{0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x6, 0x8031, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000a40)=0x5) r1 = shmget(0x2, 0x1000, 0xc0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000a00)=""/40) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:27 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:27 executing program 6: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xffffffffffffffff, r0) 2033/05/18 03:38:27 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:27 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) add_key(&(0x7f0000000680)='rxrpc\x00', &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000b00)="17a94a5a3d1c1ef423134fd72c1c523bc73ab1d626a416645676b7fefd0df5456003ccf1b1b89a44c5a7274942909661404683683bae2c25beebff5007eb59b3159774afe2ffa442e9b2974a1689304f8073269b43d97ffc9f517b2ad429448aa12b403acf0939559f04086639fd95daab81667ee3a99bdb19cc99405bdefcde5e3764d8d549b9b131e8069e", 0x8c, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r8 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000bc0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r7) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r11) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x17}, r12}, 0x14) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r9, r10) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:27 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x80802) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0x376, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="31b539fc174026482c24cacb133fa232886e78883353919cae12c195febd9dcf0b4ce5bb409e778872818d0565ca44a6cc66eb02c70fe2fc09b29643c634eaddab71bcc292658a8266372f8e27"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:27 executing program 7 (fault-call:10 fault-nth:16): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 452.725260] FAULT_INJECTION: forcing a failure. [ 452.725260] name failslab, interval 1, probability 0, space 0, times 0 [ 452.736611] CPU: 1 PID: 27992 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 452.743812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.753176] Call Trace: [ 452.755786] dump_stack+0x194/0x24d [ 452.759425] ? arch_local_irq_restore+0x53/0x53 [ 452.764097] ? find_held_lock+0x35/0x1d0 [ 452.768173] should_fail+0x8c0/0xa40 [ 452.771901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 452.777016] ? inc_ucount+0x204/0x9a0 [ 452.780824] ? lock_downgrade+0x980/0x980 [ 452.784980] ? find_held_lock+0x35/0x1d0 [ 452.789064] ? check_same_owner+0x320/0x320 [ 452.793401] ? rcu_note_context_switch+0x710/0x710 [ 452.798339] ? retire_userns_sysctls+0x90/0x90 [ 452.802946] should_failslab+0xec/0x120 [ 452.806937] kmem_cache_alloc+0x47/0x760 [ 452.811020] copy_pid_ns+0x257/0xc60 [ 452.814737] ? refcount_add+0x60/0x60 [ 452.818549] ? pidns_get+0x170/0x170 [ 452.822283] ? refcount_inc+0x1e/0x50 [ 452.826095] ? copy_ipcs+0xb3/0x520 [ 452.829706] ? ipcns_get+0xf0/0xf0 [ 452.833232] ? do_mount+0x2bb0/0x2bb0 [ 452.837022] ? copy_namespaces+0x1a3/0x400 [ 452.841244] create_new_namespaces+0x307/0x880 [ 452.845815] ? sys_ni_syscall+0x20/0x20 [ 452.849781] ? ns_capable_common+0xcf/0x160 [ 452.854086] copy_namespaces+0x340/0x400 [ 452.858131] ? create_new_namespaces+0x880/0x880 [ 452.862877] ? _raw_spin_unlock+0x22/0x30 [ 452.867014] copy_process.part.38+0x2380/0x4bd0 [ 452.871674] ? __cleanup_sighand+0x40/0x40 [ 452.875900] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 452.881077] ? __lock_acquire+0x664/0x3e00 [ 452.885293] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 452.890466] ? perf_trace_lock+0xd6/0x900 [ 452.894603] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 452.899771] ? perf_trace_lock+0xd6/0x900 [ 452.903900] ? mntput_no_expire+0x130/0xa90 [ 452.908207] ? trace_event_raw_event_lock+0x340/0x340 [ 452.913390] ? perf_trace_lock+0xd6/0x900 [ 452.917523] ? lock_acquire+0x1d5/0x580 [ 452.921476] ? trace_hardirqs_off+0x10/0x10 [ 452.925779] ? perf_trace_lock+0xd6/0x900 [ 452.929919] ? find_held_lock+0x35/0x1d0 [ 452.933967] ? perf_trace_lock+0xd6/0x900 [ 452.938099] ? trace_event_raw_event_lock+0x340/0x340 [ 452.943270] ? _parse_integer+0x140/0x140 [ 452.947402] ? trace_hardirqs_off+0x10/0x10 [ 452.951705] ? get_pid_task+0x93/0x140 [ 452.955574] ? perf_trace_lock+0xd6/0x900 [ 452.959708] ? find_held_lock+0x35/0x1d0 [ 452.963757] ? __f_unlock_pos+0x19/0x20 [ 452.967710] ? lock_downgrade+0x980/0x980 [ 452.971837] ? get_pid_task+0xbc/0x140 [ 452.975706] ? proc_fail_nth_write+0x9b/0x1d0 [ 452.980182] ? map_files_get_link+0x3a0/0x3a0 [ 452.984663] _do_fork+0x1f7/0xf70 [ 452.988103] ? fork_idle+0x2d0/0x2d0 [ 452.991802] ? wait_for_completion+0x770/0x770 [ 452.996381] ? __sb_end_write+0xa0/0xd0 [ 453.000340] ? fput+0xd2/0x140 [ 453.003518] ? SyS_write+0x184/0x220 [ 453.007214] ? SyS_read+0x220/0x220 [ 453.010825] SyS_clone+0x37/0x50 [ 453.014171] ? sys_vfork+0x30/0x30 [ 453.017700] do_syscall_64+0x281/0x940 [ 453.021567] ? vmalloc_sync_all+0x30/0x30 [ 453.025697] ? _raw_spin_unlock_irq+0x27/0x70 [ 453.030171] ? finish_task_switch+0x1c1/0x7e0 [ 453.034648] ? syscall_return_slowpath+0x550/0x550 [ 453.039555] ? syscall_return_slowpath+0x2ac/0x550 [ 453.044464] ? prepare_exit_to_usermode+0x350/0x350 [ 453.049461] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 453.054807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.059633] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 453.064802] RIP: 0033:0x454e79 [ 453.067972] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:27 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:27 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r8) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f0000000480)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:28 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000240)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) syz_emit_ethernet(0x7ffff, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)) readv(r1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/14, 0xe}], 0x2) fallocate(r1, 0x0, 0x76, 0x1f) [ 453.075663] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 453.082913] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 453.090172] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 453.097424] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 453.104678] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000010 2033/05/18 03:38:28 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f00000005c0)={0x80000000, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="05062534f60a7aa5a98c91a7ebb53d0f1a47ac3e7bd3afb3fbe8161112e7dc300ae23a31748cd81862538242976f719875d2e148d0521c9391ab45a3e8e91a1f3b574112e86668fe410a61d14a12c2aa4445f5e5efdd8014afd7914128c5067b7f6e7283626c3039a24898000000000000000000"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xb, 0x100000000000007, 0x1, 0x9, 0x12, 0xffffffffffffffff, 0x200000001f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 7 (fault-call:10 fault-nth:17): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:28 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 453.263397] __report_access: 32 callbacks suppressed [ 453.263407] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28015] [ 453.286215] FAULT_INJECTION: forcing a failure. [ 453.286215] name failslab, interval 1, probability 0, space 0, times 0 [ 453.297509] CPU: 1 PID: 28017 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 453.304709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.314075] Call Trace: [ 453.316680] dump_stack+0x194/0x24d [ 453.320319] ? arch_local_irq_restore+0x53/0x53 [ 453.325010] should_fail+0x8c0/0xa40 [ 453.328742] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 453.333838] ? trace_hardirqs_on+0xd/0x10 [ 453.337989] ? refcount_inc_not_zero+0xfe/0x180 [ 453.342668] ? find_held_lock+0x35/0x1d0 [ 453.346752] ? check_same_owner+0x320/0x320 [ 453.351068] ? refcount_inc+0x1e/0x50 [ 453.354859] ? rcu_note_context_switch+0x710/0x710 [ 453.359778] should_failslab+0xec/0x120 [ 453.363736] kmem_cache_alloc+0x47/0x760 [ 453.367779] ? copy_namespaces+0x1a3/0x400 [ 453.372003] alloc_pid+0xc1/0xa00 [ 453.375445] ? sys_ni_syscall+0x20/0x20 [ 453.379401] ? __change_pid+0x400/0x400 [ 453.383356] ? ns_capable_common+0xcf/0x160 [ 453.387664] ? copy_namespaces+0x1ee/0x400 [ 453.391881] ? memset+0x31/0x40 [ 453.395142] ? copy_thread_tls+0x268/0x8f0 [ 453.399364] copy_process.part.38+0x2516/0x4bd0 [ 453.404031] ? __cleanup_sighand+0x40/0x40 [ 453.408261] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 453.413437] ? __lock_acquire+0x664/0x3e00 [ 453.417653] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 453.422826] ? environ_open+0x80/0x80 [ 453.426618] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 453.431791] ? __lock_acquire+0x664/0x3e00 [ 453.436012] ? mntput_no_expire+0x130/0xa90 [ 453.440324] ? print_irqtrace_events+0x270/0x270 [ 453.445065] ? trace_hardirqs_off+0x10/0x10 [ 453.449367] ? lock_release+0xa40/0xa40 [ 453.453324] ? lock_acquire+0x1d5/0x580 [ 453.457278] ? trace_hardirqs_off+0x10/0x10 [ 453.461581] ? trace_hardirqs_off+0x10/0x10 [ 453.465884] ? __lock_acquire+0x664/0x3e00 [ 453.470098] ? check_same_owner+0x320/0x320 [ 453.474407] ? find_held_lock+0x35/0x1d0 [ 453.478454] ? _parse_integer+0xe9/0x140 [ 453.482500] ? trace_hardirqs_off+0x10/0x10 [ 453.486805] ? _parse_integer+0x140/0x140 [ 453.490939] ? trace_hardirqs_off+0x10/0x10 [ 453.495246] ? get_pid_task+0x93/0x140 [ 453.499113] ? lock_downgrade+0x980/0x980 [ 453.503247] ? find_held_lock+0x35/0x1d0 [ 453.507295] ? __f_unlock_pos+0x19/0x20 [ 453.511248] ? lock_downgrade+0x980/0x980 [ 453.515375] ? get_pid_task+0xbc/0x140 [ 453.519244] ? proc_fail_nth_write+0x9b/0x1d0 [ 453.523720] ? map_files_get_link+0x3a0/0x3a0 [ 453.528207] _do_fork+0x1f7/0xf70 [ 453.531645] ? fork_idle+0x2d0/0x2d0 [ 453.535342] ? wait_for_completion+0x770/0x770 [ 453.539910] ? __lock_is_held+0xb6/0x140 [ 453.543964] ? __sb_end_write+0xa0/0xd0 [ 453.547920] ? fput+0xd2/0x140 [ 453.551096] ? SyS_write+0x184/0x220 [ 453.554789] ? SyS_read+0x220/0x220 [ 453.558401] SyS_clone+0x37/0x50 [ 453.561748] ? sys_vfork+0x30/0x30 [ 453.565269] do_syscall_64+0x281/0x940 [ 453.569138] ? vmalloc_sync_all+0x30/0x30 [ 453.573264] ? _raw_spin_unlock_irq+0x27/0x70 [ 453.577739] ? finish_task_switch+0x1c1/0x7e0 [ 453.582218] ? syscall_return_slowpath+0x550/0x550 [ 453.587128] ? syscall_return_slowpath+0x2ac/0x550 [ 453.592039] ? prepare_exit_to_usermode+0x350/0x350 [ 453.597038] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 453.602384] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.607211] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 453.612381] RIP: 0033:0x454e79 [ 453.615550] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 453.623241] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 453.630489] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 453.637736] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 453.644986] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 453.652237] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000011 2033/05/18 03:38:28 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:28 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) set_tid_address(&(0x7f0000000240)) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:28 executing program 7 (fault-call:10 fault-nth:18): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:28 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x5b5854be9e97466c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000280000/0x4000)=nil, 0x4000) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000a00)=""/40) r1 = syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") bind$ax25(r0, &(0x7f0000000a40)={0x3, {"d6ba620d80bbdd"}}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000a80)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000b00)={r2, 0x1f}, &(0x7f0000000b40)=0x8) 2033/05/18 03:38:28 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="050600a87b1a2d49b3f33cd9360b3a501cc553f3b8bbbadea1da6c319e736e9753a2a7544d7b42ce7229c260b7e53506227137c95651723cbf51c1eb36f583396bd298627627a30a1e2c8de3ed379a25e4ccc12581f243c097827f434c9845f1678839b3a307dcfa7ef1fd3004c940d3e5346dedc8f9816534fe0ae5d2c573193d156d2f2132827d1f5e8837d265531b2c499cf6b565fd7c577ba3e22103440273dda83c3bcdb51670d7"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 453.717268] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28033] [ 453.722913] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28035] [ 453.746249] FAULT_INJECTION: forcing a failure. [ 453.746249] name failslab, interval 1, probability 0, space 0, times 0 [ 453.758220] CPU: 0 PID: 28034 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 453.765388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.774719] Call Trace: [ 453.777292] dump_stack+0x194/0x24d [ 453.780898] ? arch_local_irq_restore+0x53/0x53 [ 453.785555] should_fail+0x8c0/0xa40 [ 453.789249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 453.794333] ? radix_tree_clear_tags+0xb0/0xb0 [ 453.798898] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 453.804065] ? lock_downgrade+0x980/0x980 [ 453.808195] ? print_irqtrace_events+0x270/0x270 [ 453.812929] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 453.817924] ? trace_hardirqs_off+0x10/0x10 [ 453.822220] ? trace_hardirqs_off+0x10/0x10 [ 453.826518] ? trace_hardirqs_off+0x10/0x10 [ 453.830818] ? print_irqtrace_events+0x270/0x270 [ 453.835560] should_failslab+0xec/0x120 [ 453.839512] kmem_cache_alloc+0x47/0x760 [ 453.843551] ? radix_tree_node_alloc.constprop.19+0x2d0/0x2d0 [ 453.849418] radix_tree_node_alloc.constprop.19+0x1b4/0x2d0 [ 453.855106] idr_get_free+0x9d0/0xfd0 [ 453.858890] ? radix_tree_clear_tags+0xb0/0xb0 [ 453.863455] ? unwind_get_return_address+0x61/0xa0 [ 453.868365] ? __save_stack_trace+0x7e/0xd0 [ 453.872675] ? save_stack+0xa3/0xd0 [ 453.876279] ? save_stack+0x43/0xd0 [ 453.879880] ? kasan_kmalloc+0xad/0xe0 [ 453.883745] ? kasan_slab_alloc+0x12/0x20 [ 453.887868] ? kmem_cache_alloc+0x12e/0x760 [ 453.892164] ? alloc_pid+0xc1/0xa00 [ 453.895771] ? copy_process.part.38+0x2516/0x4bd0 [ 453.900588] ? _do_fork+0x1f7/0xf70 [ 453.904192] ? SyS_clone+0x37/0x50 [ 453.907713] ? do_syscall_64+0x281/0x940 [ 453.911755] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 453.917099] ? refcount_inc_not_zero+0xfe/0x180 [ 453.921749] ? find_held_lock+0x35/0x1d0 [ 453.925792] idr_alloc_u32+0x1b2/0x390 [ 453.929662] ? __fprop_inc_percpu_max+0x2a0/0x2a0 [ 453.934486] ? lock_acquire+0x1d5/0x580 [ 453.938435] ? alloc_pid+0x22e/0xa00 [ 453.942129] ? rcu_pm_notify+0xc0/0xc0 [ 453.945996] idr_alloc_cyclic+0x15a/0x320 [ 453.950121] ? idr_alloc+0x180/0x180 [ 453.953810] ? copy_namespaces+0x1a3/0x400 [ 453.958020] ? __radix_tree_preload+0x133/0x1c0 [ 453.962669] alloc_pid+0x2ad/0xa00 [ 453.966193] ? __change_pid+0x400/0x400 [ 453.970141] ? ns_capable_common+0xcf/0x160 [ 453.974443] ? memset+0x31/0x40 [ 453.977701] ? copy_thread_tls+0x268/0x8f0 [ 453.981918] copy_process.part.38+0x2516/0x4bd0 [ 453.986572] ? __cleanup_sighand+0x40/0x40 [ 453.990878] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 453.996049] ? __lock_acquire+0x664/0x3e00 [ 454.000261] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 454.005428] ? environ_open+0x80/0x80 [ 454.009215] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 454.014380] ? __lock_acquire+0x664/0x3e00 [ 454.018594] ? mntput_no_expire+0x130/0xa90 [ 454.022893] ? print_irqtrace_events+0x270/0x270 [ 454.027626] ? trace_hardirqs_off+0x10/0x10 [ 454.031925] ? lock_release+0xa40/0xa40 [ 454.035882] ? lock_acquire+0x1d5/0x580 [ 454.039832] ? trace_hardirqs_off+0x10/0x10 [ 454.044132] ? trace_hardirqs_off+0x10/0x10 [ 454.048434] ? __lock_acquire+0x664/0x3e00 [ 454.052645] ? check_same_owner+0x320/0x320 [ 454.056945] ? find_held_lock+0x35/0x1d0 [ 454.060986] ? _parse_integer+0xe9/0x140 [ 454.065026] ? trace_hardirqs_off+0x10/0x10 [ 454.069324] ? _parse_integer+0x140/0x140 [ 454.073456] ? trace_hardirqs_off+0x10/0x10 [ 454.077756] ? get_pid_task+0x93/0x140 [ 454.081620] ? lock_downgrade+0x980/0x980 [ 454.085747] ? find_held_lock+0x35/0x1d0 [ 454.089787] ? __f_unlock_pos+0x19/0x20 [ 454.093740] ? lock_downgrade+0x980/0x980 [ 454.097875] ? get_pid_task+0xbc/0x140 [ 454.101739] ? proc_fail_nth_write+0x9b/0x1d0 [ 454.106212] ? map_files_get_link+0x3a0/0x3a0 [ 454.110692] _do_fork+0x1f7/0xf70 [ 454.114122] ? fork_idle+0x2d0/0x2d0 [ 