAX: ffffffffffffffda RBX: 00007f8ceffb3c90 RCX: 0000000000457e29 [ 2115.977764] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 12:14:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x8c02) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0xc) 12:14:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x8, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x20000, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f00000002c0)=r4) r5 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x9, 0x101001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)='%\\\x00'}, 0x30) write$cgroup_pid(r5, &(0x7f0000000080)=r6, 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:51 executing program 0: [ 2115.985021] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2115.992282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceffb46d4 [ 2115.999582] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2116.014927] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:51 executing program 2 (fault-call:11 fault-nth:49): socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x1) r0 = syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, 0x0) dup(0xffffffffffffffff) 12:14:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) 12:14:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:14:51 executing program 3: write(0xffffffffffffffff, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$KDSKBLED(r3, 0x4b65, 0xb9) r4 = openat$cgroup_procs(r3, &(0x7f00000001c0)='agro`\xd5\xd3\xff\x01\x00\x00\x00\x00\x00\x00', 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x8, 0x60, 0x2, 0x9]}) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 12:14:51 executing program 3: write(0xffffffffffffffff, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xc6, "3d591c98858bff12d220a963de738a276f881a3f6b7af15eb6ed520f9e585ba8ab91eae258498d71aa748a981c87bc5e91645fa0acb2ce5b0d93b343a0ed148363b36509067b36393a4ddf1144b84e24bc8366e84e196f271687961cf3c5845c20e035e1f9bf8a538264428887db08d0552490fd7919c9952f35d7257d959d178375b728c1abc5be85ea47e24960694909cfcfc1aa52cc67739e0406723caf9d2df3fa2f83f1f79114658ab8f8c4faa931fca49046ebba271baba7415407496cede879fd70b1"}, &(0x7f00000000c0)=0xce) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @empty}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r1, 0xfffffffffffff001, 0x24a, 0xfffffffffffffff9, 0x1ff, 0x101, 0x3, 0x80, {r2, @in6={{0xa, 0x4e23, 0x401, @rand_addr="5694e04cf0a30d2c2010a50808121e4e"}}, 0x6, 0x200, 0x0, 0x8000, 0x5}}, &(0x7f0000000180)=0xb0) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) getdents64(r0, &(0x7f0000000000)=""/177, 0xb1) [ 2116.282485] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:14:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 2116.351311] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:51 executing program 3: write(0xffffffffffffffff, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/206, 0xce}], 0x2) 12:14:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00!=\x98\xff.\xa1\xfa\x9b\xc1c\x87$6-\xccN\xe7\xbc\xbbx+\xeb\xb4-\xeeuH\xcd\x82D\xab\xbf\x90kX\xd6TK\xea8') fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'bcsf0\x00', 0x7f}) getdents64(r0, &(0x7f00000001c0)=""/78, 0x4e) 12:14:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2116.532484] FAULT_INJECTION: forcing a failure. [ 2116.532484] name failslab, interval 1, probability 0, space 0, times 0 [ 2116.543904] CPU: 0 PID: 27569 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2116.551194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2116.560573] Call Trace: [ 2116.563167] dump_stack+0x172/0x1f0 [ 2116.566804] should_fail.cold+0xa/0x1b [ 2116.570696] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2116.576245] ? lock_downgrade+0x810/0x810 [ 2116.580431] ? ___might_sleep+0x163/0x280 [ 2116.584591] __should_failslab+0x121/0x190 [ 2116.588849] should_failslab+0x9/0x14 [ 2116.592663] kmem_cache_alloc_trace+0x2d1/0x760 [ 2116.597352] ? mark_held_locks+0x100/0x100 [ 2116.601621] device_create_groups_vargs+0x8e/0x270 [ 2116.606571] device_create_vargs+0x45/0x60 [ 2116.610811] bdi_register_va.part.0+0x38/0x740 [ 2116.615402] bdi_register+0x12a/0x140 [ 2116.619200] ? bdi_register_va+0x80/0x80 [ 2116.623277] ? enable_ptr_key_workfn+0x30/0x30 [ 2116.627897] ? trace_hardirqs_on+0x67/0x230 [ 2116.632237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2116.637837] bdi_register_owner+0x61/0x110 [ 2116.642086] __device_add_disk+0xd68/0x1160 [ 2116.646419] ? blk_alloc_devt+0x2e0/0x2e0 [ 2116.650565] ? sprintf+0xc0/0x100 [ 2116.654020] ? scnprintf+0x140/0x140 [ 2116.657729] ? __init_waitqueue_head+0x36/0x90 [ 2116.662374] ? pm_runtime_init+0x364/0x420 [ 2116.666657] device_add_disk+0x2b/0x40 [ 2116.670546] loop_add+0x635/0x8d0 [ 2116.674020] loop_control_ioctl+0x165/0x360 [ 2116.678359] ? loop_add+0x8d0/0x8d0 [ 2116.682012] ? __fget+0x340/0x540 [ 2116.685469] ? loop_add+0x8d0/0x8d0 [ 2116.689099] do_vfs_ioctl+0xd6e/0x1390 [ 2116.692993] ? ioctl_preallocate+0x210/0x210 [ 2116.697401] ? __fget+0x367/0x540 [ 2116.700862] ? iterate_fd+0x360/0x360 [ 2116.704666] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2116.710200] ? fput+0x128/0x1a0 [ 2116.713518] ? security_file_ioctl+0x93/0xc0 [ 2116.717937] ksys_ioctl+0xab/0xd0 [ 2116.721394] __x64_sys_ioctl+0x73/0xb0 [ 2116.725307] do_syscall_64+0x103/0x610 [ 2116.729218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2116.734405] RIP: 0033:0x457e29 [ 2116.737612] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2116.756505] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2116.764212] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2116.771481] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2116.778756] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2116.786040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2116.793314] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2116.807197] WARNING: CPU: 1 PID: 27569 at block/genhd.c:717 __device_add_disk+0xef6/0x1160 [ 2116.815607] Kernel panic - not syncing: panic_on_warn set ... [ 2116.821494] CPU: 1 PID: 27569 Comm: syz-executor.2 Not tainted 5.0.0-rc8+ #89 [ 2116.828772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2116.838125] Call Trace: [ 2116.840713] dump_stack+0x172/0x1f0 [ 2116.844347] ? __device_add_disk+0xec0/0x1160 [ 2116.848844] panic+0x2cb/0x65c [ 2116.852041] ? __warn_printk+0xf3/0xf3 [ 2116.855933] ? __device_add_disk+0xef6/0x1160 [ 2116.860431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2116.865972] ? __warn.cold+0x5/0x45 [ 2116.869604] ? __device_add_disk+0xef6/0x1160 [ 2116.874110] __warn.cold+0x20/0x45 [ 2116.877653] ? __device_add_disk+0xef6/0x1160 [ 2116.882150] report_bug+0x263/0x2b0 [ 2116.885783] do_error_trap+0x11b/0x200 [ 2116.889689] do_invalid_op+0x37/0x50 [ 2116.893413] ? __device_add_disk+0xef6/0x1160 [ 2116.897912] invalid_op+0x14/0x20 [ 2116.901366] RIP: 0010:__device_add_disk+0xef6/0x1160 [ 2116.906464] Code: 10 3a 53 fe 0f 0b e9 98 fb ff ff 48 89 bd 18 ff ff ff e8 fd 39 53 fe 0f 0b 48 8b bd 18 ff ff ff e9 bf f7 ff ff e8 ea 39 53 fe <0f> 0b e9 80 fe ff ff e8 1e 7e 26 fe 4c 89 e7 e8 d6 3a 8a fe e9 45 [ 2116.925374] RSP: 0018:ffff88805b40faf8 EFLAGS: 00010246 [ 2116.930731] RAX: 0000000000040000 RBX: ffff88805b40fbe8 RCX: ffffc9000e868000 [ 2116.937999] RDX: 0000000000040000 RSI: ffffffff831ca536 RDI: 0000000000000005 [ 2116.945272] RBP: ffff88805b40fc10 R08: ffff888060c5c240 R09: ffffed1015d25bd0 [ 2116.952561] R10: ffffed1015d25bcf R11: ffff8880ae92de7b R12: ffff888097234940 [ 2116.959826] R13: ffff8880972349d0 R14: 00000000fffffff4 R15: 0000000000000000 [ 2116.967126] ? __device_add_disk+0xef6/0x1160 [ 2116.971645] ? __device_add_disk+0xef6/0x1160 [ 2116.976151] ? blk_alloc_devt+0x2e0/0x2e0 [ 2116.980306] ? sprintf+0xc0/0x100 [ 2116.983769] ? scnprintf+0x140/0x140 [ 2116.987510] ? __init_waitqueue_head+0x36/0x90 [ 2116.992101] ? pm_runtime_init+0x364/0x420 [ 2116.996351] device_add_disk+0x2b/0x40 [ 2117.000249] loop_add+0x635/0x8d0 [ 2117.003739] loop_control_ioctl+0x165/0x360 [ 2117.008063] ? loop_add+0x8d0/0x8d0 [ 2117.011697] ? __fget+0x340/0x540 [ 2117.015159] ? loop_add+0x8d0/0x8d0 [ 2117.018804] do_vfs_ioctl+0xd6e/0x1390 [ 2117.022703] ? ioctl_preallocate+0x210/0x210 [ 2117.027139] ? __fget+0x367/0x540 [ 2117.030600] ? iterate_fd+0x360/0x360 [ 2117.034407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2117.039947] ? fput+0x128/0x1a0 [ 2117.043243] ? security_file_ioctl+0x93/0xc0 [ 2117.047677] ksys_ioctl+0xab/0xd0 [ 2117.051141] __x64_sys_ioctl+0x73/0xb0 [ 2117.055050] do_syscall_64+0x103/0x610 [ 2117.058946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2117.064128] RIP: 0033:0x457e29 [ 2117.067316] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2117.086213] RSP: 002b:00007f8ceff92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2117.093915] RAX: ffffffffffffffda RBX: 00007f8ceff92c90 RCX: 0000000000457e29 [ 2117.101196] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2117.108471] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2117.115739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ceff936d4 [ 2117.123002] R13: 00000000004c10d9 R14: 00000000004d2ff0 R15: 0000000000000006 [ 2117.132040] Kernel Offset: disabled [ 2117.135806] Rebooting in 86400 seconds..