454.117816] ? wait_for_completion+0x770/0x770 [ 454.122379] ? __lock_is_held+0xb6/0x140 [ 454.126430] ? __sb_end_write+0xa0/0xd0 [ 454.130393] ? fput+0xd2/0x140 [ 454.133566] ? SyS_write+0x184/0x220 [ 454.137258] ? SyS_read+0x220/0x220 [ 454.140878] SyS_clone+0x37/0x50 [ 454.144224] ? sys_vfork+0x30/0x30 [ 454.147749] do_syscall_64+0x281/0x940 [ 454.151614] ? vmalloc_sync_all+0x30/0x30 [ 454.155742] ? finish_task_switch+0x1c1/0x7e0 [ 454.160216] ? syscall_return_slowpath+0x550/0x550 [ 454.165124] ? syscall_return_slowpath+0x2ac/0x550 [ 454.170031] ? prepare_exit_to_usermode+0x350/0x350 [ 454.175025] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 454.180366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.185191] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 454.190359] RIP: 0033:0x454e79 [ 454.193524] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 454.201208] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 454.208453] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 454.215701] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 454.222948] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 454.230195] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000012 [ 454.336307] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28046] 2033/05/18 03:38:30 executing program 6: timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x80, 0x0) connect$inet(r0, &(0x7f0000000600)={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10) timer_create(0x4, &(0x7f0000000000)={0x0, 0x2e, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r1) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") timer_create(0x1, &(0x7f0000000340)={0x0, 0x26, 0x0, @thr={&(0x7f0000000440)="1b30a0689cbc22bfa25a710856b8d6e54a412a6c991e3d1d5588a3c9bc13f915fde22c88d7f70d55143d930d40d34aae6be6c5044f55de2ebc4e7cf804cad71db2364755451480fb63bfb4637e770a681676f2da2add222cee901985c861dab634a05b9e8820acd3ff4450e60ca934ebf6050ebe07c9507afe4ce639c8f894692f3c5d0638", &(0x7f0000000500)="cdd7b1cca62b6afcec6003ea4953fcde88091146ad4a797ace4fb21f8e0936323767a5a4aa37312e9a9061acbf538bda072164838c5aa1ae922e7e9b5b39a6e6919c20d5a126c59125986531093b3cd7c317998b89cf574b3386488c36501a9e"}}, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x0, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) clock_gettime(0x0, &(0x7f0000000200)) r3 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x9516}) close(r3) capset(&(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000002000)='\t', 0x1) setrlimit(0x3, &(0x7f000040c000)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 2033/05/18 03:38:30 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:30 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:30 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x20010, r0, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:30 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="e5b74b78fb"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:30 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:30 executing program 7 (fault-call:10 fault-nth:19): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:30 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 455.475156] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28057] [ 455.507330] FAULT_INJECTION: forcing a failure. [ 455.507330] name failslab, interval 1, probability 0, space 0, times 0 [ 455.518748] CPU: 1 PID: 28063 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 455.521367] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28065] [ 455.525939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.525946] Call Trace: [ 455.525971] dump_stack+0x194/0x24d [ 455.525987] ? arch_local_irq_restore+0x53/0x53 [ 455.526006] should_fail+0x8c0/0xa40 [ 455.536293] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28066] [ 455.545355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 455.545371] ? trace_hardirqs_off+0x10/0x10 [ 455.545382] ? print_irqtrace_events+0x270/0x270 [ 455.545390] ? __lock_is_held+0xb6/0x140 [ 455.545403] ? find_held_lock+0x35/0x1d0 [ 455.545428] ? check_same_owner+0x320/0x320 [ 455.545438] ? idr_get_free+0x64e/0xfd0 [ 455.545454] ? rcu_note_context_switch+0x710/0x710 [ 455.604877] should_failslab+0xec/0x120 [ 455.608867] kmem_cache_alloc+0x47/0x760 [ 455.612941] ? replace_slot+0x12b/0x500 [ 455.616931] ? unwind_get_return_address+0x61/0xa0 [ 455.621877] alloc_vfsmnt+0xe0/0x9c0 [ 455.625604] ? mnt_free_id.isra.21+0x50/0x50 [ 455.630014] ? perf_trace_lock+0xd6/0x900 [ 455.634172] ? save_stack+0xa3/0xd0 [ 455.637806] ? trace_event_raw_event_lock+0x340/0x340 [ 455.643013] ? kasan_slab_alloc+0x12/0x20 [ 455.647170] ? alloc_pid+0xc1/0xa00 [ 455.650809] ? __radix_tree_replace+0x1af/0x310 [ 455.655489] ? trace_hardirqs_off+0x10/0x10 [ 455.659818] ? radix_tree_delete+0x30/0x30 [ 455.664063] ? node_tag_clear+0xf2/0x180 [ 455.668115] ? radix_tree_iter_tag_clear+0x97/0xd0 [ 455.673110] ? radix_tree_iter_replace+0x4c/0x60 [ 455.677854] ? find_held_lock+0x35/0x1d0 [ 455.681902] ? alloc_pid+0x2bc/0xa00 [ 455.685600] vfs_kern_mount.part.26+0x84/0x4a0 [ 455.690170] ? may_umount+0xa0/0xa0 [ 455.693779] ? idr_alloc_cyclic+0x1d6/0x320 [ 455.698085] ? do_raw_spin_trylock+0x190/0x190 [ 455.702647] ? idr_alloc+0x180/0x180 [ 455.706343] kern_mount_data+0x50/0xb0 [ 455.710212] pid_ns_prepare_proc+0x1e/0x80 [ 455.714427] alloc_pid+0x87e/0xa00 [ 455.717952] ? __change_pid+0x400/0x400 [ 455.721909] ? ns_capable_common+0xcf/0x160 [ 455.726221] ? memset+0x31/0x40 [ 455.729484] ? copy_thread_tls+0x268/0x8f0 [ 455.733710] copy_process.part.38+0x2516/0x4bd0 [ 455.738372] ? __cleanup_sighand+0x40/0x40 [ 455.742598] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 455.747774] ? __lock_acquire+0x664/0x3e00 [ 455.751988] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 455.757167] ? perf_trace_lock+0xd6/0x900 [ 455.761305] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 455.766474] ? perf_trace_lock+0xd6/0x900 [ 455.770599] ? mntput_no_expire+0x130/0xa90 [ 455.774908] ? trace_event_raw_event_lock+0x340/0x340 [ 455.780078] ? perf_trace_lock+0xd6/0x900 [ 455.789856] ? lock_acquire+0x1d5/0x580 [ 455.793813] ? trace_hardirqs_off+0x10/0x10 [ 455.798115] ? perf_trace_lock+0xd6/0x900 [ 455.802254] ? find_held_lock+0x35/0x1d0 [ 455.806297] ? perf_trace_lock+0xd6/0x900 [ 455.810431] ? trace_event_raw_event_lock+0x340/0x340 [ 455.815601] ? _parse_integer+0x140/0x140 [ 455.819734] ? trace_hardirqs_off+0x10/0x10 [ 455.824042] ? get_pid_task+0x93/0x140 [ 455.827911] ? perf_trace_lock+0xd6/0x900 [ 455.832044] ? find_held_lock+0x35/0x1d0 [ 455.836094] ? __f_unlock_pos+0x19/0x20 [ 455.840052] ? lock_downgrade+0x980/0x980 [ 455.844183] ? get_pid_task+0xbc/0x140 [ 455.848056] ? proc_fail_nth_write+0x9b/0x1d0 [ 455.852530] ? map_files_get_link+0x3a0/0x3a0 [ 455.857017] _do_fork+0x1f7/0xf70 [ 455.860457] ? fork_idle+0x2d0/0x2d0 [ 455.864153] ? wait_for_completion+0x770/0x770 [ 455.868739] ? __sb_end_write+0xa0/0xd0 [ 455.872698] ? fput+0xd2/0x140 [ 455.875874] ? SyS_write+0x184/0x220 [ 455.879569] ? SyS_read+0x220/0x220 [ 455.883184] SyS_clone+0x37/0x50 [ 455.886530] ? sys_vfork+0x30/0x30 [ 455.890058] do_syscall_64+0x281/0x940 [ 455.893927] ? vmalloc_sync_all+0x30/0x30 [ 455.898054] ? _raw_spin_unlock_irq+0x27/0x70 [ 455.902536] ? finish_task_switch+0x1c1/0x7e0 [ 455.907016] ? syscall_return_slowpath+0x550/0x550 [ 455.911932] ? syscall_return_slowpath+0x2ac/0x550 [ 455.916842] ? prepare_exit_to_usermode+0x350/0x350 [ 455.922102] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 455.927452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 455.932279] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 455.937448] RIP: 0033:0x454e79 [ 455.940619] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 455.948309] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 455.955557] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 455.962804] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 455.970055] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 455.977303] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000013 2033/05/18 03:38:31 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0x20, 0x2, 0x6, 0x6, 0xd, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x7f, 0x9, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) accept$packet(r0, 0x0, &(0x7f0000000a00)) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:31 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x2000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000280)=0x95d9, 0x4) open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:31 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 7 (fault-call:10 fault-nth:20): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r2, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1f, 0x3f, 0x81, 0x7, 0xfff, 0x1, 0x81cb, 0x6, 0x2, 0x180d, 0x8, 0x0, 0xf9]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r3, 0x100000001, 0x0, 0x4, 0x0, 0x3ff}, &(0x7f0000000900)=0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0x7, 0x8001, 0xffffffffffffff80, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2, 0x4e22}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={r4}, 0x8) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000940)) r5 = getpid() process_vm_readv(r5, &(0x7f0000000200), 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000540)=""/220, 0xdc}, {&(0x7f0000000700)=""/212, 0xd4}], 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x1, 0x1f, 0xe0000000, 0xcc5}, &(0x7f0000000180)=0x98) r6 = syz_open_pts(0xffffffffffffffff, 0x2) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000001300)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) fstat(r1, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000002f00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2004010}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000980)={0x10, 0x30, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000002e00)=[@cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r5, r9, r10}, @rights={0x20, 0x1, 0x1, [r6, r6, r1, r2]}, @rights={0x18, 0x1, 0x1, [r6, r6]}, @rights={0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r6, r1]}], 0xa0, 0x40000}, 0x8804) fchmod(r0, 0x80) dup3(0xffffffffffffffff, r0, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) [ 456.542525] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28095] [ 456.554281] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28097] [ 456.557180] FAULT_INJECTION: forcing a failure. [ 456.557180] name failslab, interval 1, probability 0, space 0, times 0 [ 456.575137] CPU: 0 PID: 28099 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 456.582341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.591793] Call Trace: [ 456.594398] dump_stack+0x194/0x24d [ 456.598043] ? arch_local_irq_restore+0x53/0x53 [ 456.602736] should_fail+0x8c0/0xa40 [ 456.606469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 456.611599] ? trace_event_raw_event_lock+0x340/0x340 [ 456.616806] ? find_held_lock+0x35/0x1d0 [ 456.620894] ? check_same_owner+0x320/0x320 [ 456.625226] ? sget_userns+0x27d/0xe40 [ 456.629128] ? rcu_note_context_switch+0x710/0x710 [ 456.634082] should_failslab+0xec/0x120 [ 456.638068] kmem_cache_alloc_trace+0x4b/0x740 [ 456.642672] ? check_same_owner+0x320/0x320 [ 456.647011] sget_userns+0x2a3/0xe40 [ 456.650729] ? set_anon_super+0x20/0x20 [ 456.654692] ? put_filp+0x90/0x90 [ 456.658833] ? __alloc_pages_nodemask+0xabe/0xdd0 [ 456.663685] ? destroy_unused_super.part.6+0xd0/0xd0 [ 456.668772] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 456.673769] ? perf_trace_lock+0xd6/0x900 [ 456.677897] ? save_stack+0xa3/0xd0 [ 456.681506] ? trace_event_raw_event_lock+0x340/0x340 [ 456.686677] ? kasan_slab_alloc+0x12/0x20 [ 456.690804] ? alloc_pid+0xc1/0xa00 [ 456.694416] ? __radix_tree_replace+0x1af/0x310 [ 456.699065] ? trace_hardirqs_off+0x10/0x10 [ 456.703362] ? radix_tree_delete+0x30/0x30 [ 456.707577] ? node_tag_clear+0xf2/0x180 [ 456.711627] ? proc_get_inode+0x620/0x620 [ 456.715755] mount_ns+0x6d/0x190 [ 456.719104] proc_mount+0x7a/0x90 [ 456.722537] mount_fs+0x66/0x2d0 [ 456.725888] vfs_kern_mount.part.26+0xc6/0x4a0 [ 456.730453] ? may_umount+0xa0/0xa0 [ 456.734062] ? idr_alloc_cyclic+0x1d6/0x320 [ 456.738367] ? do_raw_spin_trylock+0x190/0x190 [ 456.742932] ? idr_alloc+0x180/0x180 [ 456.746627] kern_mount_data+0x50/0xb0 [ 456.750523] pid_ns_prepare_proc+0x1e/0x80 [ 456.754739] alloc_pid+0x87e/0xa00 [ 456.758263] ? __change_pid+0x400/0x400 [ 456.762217] ? ns_capable_common+0xcf/0x160 [ 456.766530] ? memset+0x31/0x40 [ 456.769793] ? copy_thread_tls+0x268/0x8f0 [ 456.774021] copy_process.part.38+0x2516/0x4bd0 [ 456.778683] ? __cleanup_sighand+0x40/0x40 [ 456.782909] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 456.788083] ? __lock_acquire+0x664/0x3e00 [ 456.792299] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 456.797471] ? perf_trace_lock+0xd6/0x900 [ 456.801608] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 456.806777] ? perf_trace_lock+0xd6/0x900 [ 456.810903] ? mntput_no_expire+0x130/0xa90 [ 456.815210] ? trace_event_raw_event_lock+0x340/0x340 [ 456.820376] ? perf_trace_lock+0xd6/0x900 [ 456.824513] ? lock_acquire+0x1d5/0x580 [ 456.828469] ? trace_hardirqs_off+0x10/0x10 [ 456.832771] ? perf_trace_lock+0xd6/0x900 [ 456.836908] ? find_held_lock+0x35/0x1d0 [ 456.840952] ? perf_trace_lock+0xd6/0x900 [ 456.845118] ? trace_event_raw_event_lock+0x340/0x340 [ 456.850293] ? _parse_integer+0x140/0x140 [ 456.854426] ? trace_hardirqs_off+0x10/0x10 [ 456.858731] ? get_pid_task+0x93/0x140 [ 456.862600] ? perf_trace_lock+0xd6/0x900 [ 456.866733] ? find_held_lock+0x35/0x1d0 [ 456.870781] ? __f_unlock_pos+0x19/0x20 [ 456.874738] ? lock_downgrade+0x980/0x980 [ 456.878866] ? get_pid_task+0xbc/0x140 [ 456.882737] ? proc_fail_nth_write+0x9b/0x1d0 [ 456.887227] ? map_files_get_link+0x3a0/0x3a0 [ 456.891709] _do_fork+0x1f7/0xf70 [ 456.895146] ? fork_idle+0x2d0/0x2d0 [ 456.898843] ? wait_for_completion+0x770/0x770 [ 456.903421] ? __sb_end_write+0xa0/0xd0 [ 456.907376] ? fput+0xd2/0x140 [ 456.910550] ? SyS_write+0x184/0x220 [ 456.914248] ? SyS_read+0x220/0x220 [ 456.917856] SyS_clone+0x37/0x50 [ 456.921201] ? sys_vfork+0x30/0x30 [ 456.924725] do_syscall_64+0x281/0x940 [ 456.928594] ? vmalloc_sync_all+0x30/0x30 [ 456.932720] ? _raw_spin_unlock_irq+0x27/0x70 [ 456.937197] ? finish_task_switch+0x1c1/0x7e0 [ 456.941673] ? syscall_return_slowpath+0x550/0x550 [ 456.946582] ? syscall_return_slowpath+0x2ac/0x550 [ 456.951490] ? prepare_exit_to_usermode+0x350/0x350 [ 456.956489] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 456.961838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.966669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 456.971840] RIP: 0033:0x454e79 [ 456.975010] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 456.982707] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 2033/05/18 03:38:31 executing program 6: unshare(0x8000000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x200, 0x5, 0x200, 0x1, 0x0, 0x8001, 0x0, 0x7f, 0x0}, &(0x7f0000000400)=0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={r0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300)={r1, 0x10000}, &(0x7f0000000340)=0x8) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0xffffffff}) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$inet6(0xa, 0xf, 0x7, &(0x7f0000000600)={0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000880)={0x8001}, 0x4) setresgid(r5, 0x0, r6) chdir(&(0x7f0000000740)='./file0\x00') renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000200)={r4, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000000)={r3, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r10, 0xc00c642d, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r10, 0xc010640b, &(0x7f00000001c0)={r2, r11, 0x1}) r12 = socket$inet6(0xa, 0x0, 0xfffffffffffffff8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000500)=0x14) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f00000008c0)=""/178, 0x100000000}) setsockopt$inet6_IPV6_PKTINFO(r12, 0x29, 0x32, &(0x7f0000000540)={@loopback={0x0, 0x1}}, 0x14) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r9, 0xc00c642e, &(0x7f0000000380)={r8, 0x80000, r9}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000840)={'teql0\x00', 0x1000}) ioctl$DRM_IOCTL_GEM_CLOSE(r10, 0x40086409, &(0x7f0000000080)={r11}) unshare(0x8000400) ioctl$DRM_IOCTL_GEM_FLINK(r13, 0xc008640a, &(0x7f0000000480)={0x0, r2}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x7f, @broadcast=0xffffffff, 0x4e22, 0x3, 'sh\x00', 0x31, 0x8}, 0x2c) 2033/05/18 03:38:31 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a8"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 456.989955] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 456.997207] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 457.004455] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 457.011704] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000014 2033/05/18 03:38:31 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000280), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) truncate(&(0x7f0000000240)='./file0/file0\x00', 0xa1) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r7) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x40000, 0x60) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:31 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a8"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 457.044432] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28098] 2033/05/18 03:38:31 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:31 executing program 7 (fault-call:10 fault-nth:21): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 457.200785] FAULT_INJECTION: forcing a failure. [ 457.200785] name failslab, interval 1, probability 0, space 0, times 0 [ 457.213065] CPU: 1 PID: 28131 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 457.220268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.229627] Call Trace: [ 457.232234] dump_stack+0x194/0x24d [ 457.235882] ? arch_local_irq_restore+0x53/0x53 [ 457.240574] should_fail+0x8c0/0xa40 [ 457.244305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 457.249420] ? find_next_zero_bit+0xe3/0x110 [ 457.253842] ? trace_hardirqs_off+0x10/0x10 [ 457.258171] ? __lock_is_held+0xb6/0x140 [ 457.262237] ? find_held_lock+0x35/0x1d0 [ 457.266297] ? __lock_is_held+0xb6/0x140 [ 457.270376] ? check_same_owner+0x320/0x320 [ 457.274709] ? rcu_note_context_switch+0x710/0x710 [ 457.279648] ? rcu_note_context_switch+0x710/0x710 [ 457.284584] should_failslab+0xec/0x120 [ 457.288543] __kmalloc+0x63/0x760 [ 457.291982] ? lockdep_init_map+0x9/0x10 [ 457.296028] ? debug_mutex_init+0x2d/0x60 [ 457.300156] ? __list_lru_init+0xcf/0x750 [ 457.304287] __list_lru_init+0xcf/0x750 [ 457.308247] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 457.314113] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 457.319111] ? __lockdep_init_map+0xe4/0x650 [ 457.323500] ? lockdep_init_map+0x9/0x10 [ 457.327544] sget_userns+0x691/0xe40 [ 457.331237] ? set_anon_super+0x20/0x20 [ 457.335196] ? put_filp+0x90/0x90 [ 457.338631] ? destroy_unused_super.part.6+0xd0/0xd0 [ 457.343719] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 457.348717] ? perf_trace_lock+0xd6/0x900 [ 457.352852] ? save_stack+0xa3/0xd0 [ 457.356463] ? kasan_slab_alloc+0x12/0x20 [ 457.360591] ? alloc_pid+0xc1/0xa00 [ 457.364205] ? __radix_tree_replace+0x1af/0x310 [ 457.368857] ? radix_tree_delete+0x30/0x30 [ 457.373071] ? node_tag_clear+0xf2/0x180 [ 457.377119] ? proc_get_inode+0x620/0x620 [ 457.381245] mount_ns+0x6d/0x190 [ 457.384594] proc_mount+0x7a/0x90 [ 457.388032] mount_fs+0x66/0x2d0 [ 457.391384] vfs_kern_mount.part.26+0xc6/0x4a0 [ 457.395947] ? may_umount+0xa0/0xa0 [ 457.399553] ? idr_alloc_cyclic+0x1d6/0x320 [ 457.403857] ? do_raw_spin_trylock+0x190/0x190 [ 457.408417] ? idr_alloc+0x180/0x180 [ 457.412110] kern_mount_data+0x50/0xb0 [ 457.415976] pid_ns_prepare_proc+0x1e/0x80 [ 457.420191] alloc_pid+0x87e/0xa00 [ 457.423713] ? __change_pid+0x400/0x400 [ 457.427667] ? ns_capable_common+0xcf/0x160 [ 457.431974] ? memset+0x31/0x40 [ 457.435237] ? copy_thread_tls+0x268/0x8f0 [ 457.439456] copy_process.part.38+0x2516/0x4bd0 [ 457.444113] ? __cleanup_sighand+0x40/0x40 [ 457.448339] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 457.453513] ? __lock_acquire+0x664/0x3e00 [ 457.457730] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 457.462902] ? perf_trace_lock+0xd6/0x900 [ 457.467042] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 457.472213] ? perf_trace_lock+0xd6/0x900 [ 457.476339] ? mntput_no_expire+0x130/0xa90 [ 457.480648] ? trace_event_raw_event_lock+0x340/0x340 [ 457.485820] ? perf_trace_lock+0xd6/0x900 [ 457.489955] ? lock_acquire+0x1d5/0x580 [ 457.493913] ? trace_hardirqs_off+0x10/0x10 [ 457.498216] ? perf_trace_lock+0xd6/0x900 [ 457.502352] ? find_held_lock+0x35/0x1d0 [ 457.506398] ? perf_trace_lock+0xd6/0x900 [ 457.510529] ? trace_event_raw_event_lock+0x340/0x340 [ 457.515702] ? _parse_integer+0x140/0x140 [ 457.519836] ? trace_hardirqs_off+0x10/0x10 [ 457.524141] ? get_pid_task+0x93/0x140 [ 457.528014] ? perf_trace_lock+0xd6/0x900 [ 457.532153] ? find_held_lock+0x35/0x1d0 [ 457.536204] ? __f_unlock_pos+0x19/0x20 [ 457.540161] ? lock_downgrade+0x980/0x980 [ 457.544287] ? get_pid_task+0xbc/0x140 [ 457.548160] ? proc_fail_nth_write+0x9b/0x1d0 [ 457.552635] ? map_files_get_link+0x3a0/0x3a0 [ 457.557121] _do_fork+0x1f7/0xf70 [ 457.560562] ? fork_idle+0x2d0/0x2d0 [ 457.564261] ? wait_for_completion+0x770/0x770 [ 457.568841] ? __sb_end_write+0xa0/0xd0 [ 457.572801] ? fput+0xd2/0x140 [ 457.575977] ? SyS_write+0x184/0x220 [ 457.579674] ? SyS_read+0x220/0x220 [ 457.583281] SyS_clone+0x37/0x50 [ 457.586626] ? sys_vfork+0x30/0x30 [ 457.590151] do_syscall_64+0x281/0x940 [ 457.594026] ? vmalloc_sync_all+0x30/0x30 [ 457.598158] ? _raw_spin_unlock_irq+0x27/0x70 [ 457.602633] ? finish_task_switch+0x1c1/0x7e0 [ 457.607109] ? syscall_return_slowpath+0x550/0x550 [ 457.612025] ? syscall_return_slowpath+0x2ac/0x550 [ 457.616936] ? prepare_exit_to_usermode+0x350/0x350 [ 457.621935] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 457.627281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.632108] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 457.637276] RIP: 0033:0x454e79 [ 457.640446] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:32 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) r1 = getpid() fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80)={r1, r2, r3}, 0xc) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:32 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a8"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:32 executing program 7 (fault-call:10 fault-nth:22): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:32 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="05061f4000bd1b05000000"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:32 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:32 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:32 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) dup3(r0, r3, 0x80000) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:32 executing program 6: r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'ip6tnl0\x00', 0x800}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) close(r0) capset(&(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x10001}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x80000001) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) poll(&(0x7f0000084ff0)=[{0xffffffffffffffff, 0xc1a6}], 0x20000000000000b5, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000400)=""/123, 0x7b}], 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='syz_tun\x00') fanotify_mark(r3, 0x0, 0x10000, r3, &(0x7f00000004c0)='./file1\x00') write(r3, &(0x7f0000ffdffb)='#', 0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) accept4$ipx(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) sched_getscheduler(0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x54000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@flushsa={0xa4, 0x1c, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@mark={0xc, 0x15, {0x35075d, 0x7}}, @tmpl={0x84, 0x5, [{{@in=@loopback=0x7f000001, 0x4d6, 0x3c}, 0x2, @in=@rand_addr, 0x3502, 0x0, 0x0, 0x7f, 0xf6fa, 0x0, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0xa, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x4}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x80c0}, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000200)) execveat(r3, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='/dev/vga_arbiter\x00', &(0x7f0000000540)='/r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000007060804002000fffc0c6565643b799365195f1b76"], 0x1000) fchdir(0xffffffffffffffff) r4 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$tun(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="00004f3328e4e7dc9f1fd0f600"], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff0000000, 0x0, 0x3}, 0x14) [ 457.648188] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 457.655442] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 457.662694] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 457.669943] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 457.677193] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000015 2033/05/18 03:38:32 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 457.801893] FAULT_INJECTION: forcing a failure. [ 457.801893] name failslab, interval 1, probability 0, space 0, times 0 [ 457.813225] CPU: 0 PID: 28152 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 457.820417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.829760] Call Trace: [ 457.832337] dump_stack+0x194/0x24d [ 457.835950] ? arch_local_irq_restore+0x53/0x53 [ 457.840610] should_fail+0x8c0/0xa40 [ 457.844307] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 457.849393] ? find_next_zero_bit+0xe3/0x110 [ 457.853786] ? trace_hardirqs_off+0x10/0x10 [ 457.858092] ? __lock_is_held+0xb6/0x140 [ 457.862140] ? find_held_lock+0x35/0x1d0 [ 457.866190] ? __lock_is_held+0xb6/0x140 [ 457.870241] ? check_same_owner+0x320/0x320 [ 457.874544] ? rcu_note_context_switch+0x710/0x710 [ 457.879456] ? rcu_note_context_switch+0x710/0x710 [ 457.884376] should_failslab+0xec/0x120 [ 457.888334] __kmalloc+0x63/0x760 [ 457.891774] ? lockdep_init_map+0x9/0x10 [ 457.895814] ? debug_mutex_init+0x2d/0x60 [ 457.899946] ? __list_lru_init+0xcf/0x750 [ 457.904077] __list_lru_init+0xcf/0x750 [ 457.908043] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 457.913908] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 457.918908] ? __lockdep_init_map+0xe4/0x650 [ 457.923297] ? lockdep_init_map+0x9/0x10 [ 457.927343] sget_userns+0x691/0xe40 [ 457.931039] ? set_anon_super+0x20/0x20 [ 457.934996] ? put_filp+0x90/0x90 [ 457.938434] ? destroy_unused_super.part.6+0xd0/0xd0 [ 457.943526] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 457.948523] ? perf_trace_lock+0xd6/0x900 [ 457.952662] ? save_stack+0xa3/0xd0 [ 457.956273] ? kasan_slab_alloc+0x12/0x20 [ 457.960400] ? alloc_pid+0xc1/0xa00 [ 457.964012] ? __radix_tree_replace+0x1af/0x310 [ 457.968668] ? radix_tree_delete+0x30/0x30 [ 457.972886] ? node_tag_clear+0xf2/0x180 [ 457.976943] ? proc_get_inode+0x620/0x620 [ 457.981068] mount_ns+0x6d/0x190 [ 457.984416] proc_mount+0x7a/0x90 [ 457.987850] mount_fs+0x66/0x2d0 [ 457.991204] vfs_kern_mount.part.26+0xc6/0x4a0 [ 457.995768] ? may_umount+0xa0/0xa0 [ 457.999379] ? idr_alloc_cyclic+0x1d6/0x320 [ 458.003695] ? do_raw_spin_trylock+0x190/0x190 [ 458.008258] ? idr_alloc+0x180/0x180 [ 458.011952] kern_mount_data+0x50/0xb0 [ 458.015821] pid_ns_prepare_proc+0x1e/0x80 [ 458.020038] alloc_pid+0x87e/0xa00 [ 458.023563] ? __change_pid+0x400/0x400 [ 458.027516] ? ns_capable_common+0xcf/0x160 [ 458.031827] ? memset+0x31/0x40 [ 458.035088] ? copy_thread_tls+0x268/0x8f0 [ 458.039307] copy_process.part.38+0x2516/0x4bd0 [ 458.043968] ? __cleanup_sighand+0x40/0x40 [ 458.048194] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 458.053368] ? __lock_acquire+0x664/0x3e00 [ 458.057584] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 458.062753] ? perf_trace_lock+0xd6/0x900 [ 458.066886] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 458.072060] ? perf_trace_lock+0xd6/0x900 [ 458.076214] ? mntput_no_expire+0x130/0xa90 [ 458.080523] ? trace_event_raw_event_lock+0x340/0x340 [ 458.085696] ? perf_trace_lock+0xd6/0x900 [ 458.089828] ? lock_acquire+0x1d5/0x580 [ 458.093781] ? trace_hardirqs_off+0x10/0x10 [ 458.098085] ? perf_trace_lock+0xd6/0x900 [ 458.102236] ? find_held_lock+0x35/0x1d0 [ 458.106280] ? perf_trace_lock+0xd6/0x900 [ 458.110414] ? trace_event_raw_event_lock+0x340/0x340 [ 458.115583] ? _parse_integer+0x140/0x140 [ 458.119717] ? trace_hardirqs_off+0x10/0x10 [ 458.124024] ? get_pid_task+0x93/0x140 [ 458.127895] ? perf_trace_lock+0xd6/0x900 [ 458.132033] ? find_held_lock+0x35/0x1d0 [ 458.136082] ? __f_unlock_pos+0x19/0x20 [ 458.140042] ? lock_downgrade+0x980/0x980 [ 458.144166] ? get_pid_task+0xbc/0x140 [ 458.148042] ? proc_fail_nth_write+0x9b/0x1d0 [ 458.152518] ? map_files_get_link+0x3a0/0x3a0 [ 458.157000] _do_fork+0x1f7/0xf70 [ 458.160446] ? fork_idle+0x2d0/0x2d0 [ 458.164143] ? wait_for_completion+0x770/0x770 [ 458.168725] ? __sb_end_write+0xa0/0xd0 [ 458.172681] ? fput+0xd2/0x140 [ 458.175859] ? SyS_write+0x184/0x220 [ 458.179556] ? SyS_read+0x220/0x220 [ 458.183167] SyS_clone+0x37/0x50 [ 458.186512] ? sys_vfork+0x30/0x30 [ 458.190039] do_syscall_64+0x281/0x940 [ 458.193908] ? vmalloc_sync_all+0x30/0x30 [ 458.198039] ? _raw_spin_unlock_irq+0x27/0x70 [ 458.202519] ? finish_task_switch+0x1c1/0x7e0 [ 458.206995] ? syscall_return_slowpath+0x550/0x550 [ 458.211908] ? syscall_return_slowpath+0x2ac/0x550 [ 458.216819] ? prepare_exit_to_usermode+0x350/0x350 [ 458.221821] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 458.227171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.231998] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 458.237172] RIP: 0033:0x454e79 [ 458.240344] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:33 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 458.248037] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 458.255289] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 458.262538] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 458.269787] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 458.277037] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000016 2033/05/18 03:38:33 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, r3) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000780)="9445e0fe4b381dc08c9cf11747395e4dd9434b32fc8dad81887f8a61ac22eaf565803bb4a959b2542bf0b0e10d1693152e0c719372c37b919dfa90b9881ab9c27fd27a2fe41f4b01fef3600ed1ce56", &(0x7f00000006c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="7300020d177487c41098be1533b715f1bd3e8f3fe10ce0620da6d3bdf06ae78012abfc5fb5bfdae6dc4a648c67ea9dad7f89db28158d7031c4e88530ec9f4bd99302f715e3ebfd8d07499594681599ccab3a16de074ac63110b113f4b576086372558f2eaa87d3dc38e7b5d2df41bc13a3760c3c9f9cf3f4aa09240092acd9950b8e5d5213fbc2e4c0964045413815fcd983598d3f2b21f12ed86d9b2b62de84eb6f6e2bf73cd142ff7ebdb6000d6760c532eed8b75c7fb0ee2728c8b6deb7cd3689f8b7"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x10000001, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x3}, &(0x7f0000000080)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0xeffffffffc000000) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 458.301929] __report_access: 8 callbacks suppressed [ 458.301938] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28160] [ 458.328690] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28165] 2033/05/18 03:38:33 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r8, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 458.358564] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28169] 2033/05/18 03:38:33 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000b00)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r5, &(0x7f0000000800)='syzkaller\x00', 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x40000000401, 0x3, 0x4}]}, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x6, 0xffffffff, 0x100000001, 0x6, 0x3}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000a00)={r11, @in6={{0xa, 0x4e24, 0x3, @loopback={0x0, 0x1}}}, [0x4, 0x3f, 0x7fffffff, 0x3, 0x5, 0x3, 0x2, 0x100000000, 0x4, 0xa760, 0xca49, 0x45, 0x3f, 0x1ff, 0x4]}, &(0x7f0000000480)=0x100) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) r12 = dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r12, 0x6, 0x3, &(0x7f0000000500)=0x142, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 458.447434] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28181] [ 458.474284] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28183] 2033/05/18 03:38:33 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x1) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000b00)=0xfffffffffffffe7b) setreuid(r1, r2) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:33 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) recvfrom(r0, &(0x7f0000000240)=""/124, 0x7c, 0x60, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x3, @loopback=0x7f000001}}, 0x80) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) setsockopt$inet_group_source_req(r5, 0x0, 0x2f, &(0x7f0000000a00)={0xfffffffffffffff9, {{0x2, 0x4e20, @loopback=0x7f000001}}, {{0x2, 0x4e24, @multicast2=0xe0000002}}}, 0x108) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:33 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r8, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:33 executing program 7 (fault-call:10 fault-nth:23): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x100000000, 0x3, 0x1, 0x7}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x80000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) signalfd4(r1, &(0x7f0000001640)={0x200}, 0x8, 0x80800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}, 0x1}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) sched_setscheduler(r3, 0x3, &(0x7f0000000180)=0x9) fchdir(0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x0, 0x5}, 0xc) r5 = creat(&(0x7f0000001840)='./file0\x00', 0xffffffffffffffff) inotify_init1(0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xe7) memfd_create(&(0x7f0000001800)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000001680)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340)={0x0}, &(0x7f0000001380)=0xc) fcntl$setown(r4, 0x8, r6) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000200)={0x80000000}) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f00000017c0)) r7 = gettid() process_vm_writev(r7, &(0x7f0000001100)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f0000001700)=[{&(0x7f0000000040)=""/133, 0x85}, {&(0x7f0000001280)=""/164, 0xa4}, {&(0x7f0000001140)=""/187, 0xbb}, {&(0x7f0000001400)=""/83, 0x53}, {&(0x7f0000001480)=""/8, 0x8}, {&(0x7f00000014c0)=""/177, 0xb1}, {&(0x7f0000001580)=""/161, 0xa1}, {&(0x7f0000001200)=""/114, 0x72}], 0x8, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) [ 458.892126] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28205] [ 458.916794] FAULT_INJECTION: forcing a failure. [ 458.916794] name failslab, interval 1, probability 0, space 0, times 0 [ 458.923369] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 458.928210] CPU: 1 PID: 28206 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 458.945410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.954748] Call Trace: [ 458.957328] dump_stack+0x194/0x24d [ 458.960937] ? arch_local_irq_restore+0x53/0x53 [ 458.965593] should_fail+0x8c0/0xa40 [ 458.969286] ? is_bpf_text_address+0xa4/0x120 [ 458.973764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 458.978847] ? __kernel_text_address+0xd/0x40 [ 458.983325] ? unwind_get_return_address+0x61/0xa0 [ 458.988240] ? find_held_lock+0x35/0x1d0 [ 458.992281] ? __lock_is_held+0xb6/0x140 [ 458.996326] ? check_same_owner+0x320/0x320 [ 459.000629] ? rcu_note_context_switch+0x710/0x710 [ 459.005547] should_failslab+0xec/0x120 [ 459.009502] kmem_cache_alloc_trace+0x4b/0x740 [ 459.014062] ? __kmalloc_node+0x33/0x70 [ 459.018017] ? __kmalloc_node+0x33/0x70 [ 459.021974] ? rcu_read_lock_sched_held+0x108/0x120 [ 459.026971] __memcg_init_list_lru_node+0x169/0x270 [ 459.031966] ? list_lru_add+0x7c0/0x7c0 [ 459.035915] ? __kmalloc_node+0x47/0x70 [ 459.039871] __list_lru_init+0x544/0x750 [ 459.043911] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 459.049775] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 459.054770] ? __lockdep_init_map+0xe4/0x650 [ 459.059258] ? lockdep_init_map+0x9/0x10 [ 459.063299] sget_userns+0x691/0xe40 [ 459.066989] ? set_anon_super+0x20/0x20 [ 459.070950] ? put_filp+0x90/0x90 [ 459.074382] ? destroy_unused_super.part.6+0xd0/0xd0 [ 459.079580] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 459.084570] ? perf_trace_lock+0xd6/0x900 [ 459.088696] ? save_stack+0xa3/0xd0 [ 459.092300] ? kasan_slab_alloc+0x12/0x20 [ 459.096424] ? alloc_pid+0xc1/0xa00 [ 459.100038] ? __radix_tree_replace+0x1af/0x310 [ 459.104685] ? radix_tree_delete+0x30/0x30 [ 459.108897] ? node_tag_clear+0xf2/0x180 [ 459.112941] ? proc_get_inode+0x620/0x620 [ 459.117065] mount_ns+0x6d/0x190 [ 459.120409] proc_mount+0x7a/0x90 [ 459.123841] mount_fs+0x66/0x2d0 [ 459.127189] vfs_kern_mount.part.26+0xc6/0x4a0 [ 459.131750] ? may_umount+0xa0/0xa0 [ 459.135355] ? idr_alloc_cyclic+0x1d6/0x320 [ 459.139655] ? do_raw_spin_trylock+0x190/0x190 [ 459.144217] ? idr_alloc+0x180/0x180 [ 459.147908] kern_mount_data+0x50/0xb0 [ 459.151774] pid_ns_prepare_proc+0x1e/0x80 [ 459.155988] alloc_pid+0x87e/0xa00 [ 459.159513] ? __change_pid+0x400/0x400 [ 459.163467] ? ns_capable_common+0xcf/0x160 [ 459.167775] ? memset+0x31/0x40 [ 459.171035] ? copy_thread_tls+0x268/0x8f0 [ 459.175250] copy_process.part.38+0x2516/0x4bd0 [ 459.179903] ? __cleanup_sighand+0x40/0x40 [ 459.184124] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 459.189297] ? __lock_acquire+0x664/0x3e00 [ 459.193509] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 459.198677] ? perf_trace_lock+0xd6/0x900 [ 459.202809] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 459.207972] ? perf_trace_lock+0xd6/0x900 [ 459.212097] ? mntput_no_expire+0x130/0xa90 [ 459.216401] ? trace_event_raw_event_lock+0x340/0x340 [ 459.221565] ? perf_trace_lock+0xd6/0x900 [ 459.225697] ? lock_acquire+0x1d5/0x580 [ 459.229650] ? trace_hardirqs_off+0x10/0x10 [ 459.233952] ? perf_trace_lock+0xd6/0x900 [ 459.238084] ? find_held_lock+0x35/0x1d0 [ 459.242128] ? perf_trace_lock+0xd6/0x900 [ 459.246264] ? trace_event_raw_event_lock+0x340/0x340 [ 459.251433] ? _parse_integer+0x140/0x140 [ 459.255564] ? trace_hardirqs_off+0x10/0x10 [ 459.259866] ? get_pid_task+0x93/0x140 [ 459.263735] ? perf_trace_lock+0xd6/0x900 [ 459.267868] ? find_held_lock+0x35/0x1d0 [ 459.271914] ? __f_unlock_pos+0x19/0x20 [ 459.275869] ? lock_downgrade+0x980/0x980 [ 459.279992] ? get_pid_task+0xbc/0x140 [ 459.283862] ? proc_fail_nth_write+0x9b/0x1d0 [ 459.288337] ? map_files_get_link+0x3a0/0x3a0 [ 459.292816] _do_fork+0x1f7/0xf70 [ 459.296251] ? fork_idle+0x2d0/0x2d0 [ 459.299944] ? wait_for_completion+0x770/0x770 [ 459.304514] ? __sb_end_write+0xa0/0xd0 [ 459.308465] ? fput+0xd2/0x140 [ 459.311643] ? SyS_write+0x184/0x220 [ 459.315336] ? SyS_read+0x220/0x220 [ 459.318940] SyS_clone+0x37/0x50 [ 459.322283] ? sys_vfork+0x30/0x30 [ 459.325802] do_syscall_64+0x281/0x940 [ 459.329669] ? vmalloc_sync_all+0x30/0x30 [ 459.333796] ? _raw_spin_unlock_irq+0x27/0x70 [ 459.338270] ? finish_task_switch+0x1c1/0x7e0 [ 459.342743] ? syscall_return_slowpath+0x550/0x550 [ 459.347654] ? syscall_return_slowpath+0x2ac/0x550 [ 459.352563] ? prepare_exit_to_usermode+0x350/0x350 [ 459.357565] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 459.362910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.367737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 459.372905] RIP: 0033:0x454e79 [ 459.376071] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 459.383759] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 2033/05/18 03:38:34 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 459.391010] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 459.398364] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 459.405611] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 459.412861] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000017 [ 459.424497] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28209] 2033/05/18 03:38:34 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r8, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:34 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x0, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:34 executing program 4: r0 = open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r2 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r3 = fcntl$getown(r2, 0x9) r4 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000040)) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0xea548bd, 0x1, 0x6, 0x9, 0xffffffffffffff7f}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000680)={r7, 0x9}, &(0x7f00000007c0)=0x8) getsockopt$inet6_tcp_int(r6, 0x6, 0x1f, &(0x7f0000000a80), &(0x7f0000000a40)=0x2e9) r8 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r5, 0x540e, 0x4) close(r5) r9 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000a00)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000ac0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r9) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)) write$cgroup_int(r8, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', r13, r12) ioctl$TCSETAW(r8, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) r14 = dup2(r4, r5) chown(&(0x7f00000002c0)='./file0\x00', r11, r12) setsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r14, 0x6, 0x2, &(0x7f0000000240)={0x7, 0xffffffff80000000, 0x7f, 0x7fffffff}, 0x6) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:34 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="050600a87bba6738c30d35ecf6ebbac74ab1342a485ad5f4d57b62e9684ac7e9a00f37d6d84297c6a28b5ab107417f2617715669764204be9b6e3082ff9a549414407d839591c9018070b0c8a92bf4771377976bca91fea7f3157bde51507366c567aa922d12c767100fd0991182ea999d8dc6c71576d7df78d3184bd3dc7ecb2516b2c0117f925eb23d186819475480eca73b5f8230873610bbf3ae6a"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:34 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 459.523887] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28227] [ 459.553770] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28233] [ 459.560279] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28232] 2033/05/18 03:38:34 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:34 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x0, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="050600a8b07a92"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r11 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt(r11, 0x84, 0x8000000007d, &(0x7f0000000000)=""/8, &(0x7f00007c1ffc)=0x6) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) 2033/05/18 03:38:35 executing program 7 (fault-call:10 fault-nth:24): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:35 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r3 = geteuid() fstat(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_fuseblk_mount(&(0x7f00000007c0)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, r3, r4, 0x4, 0x8, 0x80000) fcntl$getown(r5, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a00)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getgroups(0x6, &(0x7f0000000680)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) fchown(r0, r7, r8) r9 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r9, 0xc0bc5310, &(0x7f0000000040)) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r10, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r11 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x6, 0x3a1400) setsockopt$inet_tcp_TCP_ULP(r11, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) r12 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r9, 0x540e, 0x4) close(r9) r13 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r12, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000580)=[{0x8e, 0x401, 0x7, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r12, &(0x7f0000000c40)=ANY=[@ANYPTR64=&(0x7f0000000980)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64], @ANYPTR64=&(0x7f0000000b00)=ANY=[@ANYBLOB="fc217f86bccb8b777e1d9fb909020ab4f4408e183787797088f09df78a924358ecb3e04beb735d1aec08d0a970afb417d23a504db959ef0142bc287bc9c3d671c179c6fa19ae3e8bfc47391d07f104f835d24ac84c903e831a534e7fe52af90b89ea13cfc22cc1099b620a8e8fd01343b54c66c097fe4d1228c800443b357608cd3503ce974a6ad4a875fb7af5d6cdffd08971e8102bed96ac2c1a3be161fc9b112da2224f0ea0c17e57b652d8250b6b2afa3258ca1633b005848db4155fd50036783469101ced6b", @ANYRES64, @ANYPTR, @ANYRES32=r11, @ANYPTR, @ANYPTR]], @ANYRES64=r0, @ANYRES32, @ANYRES32, @ANYRES16=r6, @ANYRES64=r11, @ANYPTR64=&(0x7f0000000c00)=ANY=[@ANYRES64, @ANYRES16]], 0xac) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r16) ioctl$TCSETAW(r12, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(0xffffffffffffffff, r9) chown(&(0x7f00000002c0)='./file0\x00', r14, r15) setsockopt$bt_l2cap_L2CAP_LM(r12, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r13, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:35 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x0, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) 2033/05/18 03:38:35 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e20}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_matches\x00') poll(&(0x7f0000084ff0)=[{}], 0x20000000000000b5, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) pipe2(&(0x7f0000000100), 0x0) mq_open(&(0x7f0000000640)='-$\x00', 0x0, 0x6, &(0x7f0000664fc0)={0x0, 0x1, 0x9}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000000)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 2033/05/18 03:38:35 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 460.560207] FAULT_INJECTION: forcing a failure. [ 460.560207] name failslab, interval 1, probability 0, space 0, times 0 [ 460.571545] CPU: 0 PID: 28265 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 460.578742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.588105] Call Trace: [ 460.590707] dump_stack+0x194/0x24d [ 460.594347] ? arch_local_irq_restore+0x53/0x53 [ 460.599032] ? __save_stack_trace+0x7e/0xd0 [ 460.603380] should_fail+0x8c0/0xa40 2033/05/18 03:38:35 executing program 6: r0 = userfaultfd(0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={&(0x7f0000230000/0x600000)=nil, 0x600000}) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x3}, 0x8) 2033/05/18 03:38:35 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x0, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 460.607113] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 460.612229] ? kasan_kmalloc+0xad/0xe0 [ 460.616128] ? kmem_cache_alloc_trace+0x136/0x740 [ 460.620985] ? __memcg_init_list_lru_node+0x169/0x270 [ 460.626190] ? __list_lru_init+0x544/0x750 [ 460.630437] ? sget_userns+0x691/0xe40 [ 460.634342] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 460.639112] ? kern_mount_data+0x50/0xb0 [ 460.643183] ? pid_ns_prepare_proc+0x1e/0x80 [ 460.647598] ? alloc_pid+0x87e/0xa00 [ 460.651322] ? copy_process.part.38+0x2516/0x4bd0 [ 460.656180] ? _do_fork+0x1f7/0xf70 [ 460.659823] ? SyS_clone+0x37/0x50 [ 460.663377] ? find_held_lock+0x35/0x1d0 [ 460.667456] ? __lock_is_held+0xb6/0x140 [ 460.671543] ? check_same_owner+0x320/0x320 [ 460.675887] ? rcu_note_context_switch+0x710/0x710 [ 460.680834] should_failslab+0xec/0x120 [ 460.684822] kmem_cache_alloc_trace+0x4b/0x740 [ 460.689413] ? __kmalloc_node+0x33/0x70 [ 460.693396] ? __kmalloc_node+0x33/0x70 [ 460.697382] ? rcu_read_lock_sched_held+0x108/0x120 [ 460.702412] __memcg_init_list_lru_node+0x169/0x270 2033/05/18 03:38:35 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x0, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:35 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 460.707446] ? list_lru_add+0x7c0/0x7c0 [ 460.711436] ? __kmalloc_node+0x47/0x70 [ 460.715431] __list_lru_init+0x544/0x750 [ 460.719509] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 460.725413] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 460.730446] ? __lockdep_init_map+0xe4/0x650 [ 460.734875] ? lockdep_init_map+0x9/0x10 [ 460.738948] sget_userns+0x691/0xe40 [ 460.742685] ? set_anon_super+0x20/0x20 [ 460.746668] ? put_filp+0x90/0x90 [ 460.750134] ? destroy_unused_super.part.6+0xd0/0xd0 [ 460.755251] ? __alloc_pages_slowpath+0x2d10/0x2d10 2033/05/18 03:38:35 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) fchmod(r0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000240)='nr0\x00') write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) waitid(0x0, r7, &(0x7f0000000480), 0x1, &(0x7f00000007c0)) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 460.760280] ? save_stack+0xa3/0xd0 [ 460.763919] ? save_stack+0x43/0xd0 [ 460.767551] ? kasan_slab_alloc+0x12/0x20 [ 460.771702] ? kmem_cache_alloc+0x12e/0x760 [ 460.776025] ? alloc_pid+0xc1/0xa00 [ 460.779668] ? __radix_tree_replace+0x1af/0x310 [ 460.784342] ? radix_tree_delete+0x30/0x30 [ 460.788579] ? node_tag_clear+0xf2/0x180 [ 460.792648] ? proc_get_inode+0x620/0x620 [ 460.796799] mount_ns+0x6d/0x190 [ 460.800175] proc_mount+0x7a/0x90 [ 460.803638] mount_fs+0x66/0x2d0 2033/05/18 03:38:35 executing program 6: unshare(0x8000000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x200, 0x5, 0x200, 0x1, 0x0, 0x8001, 0x0, 0x7f, 0x0}, &(0x7f0000000400)=0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={r0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300)={r1, 0x10000}, &(0x7f0000000340)=0x8) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0xffffffff}) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$inet6(0xa, 0xf, 0x7, &(0x7f0000000600)={0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000880)={0x8001}, 0x4) setresgid(r5, 0x0, r6) chdir(&(0x7f0000000740)='./file0\x00') renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000200)={r4, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000000)={r3, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r10, 0xc00c642d, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r10, 0xc010640b, &(0x7f00000001c0)={r2, r11, 0x1}) r12 = socket$inet6(0xa, 0x0, 0xfffffffffffffff8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000500)=0x14) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f00000008c0)=""/178, 0x100000000}) setsockopt$inet6_IPV6_PKTINFO(r12, 0x29, 0x32, &(0x7f0000000540)={@loopback={0x0, 0x1}}, 0x14) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r9, 0xc00c642e, &(0x7f0000000380)={r8, 0x80000, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000840)={'teql0\x00', 0x1000}) ioctl$DRM_IOCTL_GEM_CLOSE(r10, 0x40086409, &(0x7f0000000080)={r11}) unshare(0x8000400) ioctl$DRM_IOCTL_GEM_FLINK(r13, 0xc008640a, &(0x7f0000000480)={0x0, r2}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x7f, @broadcast=0xffffffff, 0x4e22, 0x3, 'sh\x00', 0x31, 0x8}, 0x2c) [ 460.807015] vfs_kern_mount.part.26+0xc6/0x4a0 [ 460.811603] ? may_umount+0xa0/0xa0 [ 460.815240] ? idr_alloc_cyclic+0x1d6/0x320 [ 460.819568] ? do_raw_spin_trylock+0x190/0x190 [ 460.824154] ? idr_alloc+0x180/0x180 [ 460.827874] kern_mount_data+0x50/0xb0 [ 460.831762] pid_ns_prepare_proc+0x1e/0x80 [ 460.835999] alloc_pid+0x87e/0xa00 [ 460.839541] ? __change_pid+0x400/0x400 [ 460.843516] ? ns_capable_common+0xcf/0x160 [ 460.847845] ? memset+0x31/0x40 [ 460.851125] ? copy_thread_tls+0x268/0x8f0 [ 460.855365] copy_process.part.38+0x2516/0x4bd0 [ 460.860048] ? __cleanup_sighand+0x40/0x40 [ 460.864301] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 460.869500] ? __lock_acquire+0x664/0x3e00 [ 460.873728] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 460.878910] ? environ_open+0x80/0x80 [ 460.882709] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 460.887891] ? print_irqtrace_events+0x270/0x270 [ 460.892635] ? __lock_is_held+0xb6/0x140 [ 460.896679] ? __account_cfs_rq_runtime+0x600/0x600 [ 460.901678] ? lock_acquire+0x1d5/0x580 [ 460.905635] ? trace_hardirqs_off+0x10/0x10 [ 460.909940] ? trace_hardirqs_off+0x10/0x10 [ 460.914242] ? __lock_acquire+0x664/0x3e00 [ 460.918457] ? check_same_owner+0x320/0x320 [ 460.922763] ? find_held_lock+0x35/0x1d0 [ 460.926812] ? _parse_integer+0xe9/0x140 [ 460.930860] ? trace_hardirqs_off+0x10/0x10 [ 460.935162] ? _parse_integer+0x140/0x140 [ 460.939297] ? trace_hardirqs_off+0x10/0x10 [ 460.943601] ? get_pid_task+0x93/0x140 [ 460.947473] ? lock_downgrade+0x980/0x980 [ 460.951606] ? find_held_lock+0x35/0x1d0 [ 460.955659] ? __f_unlock_pos+0x19/0x20 [ 460.959614] ? lock_downgrade+0x980/0x980 [ 460.963748] ? get_pid_task+0xbc/0x140 [ 460.967625] ? proc_fail_nth_write+0x9b/0x1d0 [ 460.972104] ? map_files_get_link+0x3a0/0x3a0 [ 460.976589] _do_fork+0x1f7/0xf70 [ 460.980035] ? fork_idle+0x2d0/0x2d0 [ 460.983730] ? wait_for_completion+0x770/0x770 [ 460.988295] ? __lock_is_held+0xb6/0x140 [ 460.992346] ? __sb_end_write+0xa0/0xd0 [ 460.996303] ? fput+0xd2/0x140 [ 460.999475] ? SyS_write+0x184/0x220 [ 461.003176] ? SyS_read+0x220/0x220 [ 461.006788] SyS_clone+0x37/0x50 [ 461.010136] ? sys_vfork+0x30/0x30 [ 461.013658] do_syscall_64+0x281/0x940 [ 461.017527] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 461.023050] ? syscall_return_slowpath+0x550/0x550 [ 461.027958] ? syscall_return_slowpath+0x2ac/0x550 [ 461.032874] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 461.038220] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.043051] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.048219] RIP: 0033:0x454e79 [ 461.051386] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:35 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 461.059078] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 461.066328] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 461.073576] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 461.080825] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 461.088073] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000018 2033/05/18 03:38:36 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x0, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:36 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = syz_open_procfs(0x0, &(0x7f00006e7ff5)='net/ptype\x00') preadv(r4, &(0x7f00005e9000)=[{&(0x7f00000000c0)=""/182, 0xb6}], 0x1, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000001c0), &(0x7f00000000c0)=0x68) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x4, 0x5, 0x0, 0x1, 0x0, 0x9, 0x80980, 0x0, 0x0, 0x12, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x5, 0x7, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x6, 0xab4a, 0x9, 0xff, 0x8, 0x3, 0x7, 0x7, 0x0, 0x0, 0x8, 0x0, 0x773, 0x5, @perf_config_ext, 0x800, 0x7fffffff, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f00001b3000)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000200)=0x5) r8 = epoll_create1(0x0) ioctl$TIOCGPTPEER(r7, 0x5441, 0x4) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r6, &(0x7f0000dc0000)) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r0, &(0x7f0000000300)) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, 0xffffffffffffffff) ftruncate(r0, 0x9) 2033/05/18 03:38:36 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:36 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000a00)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000b00)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0xa, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000440)={r1, 0x5}, 0x8) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = semget(0x0, 0x3, 0x440) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000bc0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000d40)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d80)={0x0, 0x0, 0x0}, &(0x7f0000000dc0)=0xc) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000e00)={{0xffff, r3, r4, r5, r6, 0x20, 0x8000}, 0x100000000, 0x9, 0x5}) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) r7 = gettid() syz_open_procfs(r7, &(0x7f0000000380)='nr \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 2033/05/18 03:38:36 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000007c0)="3b70bce61bffa3b8a9e6e2b2d5ee15cb38ea51bfa19bd22a3965fe6af5efcc2bcc6c18925a3cf18f659fde33e4e381872838f1e96425fd700f5d13a14eef5b5afcd66879fbcc011d04df25b59da1ea319aa18616ed1f691fff4a2545c3b5b49e0c2a", 0x62, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='trusted\x00', &(0x7f0000000680)='logon\x00') r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:36 executing program 7 (fault-call:10 fault-nth:25): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:36 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:36 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="050600a97b5711b62952d10dba2618792ea5e68aab7e7ffd6c82c53937edc4d75eb5b2c8e537a0f766584ee8857b93f9c28c97e7c5c56bc9dfcfdf14b31398dbece80670d2be47b628f302d11484793353310b7b9fb187bcbbb2c69c8b0349e2cd4acce05cb0"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 461.751973] FAULT_INJECTION: forcing a failure. [ 461.751973] name failslab, interval 1, probability 0, space 0, times 0 [ 461.763357] CPU: 0 PID: 28318 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 461.770556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.779924] Call Trace: [ 461.782537] dump_stack+0x194/0x24d [ 461.786184] ? arch_local_irq_restore+0x53/0x53 [ 461.790872] ? __save_stack_trace+0x7e/0xd0 [ 461.795225] should_fail+0x8c0/0xa40 [ 461.798960] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 461.804081] ? kasan_kmalloc+0xad/0xe0 [ 461.807995] ? kmem_cache_alloc_trace+0x136/0x740 [ 461.812848] ? __memcg_init_list_lru_node+0x169/0x270 [ 461.818024] ? __list_lru_init+0x544/0x750 [ 461.822242] ? sget_userns+0x691/0xe40 [ 461.826115] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 461.830852] ? kern_mount_data+0x50/0xb0 [ 461.834893] ? pid_ns_prepare_proc+0x1e/0x80 [ 461.839279] ? alloc_pid+0x87e/0xa00 [ 461.842977] ? copy_process.part.38+0x2516/0x4bd0 [ 461.847800] ? _do_fork+0x1f7/0xf70 [ 461.851403] ? SyS_clone+0x37/0x50 [ 461.854931] ? find_held_lock+0x35/0x1d0 [ 461.858980] ? __lock_is_held+0xb6/0x140 [ 461.863039] ? check_same_owner+0x320/0x320 [ 461.867344] ? rcu_note_context_switch+0x710/0x710 [ 461.872263] should_failslab+0xec/0x120 [ 461.876219] kmem_cache_alloc_trace+0x4b/0x740 [ 461.880778] ? __kmalloc_node+0x33/0x70 [ 461.884740] __memcg_init_list_lru_node+0x169/0x270 [ 461.889740] ? list_lru_add+0x7c0/0x7c0 [ 461.893696] ? __kmalloc_node+0x47/0x70 [ 461.897654] __list_lru_init+0x544/0x750 [ 461.901702] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 461.907575] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 461.912577] ? __lockdep_init_map+0xe4/0x650 [ 461.916972] ? lockdep_init_map+0x9/0x10 [ 461.921022] sget_userns+0x691/0xe40 [ 461.924717] ? set_anon_super+0x20/0x20 [ 461.928681] ? put_filp+0x90/0x90 [ 461.932119] ? destroy_unused_super.part.6+0xd0/0xd0 [ 461.937208] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 461.942204] ? perf_trace_lock+0xd6/0x900 [ 461.946338] ? save_stack+0xa3/0xd0 [ 461.949946] ? kasan_slab_alloc+0x12/0x20 [ 461.954072] ? alloc_pid+0xc1/0xa00 [ 461.957686] ? __radix_tree_replace+0x1af/0x310 [ 461.962337] ? radix_tree_delete+0x30/0x30 [ 461.966553] ? node_tag_clear+0xf2/0x180 [ 461.970606] ? proc_get_inode+0x620/0x620 [ 461.974736] mount_ns+0x6d/0x190 [ 461.978090] proc_mount+0x7a/0x90 [ 461.981528] mount_fs+0x66/0x2d0 [ 461.984881] vfs_kern_mount.part.26+0xc6/0x4a0 [ 461.989444] ? may_umount+0xa0/0xa0 [ 461.993053] ? idr_alloc_cyclic+0x1d6/0x320 [ 461.997356] ? do_raw_spin_trylock+0x190/0x190 [ 462.001919] ? idr_alloc+0x180/0x180 [ 462.005620] kern_mount_data+0x50/0xb0 [ 462.009489] pid_ns_prepare_proc+0x1e/0x80 [ 462.013707] alloc_pid+0x87e/0xa00 [ 462.017231] ? __change_pid+0x400/0x400 [ 462.021184] ? ns_capable_common+0xcf/0x160 [ 462.025491] ? memset+0x31/0x40 [ 462.028756] ? copy_thread_tls+0x268/0x8f0 [ 462.032980] copy_process.part.38+0x2516/0x4bd0 [ 462.037654] ? __cleanup_sighand+0x40/0x40 [ 462.041885] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 462.047062] ? __lock_acquire+0x664/0x3e00 [ 462.051282] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 462.056454] ? perf_trace_lock+0xd6/0x900 [ 462.060594] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 462.065766] ? perf_trace_lock+0xd6/0x900 [ 462.069892] ? mntput_no_expire+0x130/0xa90 [ 462.074199] ? trace_event_raw_event_lock+0x340/0x340 [ 462.079369] ? perf_trace_lock+0xd6/0x900 [ 462.083503] ? lock_acquire+0x1d5/0x580 [ 462.087459] ? trace_hardirqs_off+0x10/0x10 [ 462.091765] ? perf_trace_lock+0xd6/0x900 [ 462.095903] ? find_held_lock+0x35/0x1d0 [ 462.099947] ? perf_trace_lock+0xd6/0x900 [ 462.104079] ? trace_event_raw_event_lock+0x340/0x340 [ 462.109249] ? _parse_integer+0x140/0x140 [ 462.113381] ? trace_hardirqs_off+0x10/0x10 [ 462.117686] ? get_pid_task+0x93/0x140 [ 462.121555] ? perf_trace_lock+0xd6/0x900 [ 462.125691] ? find_held_lock+0x35/0x1d0 [ 462.129738] ? __f_unlock_pos+0x19/0x20 [ 462.133695] ? lock_downgrade+0x980/0x980 [ 462.137826] ? get_pid_task+0xbc/0x140 [ 462.141695] ? proc_fail_nth_write+0x9b/0x1d0 [ 462.146170] ? map_files_get_link+0x3a0/0x3a0 [ 462.150656] _do_fork+0x1f7/0xf70 [ 462.154096] ? fork_idle+0x2d0/0x2d0 [ 462.157793] ? wait_for_completion+0x770/0x770 [ 462.162376] ? __sb_end_write+0xa0/0xd0 [ 462.166333] ? fput+0xd2/0x140 [ 462.169509] ? SyS_write+0x184/0x220 [ 462.173205] ? SyS_read+0x220/0x220 [ 462.176817] SyS_clone+0x37/0x50 [ 462.180163] ? sys_vfork+0x30/0x30 [ 462.183688] do_syscall_64+0x281/0x940 [ 462.187554] ? vmalloc_sync_all+0x30/0x30 [ 462.191685] ? _raw_spin_unlock_irq+0x27/0x70 [ 462.196164] ? finish_task_switch+0x1c1/0x7e0 [ 462.200642] ? syscall_return_slowpath+0x550/0x550 [ 462.205552] ? syscall_return_slowpath+0x2ac/0x550 [ 462.210461] ? prepare_exit_to_usermode+0x350/0x350 [ 462.215460] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 462.220809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.225640] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.230809] RIP: 0033:0x454e79 [ 462.233976] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 462.241668] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 2033/05/18 03:38:37 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r1, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000540)={r8, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:37 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 462.248917] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 462.256166] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 462.263415] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 462.270666] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000019 2033/05/18 03:38:37 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x0, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:37 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="8a1d360100"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x24e) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:37 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x0, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:37 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r1, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000540)={r8, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:37 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x100000000, 0x3, 0x1, 0x7}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x80000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) signalfd4(r1, &(0x7f0000001640)={0x200}, 0x8, 0x80800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}, 0x1}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) fchdir(0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x0, 0x5}, 0xc) r4 = creat(&(0x7f0000001840)='./file0\x00', 0x0) inotify_init1(0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xe7) memfd_create(&(0x7f0000001800)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x0) write$cgroup_pid(r4, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000001680)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340)={0x0}, &(0x7f0000001380)=0xc) fcntl$setown(r3, 0x8, r5) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000200)={0x80000000}) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f00000017c0)) r6 = gettid() process_vm_writev(r6, &(0x7f0000001100)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f0000001700)=[{&(0x7f0000000040)=""/133, 0x85}, {&(0x7f0000001280)=""/164, 0xa4}, {&(0x7f0000001140)=""/187, 0xbb}, {&(0x7f0000001400)=""/83, 0x53}, {&(0x7f0000001480)=""/8, 0x8}, {&(0x7f00000014c0)=""/177, 0xb1}, {&(0x7f0000001580)=""/161, 0xa1}, {&(0x7f0000001200)=""/114, 0x72}], 0x8, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) 2033/05/18 03:38:37 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:37 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) futex(&(0x7f0000000240)=0x1, 0x3, 0x0, &(0x7f0000000480)={r10, r11+10000000}, &(0x7f0000000680)=0x2, 0x2) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:37 executing program 7 (fault-call:10 fault-nth:26): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 462.494726] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 462.582666] FAULT_INJECTION: forcing a failure. [ 462.582666] name failslab, interval 1, probability 0, space 0, times 0 [ 462.594126] CPU: 0 PID: 28363 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 462.601317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.610666] Call Trace: [ 462.613251] dump_stack+0x194/0x24d [ 462.616873] ? arch_local_irq_restore+0x53/0x53 [ 462.621532] ? __save_stack_trace+0x7e/0xd0 [ 462.625849] should_fail+0x8c0/0xa40 [ 462.629555] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 462.634663] ? kasan_kmalloc+0xad/0xe0 [ 462.638563] ? kmem_cache_alloc_trace+0x136/0x740 [ 462.643415] ? __memcg_init_list_lru_node+0x169/0x270 [ 462.648603] ? __list_lru_init+0x544/0x750 [ 462.652834] ? sget_userns+0x691/0xe40 [ 462.657214] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 462.661962] ? kern_mount_data+0x50/0xb0 [ 462.666014] ? pid_ns_prepare_proc+0x1e/0x80 [ 462.670415] ? alloc_pid+0x87e/0xa00 [ 462.674124] ? copy_process.part.38+0x2516/0x4bd0 [ 462.678952] ? _do_fork+0x1f7/0xf70 [ 462.682567] ? SyS_clone+0x37/0x50 [ 462.686105] ? find_held_lock+0x35/0x1d0 [ 462.690153] ? __lock_is_held+0xb6/0x140 [ 462.694203] ? check_same_owner+0x320/0x320 [ 462.698513] ? rcu_note_context_switch+0x710/0x710 [ 462.703434] should_failslab+0xec/0x120 [ 462.707429] kmem_cache_alloc_trace+0x4b/0x740 [ 462.712012] ? __kmalloc_node+0x33/0x70 [ 462.715981] ? __kmalloc_node+0x33/0x70 [ 462.719945] ? rcu_read_lock_sched_held+0x108/0x120 [ 462.724951] __memcg_init_list_lru_node+0x169/0x270 [ 462.729964] ? list_lru_add+0x7c0/0x7c0 [ 462.733933] ? __kmalloc_node+0x47/0x70 [ 462.737895] __list_lru_init+0x544/0x750 [ 462.741939] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 462.747807] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 462.752804] ? __lockdep_init_map+0xe4/0x650 [ 462.757192] ? lockdep_init_map+0x9/0x10 [ 462.761234] sget_userns+0x691/0xe40 [ 462.764930] ? set_anon_super+0x20/0x20 [ 462.768885] ? put_filp+0x90/0x90 [ 462.772317] ? destroy_unused_super.part.6+0xd0/0xd0 [ 462.777404] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 462.782405] ? save_stack+0xa3/0xd0 [ 462.786019] ? save_stack+0x43/0xd0 [ 462.789635] ? kasan_slab_alloc+0x12/0x20 [ 462.793773] ? kmem_cache_alloc+0x12e/0x760 [ 462.798079] ? alloc_pid+0xc1/0xa00 [ 462.801698] ? __radix_tree_replace+0x1af/0x310 [ 462.806344] ? radix_tree_delete+0x30/0x30 [ 462.810557] ? node_tag_clear+0xf2/0x180 [ 462.814615] ? proc_get_inode+0x620/0x620 [ 462.818752] mount_ns+0x6d/0x190 [ 462.822099] proc_mount+0x7a/0x90 [ 462.825531] mount_fs+0x66/0x2d0 [ 462.828882] vfs_kern_mount.part.26+0xc6/0x4a0 [ 462.833448] ? may_umount+0xa0/0xa0 [ 462.837059] ? idr_alloc_cyclic+0x1d6/0x320 [ 462.841363] ? do_raw_spin_trylock+0x190/0x190 [ 462.845926] ? idr_alloc+0x180/0x180 [ 462.849629] kern_mount_data+0x50/0xb0 [ 462.853498] pid_ns_prepare_proc+0x1e/0x80 [ 462.857714] alloc_pid+0x87e/0xa00 [ 462.861237] ? __change_pid+0x400/0x400 [ 462.865190] ? ns_capable_common+0xcf/0x160 [ 462.869496] ? memset+0x31/0x40 [ 462.872758] ? copy_thread_tls+0x268/0x8f0 [ 462.876975] copy_process.part.38+0x2516/0x4bd0 [ 462.881633] ? __cleanup_sighand+0x40/0x40 [ 462.885857] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 462.891040] ? __lock_acquire+0x664/0x3e00 [ 462.895263] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 462.900439] ? environ_open+0x80/0x80 [ 462.904235] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 462.909406] ? __lock_acquire+0x664/0x3e00 [ 462.913635] ? mntput_no_expire+0x130/0xa90 [ 462.917961] ? print_irqtrace_events+0x270/0x270 [ 462.922697] ? trace_hardirqs_off+0x10/0x10 [ 462.926995] ? lock_release+0xa40/0xa40 [ 462.930955] ? lock_acquire+0x1d5/0x580 [ 462.934908] ? trace_hardirqs_off+0x10/0x10 [ 462.939209] ? trace_hardirqs_off+0x10/0x10 [ 462.943512] ? __lock_acquire+0x664/0x3e00 [ 462.947733] ? check_same_owner+0x320/0x320 [ 462.952049] ? find_held_lock+0x35/0x1d0 [ 462.956096] ? _parse_integer+0xe9/0x140 [ 462.960139] ? trace_hardirqs_off+0x10/0x10 [ 462.964441] ? _parse_integer+0x140/0x140 [ 462.968572] ? trace_hardirqs_off+0x10/0x10 [ 462.972887] ? get_pid_task+0x93/0x140 [ 462.976754] ? lock_downgrade+0x980/0x980 [ 462.980881] ? find_held_lock+0x35/0x1d0 [ 462.984927] ? __f_unlock_pos+0x19/0x20 [ 462.988881] ? lock_downgrade+0x980/0x980 [ 462.993007] ? get_pid_task+0xbc/0x140 [ 462.996882] ? proc_fail_nth_write+0x9b/0x1d0 [ 463.001353] ? map_files_get_link+0x3a0/0x3a0 [ 463.005830] _do_fork+0x1f7/0xf70 [ 463.009263] ? fork_idle+0x2d0/0x2d0 [ 463.012962] ? wait_for_completion+0x770/0x770 [ 463.017528] ? __lock_is_held+0xb6/0x140 [ 463.021573] ? __sb_end_write+0xa0/0xd0 [ 463.025523] ? fput+0xd2/0x140 [ 463.028694] ? SyS_write+0x184/0x220 [ 463.032386] ? SyS_read+0x220/0x220 [ 463.036001] SyS_clone+0x37/0x50 [ 463.039364] ? sys_vfork+0x30/0x30 [ 463.042892] do_syscall_64+0x281/0x940 [ 463.046765] ? vmalloc_sync_all+0x30/0x30 [ 463.050894] ? _raw_spin_unlock_irq+0x27/0x70 [ 463.055368] ? finish_task_switch+0x1c1/0x7e0 [ 463.059846] ? syscall_return_slowpath+0x550/0x550 [ 463.064755] ? syscall_return_slowpath+0x2ac/0x550 [ 463.069663] ? prepare_exit_to_usermode+0x350/0x350 [ 463.074675] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 463.080039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 463.084887] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 463.090067] RIP: 0033:0x454e79 [ 463.093232] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 463.100918] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 463.108165] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 463.115414] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 463.122682] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 463.129955] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001a 2033/05/18 03:38:38 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050640a8c1"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x0, 0x6, 0x6, 0x9, 0xffffffff, 0xffffffff7ffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:38 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r1, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000540)={r8, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:38 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:38 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x0, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:38 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:38 executing program 6: r0 = socket$inet6(0xa, 0x2000000802, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80}}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vga_arbiter\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000a80)={0x0, 0x0, 0x7, 0x0, 0x3f, 0xffffffff, 0x0, 0x3}, &(0x7f0000000ac0)=0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)}, &(0x7f0000000fc0)=0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000001040)=0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)="6664001a000000") getdents64(r3, &(0x7f00000004c0)=""/189, 0xabf70f75d9c5624) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000009c0)=ANY=[]) sendmmsg$inet_sctp(r1, &(0x7f00000011c0)=[{&(0x7f00000004c0)=@in6={0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c, &(0x7f0000000a00)=[{&(0x7f0000000500)="cc4decf50ef8c536ec1bb63b67f156a8fa9b945ae9c17f65b748f3a4f35242de2c4bbdacb7502e88a257edc451e95fdd64dab5c48d36c7864429ee7f9874390d0b70", 0x42}], 0x1, &(0x7f0000000b00), 0x0, 0x800}], 0x1, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) getuid() getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2}, &(0x7f0000000780)=0x8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000480)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x280000000000000, 0x6, 0x3}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff8}, &(0x7f00000002c0)=0x14) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00000cc000/0x4000)=nil) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r4, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{&(0x7f0000000140)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001640), 0x0, &(0x7f00000016c0)=""/118, 0x76}}, {{&(0x7f0000001840)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002d00), 0x0, &(0x7f0000002f80)=""/210, 0xd2}}], 0x2, 0x0, &(0x7f0000001b00)={0x0, 0x989680}) recvfrom(r4, &(0x7f0000000000)=""/101, 0xfffffeb9, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001a00)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000073c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000380), 0x0, 0xbe22d93eb7edffcf}, 0x3}, {{&(0x7f0000005b80)=@l2={0x1f, 0x800, {0xfffffffffffffffa, 0x1fffe00, 0x0, 0xffffffffffffff80, 0x0, 0x7}, 0x0, 0x1000}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000005c00)="b61b07b381bede1089713c84c996235904251827359c566e83f672bc3dd4daf0b3ebcd471ddc0933da1fa5eff46a9bc8dad0ce2ed41f3562ac4afc9c263400e181cbf6711888c5a318fa1231327fd6a5cafd4d7ae5183b252bba9a427ea1686b71eefb01ce6c3f176ced17443c92db1bd8be264bc854cb1a32118e3172284787965f2214d015af3312dd2912650e050414700f285e4171927ef36222b667aa8d24423e4ddf14a0568ddb201abcb247fbfedc517a06bc16e560d41f83b9f01d574437a4be8be87bebddd3eba7a51b55bb73d8c395048dd29d2c78e32efc523203b44a9bbac66dbe446ce3e102b773da911169d251453e", 0xf6}], 0x1, &(0x7f0000005e80), 0x0, 0x40001}, 0x4b}], 0x2, 0x4000000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000076c0)={0x0, 0x0, 0xfffffffffffffff7}, &(0x7f0000007700)=0x8) getpgid(0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000340)=0x18) 2033/05/18 03:38:38 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000a00)={0x7, 0x4}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000a80)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000ac0)=0x0) syz_open_procfs(r1, &(0x7f0000000a40)='ns\x00') 2033/05/18 03:38:38 executing program 7 (fault-call:10 fault-nth:27): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 463.551440] __report_access: 22 callbacks suppressed [ 463.551450] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28375] [ 463.553923] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28384] [ 463.580257] FAULT_INJECTION: forcing a failure. [ 463.580257] name failslab, interval 1, probability 0, space 0, times 0 [ 463.591790] CPU: 1 PID: 28382 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 2033/05/18 03:38:38 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 463.598993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.608366] Call Trace: [ 463.610975] dump_stack+0x194/0x24d [ 463.614624] ? arch_local_irq_restore+0x53/0x53 [ 463.619312] ? __save_stack_trace+0x7e/0xd0 [ 463.623658] should_fail+0x8c0/0xa40 [ 463.627392] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 463.632511] ? kasan_kmalloc+0xad/0xe0 [ 463.636413] ? kmem_cache_alloc_trace+0x136/0x740 [ 463.640524] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28391] [ 463.641261] ? __memcg_init_list_lru_node+0x169/0x270 [ 463.641273] ? __list_lru_init+0x544/0x750 [ 463.641284] ? sget_userns+0x691/0xe40 [ 463.641298] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 463.641307] ? kern_mount_data+0x50/0xb0 [ 463.641316] ? pid_ns_prepare_proc+0x1e/0x80 [ 463.641330] ? alloc_pid+0x87e/0xa00 [ 463.680865] ? copy_process.part.38+0x2516/0x4bd0 [ 463.685689] ? _do_fork+0x1f7/0xf70 [ 463.689294] ? SyS_clone+0x37/0x50 [ 463.692816] ? find_held_lock+0x35/0x1d0 [ 463.696863] ? __lock_is_held+0xb6/0x140 [ 463.700913] ? check_same_owner+0x320/0x320 [ 463.705234] ? rcu_note_context_switch+0x710/0x710 [ 463.710152] should_failslab+0xec/0x120 [ 463.714114] kmem_cache_alloc_trace+0x4b/0x740 [ 463.718677] ? __kmalloc_node+0x33/0x70 [ 463.722629] ? __kmalloc_node+0x33/0x70 [ 463.726582] ? rcu_read_lock_sched_held+0x108/0x120 [ 463.731585] __memcg_init_list_lru_node+0x169/0x270 [ 463.736586] ? list_lru_add+0x7c0/0x7c0 [ 463.740540] ? __kmalloc_node+0x47/0x70 [ 463.744499] __list_lru_init+0x544/0x750 [ 463.748544] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 463.754410] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 463.759404] ? __lockdep_init_map+0xe4/0x650 [ 463.763795] ? lockdep_init_map+0x9/0x10 [ 463.767838] sget_userns+0x691/0xe40 [ 463.771528] ? set_anon_super+0x20/0x20 [ 463.775484] ? put_filp+0x90/0x90 [ 463.778920] ? destroy_unused_super.part.6+0xd0/0xd0 [ 463.784008] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 463.789008] ? perf_trace_lock+0xd6/0x900 [ 463.793144] ? save_stack+0xa3/0xd0 [ 463.796754] ? kasan_slab_alloc+0x12/0x20 [ 463.800879] ? alloc_pid+0xc1/0xa00 [ 463.804492] ? __radix_tree_replace+0x1af/0x310 [ 463.809141] ? radix_tree_delete+0x30/0x30 [ 463.813353] ? node_tag_clear+0xf2/0x180 [ 463.817400] ? proc_get_inode+0x620/0x620 [ 463.821530] mount_ns+0x6d/0x190 [ 463.824879] proc_mount+0x7a/0x90 [ 463.828314] mount_fs+0x66/0x2d0 [ 463.831666] vfs_kern_mount.part.26+0xc6/0x4a0 [ 463.836229] ? may_umount+0xa0/0xa0 [ 463.839837] ? idr_alloc_cyclic+0x1d6/0x320 [ 463.844140] ? do_raw_spin_trylock+0x190/0x190 [ 463.848702] ? idr_alloc+0x180/0x180 [ 463.852396] kern_mount_data+0x50/0xb0 [ 463.856262] pid_ns_prepare_proc+0x1e/0x80 [ 463.860475] alloc_pid+0x87e/0xa00 [ 463.863998] ? __change_pid+0x400/0x400 [ 463.867953] ? ns_capable_common+0xcf/0x160 [ 463.872262] ? memset+0x31/0x40 [ 463.875522] ? copy_thread_tls+0x268/0x8f0 [ 463.879743] copy_process.part.38+0x2516/0x4bd0 [ 463.884400] ? __cleanup_sighand+0x40/0x40 [ 463.888627] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 463.893800] ? __lock_acquire+0x664/0x3e00 [ 463.898023] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 463.903191] ? environ_open+0x80/0x80 [ 463.906981] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 463.912149] ? __lock_acquire+0x664/0x3e00 [ 463.916364] ? mntput_no_expire+0x130/0xa90 [ 463.920670] ? print_irqtrace_events+0x270/0x270 [ 463.925406] ? trace_hardirqs_off+0x10/0x10 [ 463.929705] ? lock_release+0xa40/0xa40 [ 463.933664] ? lock_acquire+0x1d5/0x580 [ 463.937621] ? trace_hardirqs_off+0x10/0x10 [ 463.941926] ? trace_hardirqs_off+0x10/0x10 [ 463.946235] ? __lock_acquire+0x664/0x3e00 [ 463.950452] ? check_same_owner+0x320/0x320 [ 463.954759] ? find_held_lock+0x35/0x1d0 [ 463.958806] ? _parse_integer+0xe9/0x140 [ 463.962853] ? trace_hardirqs_off+0x10/0x10 [ 463.967160] ? _parse_integer+0x140/0x140 [ 463.971293] ? trace_hardirqs_off+0x10/0x10 [ 463.975603] ? get_pid_task+0x93/0x140 [ 463.979470] ? lock_downgrade+0x980/0x980 [ 463.983602] ? find_held_lock+0x35/0x1d0 [ 463.987649] ? __f_unlock_pos+0x19/0x20 [ 463.991605] ? lock_downgrade+0x980/0x980 [ 463.995734] ? get_pid_task+0xbc/0x140 [ 463.999608] ? proc_fail_nth_write+0x9b/0x1d0 [ 464.004085] ? map_files_get_link+0x3a0/0x3a0 [ 464.008574] _do_fork+0x1f7/0xf70 [ 464.012014] ? fork_idle+0x2d0/0x2d0 [ 464.015713] ? wait_for_completion+0x770/0x770 [ 464.020279] ? __lock_is_held+0xb6/0x140 [ 464.024335] ? __sb_end_write+0xa0/0xd0 [ 464.028290] ? fput+0xd2/0x140 [ 464.031462] ? SyS_write+0x184/0x220 [ 464.035159] ? SyS_read+0x220/0x220 [ 464.038770] SyS_clone+0x37/0x50 [ 464.042115] ? sys_vfork+0x30/0x30 [ 464.045638] do_syscall_64+0x281/0x940 [ 464.049506] ? vmalloc_sync_all+0x30/0x30 [ 464.053640] ? _raw_spin_unlock_irq+0x27/0x70 [ 464.058122] ? finish_task_switch+0x1c1/0x7e0 [ 464.062615] ? syscall_return_slowpath+0x550/0x550 [ 464.067536] ? syscall_return_slowpath+0x2ac/0x550 [ 464.072448] ? prepare_exit_to_usermode+0x350/0x350 [ 464.077449] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 464.082799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.087628] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.092800] RIP: 0033:0x454e79 [ 464.095976] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:39 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000240)={'tunl0\x00', 0x8}) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 464.103667] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 464.110924] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 464.118177] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 464.125429] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 464.132680] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001b [ 464.144362] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28376] 2033/05/18 03:38:39 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x0, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 7 (fault-call:10 fault-nth:28): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 464.173951] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28392] [ 464.208451] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28399] 2033/05/18 03:38:39 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r2, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1f, 0x3f, 0x81, 0x7, 0xfff, 0x1, 0x81cb, 0x6, 0x2, 0x180d, 0x8, 0x3, 0xf9]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r3, 0x100000001, 0x0, 0x4, 0x7, 0x3ff}, &(0x7f0000000900)=0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0x7, 0x8001, 0xffffffffffffff80, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2, 0x4e22}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={r4}, 0x8) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000940)) r5 = getpid() process_vm_readv(r5, &(0x7f0000000200), 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000540)=""/220, 0xdc}, {&(0x7f0000000640)=""/190, 0xbe}, {&(0x7f0000000700)=""/212, 0xd4}], 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x1, 0x1f, 0xe0000000, 0xcc5}, &(0x7f0000000180)=0x98) r6 = syz_open_pts(r0, 0x2) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000001300)=0xe8) geteuid() stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) fstat(r1, &(0x7f0000002b80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000002f00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2004010}, 0xc, &(0x7f0000002940), 0x0, &(0x7f0000002e00)=[@rights={0x38, 0x1, 0x1, [r6, r6, r2, r6, r1, r2, r1, r2, r6, r2]}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @rights={0x28, 0x1, 0x1, [r6, r6, r1, r2, r1]}, @rights={0x18, 0x1, 0x1, [r6, r6]}, @rights={0x30, 0x1, 0x1, [r0, r6, r0, r1, r2, r6, r1]}], 0xc8, 0x40000}, 0x0) fchmod(0xffffffffffffffff, 0x80) dup3(0xffffffffffffffff, r0, 0x0) listen(0xffffffffffffffff, 0x0) [ 464.254692] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28403] [ 464.329708] FAULT_INJECTION: forcing a failure. [ 464.329708] name failslab, interval 1, probability 0, space 0, times 0 [ 464.341159] CPU: 0 PID: 28406 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 464.348362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.355782] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28409] [ 464.357719] Call Trace: [ 464.357744] dump_stack+0x194/0x24d [ 464.357759] ? arch_local_irq_restore+0x53/0x53 [ 464.357773] ? __save_stack_trace+0x7e/0xd0 [ 464.357791] should_fail+0x8c0/0xa40 [ 464.357803] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 464.357820] ? kasan_kmalloc+0xad/0xe0 [ 464.395105] ? kmem_cache_alloc_trace+0x136/0x740 [ 464.399966] ? __memcg_init_list_lru_node+0x169/0x270 [ 464.405168] ? __list_lru_init+0x544/0x750 [ 464.409413] ? sget_userns+0x691/0xe40 [ 464.413316] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 464.418085] ? kern_mount_data+0x50/0xb0 [ 464.422155] ? pid_ns_prepare_proc+0x1e/0x80 [ 464.426569] ? alloc_pid+0x87e/0xa00 [ 464.430293] ? copy_process.part.38+0x2516/0x4bd0 [ 464.435142] ? _do_fork+0x1f7/0xf70 [ 464.438770] ? SyS_clone+0x37/0x50 [ 464.442319] ? find_held_lock+0x35/0x1d0 [ 464.446387] ? __lock_is_held+0xb6/0x140 [ 464.450460] ? check_same_owner+0x320/0x320 [ 464.454794] ? rcu_note_context_switch+0x710/0x710 [ 464.459738] should_failslab+0xec/0x120 [ 464.463722] kmem_cache_alloc_trace+0x4b/0x740 [ 464.468317] ? __kmalloc_node+0x33/0x70 [ 464.472299] ? __kmalloc_node+0x33/0x70 [ 464.476278] ? rcu_read_lock_sched_held+0x108/0x120 [ 464.481296] __memcg_init_list_lru_node+0x169/0x270 [ 464.486309] ? list_lru_add+0x7c0/0x7c0 [ 464.490288] ? __kmalloc_node+0x47/0x70 [ 464.494265] __list_lru_init+0x544/0x750 [ 464.498325] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 464.504210] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 464.509222] ? __lockdep_init_map+0xe4/0x650 [ 464.513630] ? lockdep_init_map+0x9/0x10 [ 464.517689] sget_userns+0x691/0xe40 [ 464.521400] ? set_anon_super+0x20/0x20 [ 464.525371] ? put_filp+0x90/0x90 [ 464.528825] ? destroy_unused_super.part.6+0xd0/0xd0 [ 464.533940] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 464.538967] ? save_stack+0xa3/0xd0 [ 464.542603] ? save_stack+0x43/0xd0 [ 464.546238] ? kasan_slab_alloc+0x12/0x20 [ 464.550394] ? kmem_cache_alloc+0x12e/0x760 [ 464.554711] ? alloc_pid+0xc1/0xa00 [ 464.558323] ? __radix_tree_replace+0x1af/0x310 [ 464.562978] ? radix_tree_delete+0x30/0x30 [ 464.567201] ? node_tag_clear+0xf2/0x180 [ 464.571258] ? proc_get_inode+0x620/0x620 [ 464.575389] mount_ns+0x6d/0x190 [ 464.578737] proc_mount+0x7a/0x90 [ 464.582173] mount_fs+0x66/0x2d0 [ 464.585519] vfs_kern_mount.part.26+0xc6/0x4a0 [ 464.590080] ? may_umount+0xa0/0xa0 [ 464.593704] ? idr_alloc_cyclic+0x1d6/0x320 [ 464.598010] ? do_raw_spin_trylock+0x190/0x190 [ 464.602578] ? idr_alloc+0x180/0x180 [ 464.606276] kern_mount_data+0x50/0xb0 [ 464.610166] pid_ns_prepare_proc+0x1e/0x80 [ 464.614407] alloc_pid+0x87e/0xa00 [ 464.617952] ? __change_pid+0x400/0x400 [ 464.621928] ? ns_capable_common+0xcf/0x160 [ 464.626254] ? memset+0x31/0x40 [ 464.629529] ? copy_thread_tls+0x268/0x8f0 [ 464.633767] copy_process.part.38+0x2516/0x4bd0 [ 464.638444] ? __cleanup_sighand+0x40/0x40 [ 464.642688] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 464.647881] ? __lock_acquire+0x664/0x3e00 [ 464.652115] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 464.657306] ? environ_open+0x80/0x80 [ 464.661115] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 464.666298] ? __lock_acquire+0x664/0x3e00 [ 464.670527] ? mntput_no_expire+0x130/0xa90 [ 464.674848] ? print_irqtrace_events+0x270/0x270 [ 464.679609] ? trace_hardirqs_off+0x10/0x10 [ 464.683927] ? lock_release+0xa40/0xa40 [ 464.687908] ? lock_acquire+0x1d5/0x580 [ 464.691886] ? trace_hardirqs_off+0x10/0x10 [ 464.696203] ? trace_hardirqs_off+0x10/0x10 [ 464.700508] ? __lock_acquire+0x664/0x3e00 [ 464.704724] ? check_same_owner+0x320/0x320 [ 464.709035] ? find_held_lock+0x35/0x1d0 [ 464.713087] ? _parse_integer+0xe9/0x140 [ 464.717131] ? trace_hardirqs_off+0x10/0x10 [ 464.721436] ? _parse_integer+0x140/0x140 [ 464.725567] ? trace_hardirqs_off+0x10/0x10 [ 464.729874] ? get_pid_task+0x93/0x140 [ 464.733744] ? lock_downgrade+0x980/0x980 [ 464.737877] ? find_held_lock+0x35/0x1d0 [ 464.741938] ? __f_unlock_pos+0x19/0x20 [ 464.745897] ? lock_downgrade+0x980/0x980 [ 464.750029] ? get_pid_task+0xbc/0x140 [ 464.753916] ? proc_fail_nth_write+0x9b/0x1d0 [ 464.758405] ? map_files_get_link+0x3a0/0x3a0 [ 464.762890] _do_fork+0x1f7/0xf70 [ 464.766324] ? fork_idle+0x2d0/0x2d0 [ 464.770018] ? wait_for_completion+0x770/0x770 [ 464.774616] ? __lock_is_held+0xb6/0x140 [ 464.778703] ? __sb_end_write+0xa0/0xd0 [ 464.782659] ? fput+0xd2/0x140 [ 464.785841] ? SyS_write+0x184/0x220 [ 464.789541] ? SyS_read+0x220/0x220 [ 464.793151] SyS_clone+0x37/0x50 [ 464.796496] ? sys_vfork+0x30/0x30 [ 464.800023] do_syscall_64+0x281/0x940 [ 464.803914] ? vmalloc_sync_all+0x30/0x30 [ 464.808068] ? _raw_spin_unlock_irq+0x27/0x70 [ 464.812572] ? finish_task_switch+0x1c1/0x7e0 [ 464.817078] ? syscall_return_slowpath+0x550/0x550 [ 464.822015] ? syscall_return_slowpath+0x2ac/0x550 [ 464.826952] ? prepare_exit_to_usermode+0x350/0x350 [ 464.831979] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 464.837345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.842178] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.847349] RIP: 0033:0x454e79 [ 464.850523] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 464.858210] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 464.865466] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 464.872727] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 2033/05/18 03:38:39 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x0, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(r4, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000480)={0xffffffff}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) fchdir(r1) mmap(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0xc, 0x41030, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000540)='./file2\x00', 0xc1) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xffc5) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_init() r3 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000300)='./control\x00', 0x81000000) inotify_add_watch(r3, &(0x7f0000c31000)='./control\x00', 0x86000006) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./control/file1\x00', 0x40, 0x48) execveat(r4, &(0x7f0000001ff8)='./file0\x00', &(0x7f0000000ff0), &(0x7f0000001fe4)=[&(0x7f0000000000)='/dev/vcs\x00', &(0x7f0000001000)="747275737465641e00", &(0x7f0000001fff)='\x00'], 0x1000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x14) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000140)={0x8, 0x52d, 0x1, 0x0, 0xacc, 0x80000000}, 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x0, 0x30, 0x4, 0x200}, &(0x7f0000000340)=0x18) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000380), 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0xfffffffffffffffa}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="070700000000000000000000ffff82e71238148ec1cb8adcf7d277c6f29e8fac3a9c61e58287120773e282284af1c80e20586e2eae36740565f8b19eedc2f210500c058f8fbfd699e03f7e9aacc633568e8d1fd2d8503d94d7d5c0ea6bcae51826f9a7a86530a07bf52113"], 0x2) fchdir(r7) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x2, 0x0) fstatfs(r5, &(0x7f0000000180)=""/144) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 2033/05/18 03:38:39 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) ioctl$KVM_GET_EMULATED_CPUID(r5, 0xc008ae09, &(0x7f00000007c0)=""/139) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) bind(r0, &(0x7f0000000240)=@ethernet={0x307, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:39 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 7 (fault-call:10 fault-nth:29): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:39 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) shmget(0x3, 0x4000, 0x20, &(0x7f00008f1000/0x4000)=nil) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000ac0)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") [ 464.879977] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 464.887230] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001c [ 464.928017] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28429] [ 464.934139] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28431] [ 464.988547] FAULT_INJECTION: forcing a failure. [ 464.988547] name failslab, interval 1, probability 0, space 0, times 0 [ 465.000055] CPU: 0 PID: 28442 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 465.007254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.016625] Call Trace: [ 465.019235] dump_stack+0x194/0x24d [ 465.022884] ? arch_local_irq_restore+0x53/0x53 [ 465.027575] ? __save_stack_trace+0x7e/0xd0 [ 465.031931] should_fail+0x8c0/0xa40 2033/05/18 03:38:39 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x0, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:39 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 465.035668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 465.040786] ? kasan_kmalloc+0xad/0xe0 [ 465.044694] ? kmem_cache_alloc_trace+0x136/0x740 [ 465.049554] ? __memcg_init_list_lru_node+0x169/0x270 [ 465.054764] ? __list_lru_init+0x544/0x750 [ 465.059014] ? sget_userns+0x691/0xe40 [ 465.062925] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 465.067696] ? kern_mount_data+0x50/0xb0 [ 465.071770] ? pid_ns_prepare_proc+0x1e/0x80 [ 465.076184] ? alloc_pid+0x87e/0xa00 [ 465.079908] ? copy_process.part.38+0x2516/0x4bd0 [ 465.084760] ? _do_fork+0x1f7/0xf70 2033/05/18 03:38:39 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 465.088395] ? SyS_clone+0x37/0x50 [ 465.091957] ? find_held_lock+0x35/0x1d0 [ 465.096039] ? __lock_is_held+0xb6/0x140 [ 465.100128] ? check_same_owner+0x320/0x320 [ 465.104468] ? rcu_note_context_switch+0x710/0x710 [ 465.109419] should_failslab+0xec/0x120 [ 465.113413] kmem_cache_alloc_trace+0x4b/0x740 [ 465.118016] ? __kmalloc_node+0x33/0x70 [ 465.122009] ? __kmalloc_node+0x33/0x70 [ 465.126000] ? rcu_read_lock_sched_held+0x108/0x120 [ 465.131037] __memcg_init_list_lru_node+0x169/0x270 2033/05/18 03:38:40 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0xfffffffffffffffd) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79ea) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000005c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x10000000000002, 0x0) 2033/05/18 03:38:40 executing program 6: capset(&(0x7f00002d0ff8)={0x20080522}, &(0x7f0000000000)={0x0, 0x7, 0x1000000000, 0x5}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x14000, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30f) writev(r0, &(0x7f00005e5ff0)=[{&(0x7f0000a5f000)="29000000200019fff63d0014000000060200001615f50005000000040d0010000000000200f9000008", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000002c0)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x9, 0x7, 0x9780, 0x1ff, 0x7fff}, &(0x7f0000000200)=0x14) sendmsg$inet_sctp(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10, &(0x7f0000000180)=[{&(0x7f00000000c0)="97fcfa90a68728ff102cde45c86f277d5f61c3f2afc98a2a4bbd7537f2cf88bba777a7f49da698be8fc2e2baf2b861047224e585c79bf4ae95c57c9cf56e813a5dae55e5d8bedec0fc639467f6200251e83297cc174e16e0e4baa55d5218852c", 0x60}], 0x1, &(0x7f0000000240), 0x0, 0x4000001}, 0x4000) bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e24}, 0x10) [ 465.136072] ? list_lru_add+0x7c0/0x7c0 [ 465.140062] ? __kmalloc_node+0x47/0x70 [ 465.144059] __list_lru_init+0x544/0x750 [ 465.148138] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 465.154043] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 465.159075] ? __lockdep_init_map+0xe4/0x650 [ 465.163501] ? lockdep_init_map+0x9/0x10 [ 465.167575] sget_userns+0x691/0xe40 [ 465.171307] ? set_anon_super+0x20/0x20 [ 465.175291] ? put_filp+0x90/0x90 [ 465.178750] ? destroy_unused_super.part.6+0xd0/0xd0 [ 465.183870] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 465.188894] ? perf_trace_lock+0xd6/0x900 [ 465.193055] ? save_stack+0xa3/0xd0 [ 465.196693] ? kasan_slab_alloc+0x12/0x20 [ 465.200847] ? alloc_pid+0xc1/0xa00 [ 465.204482] ? __radix_tree_replace+0x1af/0x310 [ 465.209169] ? radix_tree_delete+0x30/0x30 [ 465.213419] ? node_tag_clear+0xf2/0x180 [ 465.217499] ? proc_get_inode+0x620/0x620 [ 465.221660] mount_ns+0x6d/0x190 [ 465.225035] proc_mount+0x7a/0x90 [ 465.228495] mount_fs+0x66/0x2d0 [ 465.231873] vfs_kern_mount.part.26+0xc6/0x4a0 [ 465.236462] ? may_umount+0xa0/0xa0 [ 465.240095] ? idr_alloc_cyclic+0x1d6/0x320 [ 465.244425] ? do_raw_spin_trylock+0x190/0x190 [ 465.249009] ? idr_alloc+0x180/0x180 [ 465.252717] kern_mount_data+0x50/0xb0 [ 465.256594] pid_ns_prepare_proc+0x1e/0x80 [ 465.260811] alloc_pid+0x87e/0xa00 [ 465.264335] ? __change_pid+0x400/0x400 [ 465.268289] ? ns_capable_common+0xcf/0x160 [ 465.272601] ? memset+0x31/0x40 [ 465.275864] ? copy_thread_tls+0x268/0x8f0 [ 465.280086] copy_process.part.38+0x2516/0x4bd0 [ 465.284744] ? __cleanup_sighand+0x40/0x40 [ 465.288970] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 465.294145] ? __lock_acquire+0x664/0x3e00 [ 465.298359] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 465.303529] ? perf_trace_lock+0xd6/0x900 [ 465.307666] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 465.312836] ? perf_trace_lock+0xd6/0x900 [ 465.316964] ? mntput_no_expire+0x130/0xa90 [ 465.321270] ? trace_event_raw_event_lock+0x340/0x340 [ 465.326438] ? perf_trace_lock+0xd6/0x900 [ 465.330575] ? lock_acquire+0x1d5/0x580 [ 465.334533] ? trace_hardirqs_off+0x10/0x10 [ 465.338843] ? perf_trace_lock+0xd6/0x900 [ 465.342981] ? find_held_lock+0x35/0x1d0 [ 465.347034] ? perf_trace_lock+0xd6/0x900 [ 465.351170] ? trace_event_raw_event_lock+0x340/0x340 [ 465.356342] ? _parse_integer+0x140/0x140 [ 465.360476] ? trace_hardirqs_off+0x10/0x10 [ 465.364781] ? get_pid_task+0x93/0x140 [ 465.368651] ? perf_trace_lock+0xd6/0x900 [ 465.372785] ? find_held_lock+0x35/0x1d0 [ 465.376833] ? __f_unlock_pos+0x19/0x20 [ 465.380788] ? lock_downgrade+0x980/0x980 [ 465.384917] ? get_pid_task+0xbc/0x140 [ 465.388788] ? proc_fail_nth_write+0x9b/0x1d0 [ 465.393263] ? map_files_get_link+0x3a0/0x3a0 [ 465.397749] _do_fork+0x1f7/0xf70 [ 465.401189] ? fork_idle+0x2d0/0x2d0 [ 465.404886] ? wait_for_completion+0x770/0x770 [ 465.409471] ? __sb_end_write+0xa0/0xd0 [ 465.413448] ? fput+0xd2/0x140 [ 465.416628] ? SyS_write+0x184/0x220 [ 465.420325] ? SyS_read+0x220/0x220 [ 465.423935] SyS_clone+0x37/0x50 [ 465.427282] ? sys_vfork+0x30/0x30 [ 465.430806] do_syscall_64+0x281/0x940 [ 465.434674] ? vmalloc_sync_all+0x30/0x30 [ 465.438807] ? _raw_spin_unlock_irq+0x27/0x70 [ 465.443284] ? finish_task_switch+0x1c1/0x7e0 [ 465.447761] ? syscall_return_slowpath+0x550/0x550 [ 465.452670] ? syscall_return_slowpath+0x2ac/0x550 [ 465.457581] ? prepare_exit_to_usermode+0x350/0x350 [ 465.462596] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 465.467947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.472779] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 465.477948] RIP: 0033:0x454e79 [ 465.481119] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:40 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) setsockopt$inet6_int(r2, 0x29, 0x33, &(0x7f0000000280)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000a00)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f00000007c0)=""/186) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x20000204, &(0x7f0000000580)=[{0x8a, 0xb05c, 0x2, 0x2}]}, 0x24f) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000000c0)={r7, 0x81}, 0x8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r4, &(0x7f00000000c0)=ANY=[], 0xffffff6d) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 465.488811] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 465.496062] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 465.503315] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 465.511154] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 465.518404] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001d 2033/05/18 03:38:40 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 465.626500] netlink: 'syz-executor6': attribute type 16 has an invalid length. [ 465.654518] QAT: Invalid ioctl [ 465.662603] netlink: 'syz-executor6': attribute type 16 has an invalid length. [ 465.685526] QAT: Invalid ioctl 2033/05/18 03:38:41 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) ioctl$TIOCEXCL(r4, 0x540c) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000240)) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:41 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000005c0), &(0x7f0000000240)=0xfffffffffffffd93) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 6: nanosleep(&(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000240)) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') exit(0x2d5) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r0}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000200)="eabba32122600ea879d1b2aae9e9059c17c791208d0865a8f8e76805a0bd9b99194126653e8a874f88419815cacd490fd41068b33baa0001a0345e733b36b659a57a0e3c964065f37f769606f3a97a731d790ddc25661275424f755d8667dc0148da894f3001a1a0d4f496cc901510e36bfc625755d5381cba01e6be93123fb8bc9e008663f3a7d5a8991e6dfa37f5dcfcc713fbbb1371af", 0x0) mmap(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x8000000, 0x31, 0xffffffffffffffff, 0xfffffffffffffffd) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000380)="b0c701621ece6b4afb74c30b8a6de37268bd570eca09af0f025be93e0af4b9d45d6095f3cc1dcce8012786f59682eb282bf147b1746bcf72a9829fae2303a5eafaf5eb0a117e2c4f052820efb761d37ca475bd48a5d349", 0x57}], 0x1) getpgrp(0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mremap(&(0x7f000053c000/0x1000)=nil, 0x1000, 0x12000, 0x3, &(0x7f00006ed000/0x12000)=nil) 2033/05/18 03:38:41 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) socket(0x9, 0x3, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) r1 = getpgid(0x0) gettid() getpgid(0xffffffffffffffff) r2 = getpgid(r1) syz_open_procfs(r2, &(0x7f0000000b00)="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") 2033/05/18 03:38:41 executing program 7 (fault-call:10 fault-nth:30): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 466.183627] FAULT_INJECTION: forcing a failure. [ 466.183627] name failslab, interval 1, probability 0, space 0, times 0 [ 466.194964] CPU: 1 PID: 28494 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 466.202161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.211524] Call Trace: [ 466.214130] dump_stack+0x194/0x24d [ 466.217776] ? arch_local_irq_restore+0x53/0x53 [ 466.222459] ? __save_stack_trace+0x7e/0xd0 [ 466.226800] should_fail+0x8c0/0xa40 [ 466.230619] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 466.235742] ? kasan_kmalloc+0xad/0xe0 [ 466.239637] ? kmem_cache_alloc_trace+0x136/0x740 [ 466.244490] ? __memcg_init_list_lru_node+0x169/0x270 [ 466.249690] ? __list_lru_init+0x544/0x750 [ 466.253933] ? sget_userns+0x691/0xe40 [ 466.257833] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 466.262597] ? kern_mount_data+0x50/0xb0 [ 466.266683] ? pid_ns_prepare_proc+0x1e/0x80 [ 466.271104] ? alloc_pid+0x87e/0xa00 [ 466.274822] ? copy_process.part.38+0x2516/0x4bd0 [ 466.279670] ? _do_fork+0x1f7/0xf70 2033/05/18 03:38:41 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:41 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x1, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) r6 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r6, 0x40485404, &(0x7f0000000040)) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r7, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r9 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r9) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) [ 466.283298] ? SyS_clone+0x37/0x50 [ 466.286849] ? find_held_lock+0x35/0x1d0 [ 466.290923] ? __lock_is_held+0xb6/0x140 [ 466.294998] ? check_same_owner+0x320/0x320 [ 466.299339] ? rcu_note_context_switch+0x710/0x710 [ 466.304286] should_failslab+0xec/0x120 [ 466.308274] kmem_cache_alloc_trace+0x4b/0x740 [ 466.312864] ? __kmalloc_node+0x33/0x70 [ 466.316936] ? __kmalloc_node+0x33/0x70 [ 466.320921] ? rcu_read_lock_sched_held+0x108/0x120 [ 466.325958] __memcg_init_list_lru_node+0x169/0x270 2033/05/18 03:38:41 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 466.330991] ? list_lru_add+0x7c0/0x7c0 [ 466.334978] ? __kmalloc_node+0x47/0x70 [ 466.338971] __list_lru_init+0x544/0x750 [ 466.343053] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 466.348962] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 466.353993] ? __lockdep_init_map+0xe4/0x650 [ 466.358396] ? lockdep_init_map+0x9/0x10 [ 466.362444] sget_userns+0x691/0xe40 [ 466.366137] ? set_anon_super+0x20/0x20 [ 466.370099] ? put_filp+0x90/0x90 [ 466.373533] ? destroy_unused_super.part.6+0xd0/0xd0 [ 466.378643] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 466.383641] ? perf_trace_lock+0xd6/0x900 [ 466.387774] ? save_stack+0xa3/0xd0 [ 466.391384] ? kasan_slab_alloc+0x12/0x20 [ 466.395514] ? alloc_pid+0xc1/0xa00 [ 466.399126] ? __radix_tree_replace+0x1af/0x310 [ 466.403778] ? radix_tree_delete+0x30/0x30 [ 466.407993] ? node_tag_clear+0xf2/0x180 [ 466.412048] ? proc_get_inode+0x620/0x620 [ 466.416177] mount_ns+0x6d/0x190 [ 466.419526] proc_mount+0x7a/0x90 [ 466.422959] mount_fs+0x66/0x2d0 [ 466.426309] vfs_kern_mount.part.26+0xc6/0x4a0 [ 466.430873] ? may_umount+0xa0/0xa0 [ 466.434479] ? idr_alloc_cyclic+0x1d6/0x320 [ 466.438787] ? do_raw_spin_trylock+0x190/0x190 [ 466.443352] ? idr_alloc+0x180/0x180 [ 466.447049] kern_mount_data+0x50/0xb0 [ 466.450920] pid_ns_prepare_proc+0x1e/0x80 [ 466.455136] alloc_pid+0x87e/0xa00 [ 466.458662] ? __change_pid+0x400/0x400 [ 466.462616] ? ns_capable_common+0xcf/0x160 [ 466.466926] ? memset+0x31/0x40 [ 466.470188] ? copy_thread_tls+0x268/0x8f0 [ 466.474409] copy_process.part.38+0x2516/0x4bd0 [ 466.479070] ? __cleanup_sighand+0x40/0x40 [ 466.483300] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 466.488477] ? __lock_acquire+0x664/0x3e00 [ 466.493725] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 466.498906] ? perf_trace_lock+0xd6/0x900 [ 466.503045] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 466.508212] ? perf_trace_lock+0xd6/0x900 [ 466.512340] ? mntput_no_expire+0x130/0xa90 [ 466.516645] ? trace_event_raw_event_lock+0x340/0x340 [ 466.521812] ? perf_trace_lock+0xd6/0x900 [ 466.525945] ? lock_acquire+0x1d5/0x580 [ 466.529899] ? trace_hardirqs_off+0x10/0x10 [ 466.534199] ? perf_trace_lock+0xd6/0x900 [ 466.538337] ? find_held_lock+0x35/0x1d0 [ 466.542380] ? perf_trace_lock+0xd6/0x900 [ 466.546515] ? trace_event_raw_event_lock+0x340/0x340 [ 466.551686] ? _parse_integer+0x140/0x140 [ 466.555820] ? trace_hardirqs_off+0x10/0x10 [ 466.560124] ? get_pid_task+0x93/0x140 [ 466.563990] ? perf_trace_lock+0xd6/0x900 [ 466.568123] ? find_held_lock+0x35/0x1d0 [ 466.572168] ? __f_unlock_pos+0x19/0x20 [ 466.576122] ? lock_downgrade+0x980/0x980 [ 466.580250] ? get_pid_task+0xbc/0x140 [ 466.584121] ? proc_fail_nth_write+0x9b/0x1d0 [ 466.588596] ? map_files_get_link+0x3a0/0x3a0 [ 466.593083] _do_fork+0x1f7/0xf70 [ 466.596523] ? fork_idle+0x2d0/0x2d0 [ 466.600220] ? wait_for_completion+0x770/0x770 [ 466.604802] ? __sb_end_write+0xa0/0xd0 [ 466.608757] ? fput+0xd2/0x140 [ 466.611928] ? SyS_write+0x184/0x220 [ 466.615622] ? SyS_read+0x220/0x220 [ 466.619231] SyS_clone+0x37/0x50 [ 466.622581] ? sys_vfork+0x30/0x30 [ 466.626106] do_syscall_64+0x281/0x940 [ 466.629977] ? vmalloc_sync_all+0x30/0x30 [ 466.634104] ? _raw_spin_unlock_irq+0x27/0x70 [ 466.638580] ? finish_task_switch+0x1c1/0x7e0 [ 466.643056] ? syscall_return_slowpath+0x550/0x550 [ 466.647966] ? syscall_return_slowpath+0x2ac/0x550 [ 466.652877] ? prepare_exit_to_usermode+0x350/0x350 [ 466.657899] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 466.663252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 466.668086] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 466.673258] RIP: 0033:0x454e79 [ 466.676426] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 466.684116] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 466.691364] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 466.698612] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 466.705859] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 466.713109] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001e 2033/05/18 03:38:41 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x0, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000280), &(0x7f0000000480)=0x8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x7, 0x400) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:42 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 7 (fault-call:10 fault-nth:31): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:42 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000a00)='vcan0\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") epoll_create1(0x80000) 2033/05/18 03:38:42 executing program 6: r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/netlink\x00') read(r2, &(0x7f0000000240)=""/85, 0x55) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r4}, &(0x7f0000000380)=0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000180)='/selinux/status\x00', 0x0) sendfile(r5, r2, &(0x7f0000000200), 0x200000010000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) close(r0) removexattr(&(0x7f0000003d40)='./file1\x00', &(0x7f0000003d80)=ANY=[@ANYBLOB="73656375726974792e6b798100ae202e706f7369785f61636d5f61fe6365737300"]) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000680)) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)) ioctl$sock_netdev_private(r2, 0x89f9, &(0x7f00000008c0)="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") memfd_create(&(0x7f0000000800)='user\x00', 0x3) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000840)={0x0, 0x80, 0x317e, 0x4fc2, 0x0, 0x4}, &(0x7f0000000880)=0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) removexattr(&(0x7f0000003d40)='./file1\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x5454, &(0x7f0000000040)=0x6) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000280)=0xe8) [ 467.508422] FAULT_INJECTION: forcing a failure. [ 467.508422] name failslab, interval 1, probability 0, space 0, times 0 [ 467.519961] CPU: 1 PID: 28548 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 467.527159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.536524] Call Trace: [ 467.539127] dump_stack+0x194/0x24d [ 467.542772] ? arch_local_irq_restore+0x53/0x53 [ 467.547458] ? __save_stack_trace+0x7e/0xd0 [ 467.551807] should_fail+0x8c0/0xa40 2033/05/18 03:38:42 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 467.555546] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 467.560671] ? kasan_kmalloc+0xad/0xe0 [ 467.564576] ? kmem_cache_alloc_trace+0x136/0x740 [ 467.569441] ? __memcg_init_list_lru_node+0x169/0x270 [ 467.574653] ? __list_lru_init+0x544/0x750 [ 467.578903] ? sget_userns+0x691/0xe40 [ 467.582817] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 467.587595] ? kern_mount_data+0x50/0xb0 [ 467.591663] ? pid_ns_prepare_proc+0x1e/0x80 [ 467.596084] ? alloc_pid+0x87e/0xa00 [ 467.599806] ? copy_process.part.38+0x2516/0x4bd0 [ 467.604657] ? _do_fork+0x1f7/0xf70 2033/05/18 03:38:42 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x200417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 467.608292] ? SyS_clone+0x37/0x50 [ 467.611842] ? find_held_lock+0x35/0x1d0 [ 467.615914] ? __lock_is_held+0xb6/0x140 [ 467.619993] ? check_same_owner+0x320/0x320 [ 467.624331] ? rcu_note_context_switch+0x710/0x710 [ 467.629285] should_failslab+0xec/0x120 [ 467.633270] kmem_cache_alloc_trace+0x4b/0x740 [ 467.637858] ? __kmalloc_node+0x33/0x70 [ 467.641837] ? __kmalloc_node+0x33/0x70 [ 467.645819] ? rcu_read_lock_sched_held+0x108/0x120 [ 467.650846] __memcg_init_list_lru_node+0x169/0x270 [ 467.655875] ? list_lru_add+0x7c0/0x7c0 [ 467.659857] ? __kmalloc_node+0x47/0x70 [ 467.663851] __list_lru_init+0x544/0x750 [ 467.667928] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 467.673820] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 467.678824] ? __lockdep_init_map+0xe4/0x650 [ 467.683217] ? lockdep_init_map+0x9/0x10 [ 467.687261] sget_userns+0x691/0xe40 [ 467.690952] ? set_anon_super+0x20/0x20 [ 467.694907] ? put_filp+0x90/0x90 [ 467.698340] ? destroy_unused_super.part.6+0xd0/0xd0 [ 467.703426] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 467.708420] ? perf_trace_lock+0xd6/0x900 [ 467.712553] ? save_stack+0xa3/0xd0 [ 467.716165] ? kasan_slab_alloc+0x12/0x20 [ 467.720293] ? alloc_pid+0xc1/0xa00 [ 467.723903] ? __radix_tree_replace+0x1af/0x310 [ 467.728553] ? radix_tree_delete+0x30/0x30 [ 467.732769] ? node_tag_clear+0xf2/0x180 [ 467.736818] ? proc_get_inode+0x620/0x620 [ 467.740945] mount_ns+0x6d/0x190 [ 467.744295] proc_mount+0x7a/0x90 [ 467.747731] mount_fs+0x66/0x2d0 [ 467.751085] vfs_kern_mount.part.26+0xc6/0x4a0 [ 467.755654] ? may_umount+0xa0/0xa0 [ 467.759263] ? idr_alloc_cyclic+0x1d6/0x320 [ 467.763570] ? do_raw_spin_trylock+0x190/0x190 [ 467.768135] ? idr_alloc+0x180/0x180 [ 467.771834] kern_mount_data+0x50/0xb0 [ 467.775703] pid_ns_prepare_proc+0x1e/0x80 [ 467.779918] alloc_pid+0x87e/0xa00 [ 467.783446] ? __change_pid+0x400/0x400 [ 467.787404] ? ns_capable_common+0xcf/0x160 [ 467.791716] ? memset+0x31/0x40 [ 467.794988] ? copy_thread_tls+0x268/0x8f0 [ 467.799210] copy_process.part.38+0x2516/0x4bd0 [ 467.803870] ? __cleanup_sighand+0x40/0x40 [ 467.808100] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 467.813275] ? __lock_acquire+0x664/0x3e00 [ 467.817490] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 467.822660] ? perf_trace_lock+0xd6/0x900 [ 467.826793] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 467.831960] ? perf_trace_lock+0xd6/0x900 [ 467.836086] ? mntput_no_expire+0x130/0xa90 [ 467.840392] ? trace_event_raw_event_lock+0x340/0x340 [ 467.845559] ? perf_trace_lock+0xd6/0x900 [ 467.849695] ? lock_acquire+0x1d5/0x580 [ 467.853649] ? trace_hardirqs_off+0x10/0x10 [ 467.857953] ? perf_trace_lock+0xd6/0x900 [ 467.862098] ? find_held_lock+0x35/0x1d0 [ 467.866142] ? perf_trace_lock+0xd6/0x900 [ 467.870278] ? trace_event_raw_event_lock+0x340/0x340 [ 467.875448] ? _parse_integer+0x140/0x140 [ 467.879590] ? trace_hardirqs_off+0x10/0x10 [ 467.883904] ? get_pid_task+0x93/0x140 [ 467.887778] ? perf_trace_lock+0xd6/0x900 [ 467.891913] ? find_held_lock+0x35/0x1d0 [ 467.895988] ? __f_unlock_pos+0x19/0x20 [ 467.899948] ? lock_downgrade+0x980/0x980 [ 467.904081] ? get_pid_task+0xbc/0x140 [ 467.907953] ? proc_fail_nth_write+0x9b/0x1d0 [ 467.912432] ? map_files_get_link+0x3a0/0x3a0 [ 467.916919] _do_fork+0x1f7/0xf70 [ 467.920358] ? fork_idle+0x2d0/0x2d0 [ 467.924054] ? wait_for_completion+0x770/0x770 [ 467.928641] ? __sb_end_write+0xa0/0xd0 [ 467.932603] ? fput+0xd2/0x140 [ 467.935780] ? SyS_write+0x184/0x220 [ 467.939477] ? SyS_read+0x220/0x220 [ 467.943091] SyS_clone+0x37/0x50 [ 467.946436] ? sys_vfork+0x30/0x30 [ 467.949957] do_syscall_64+0x281/0x940 [ 467.953852] ? vmalloc_sync_all+0x30/0x30 [ 467.957984] ? _raw_spin_unlock_irq+0x27/0x70 [ 467.962461] ? finish_task_switch+0x1c1/0x7e0 [ 467.966937] ? syscall_return_slowpath+0x550/0x550 [ 467.971849] ? syscall_return_slowpath+0x2ac/0x550 [ 467.976762] ? prepare_exit_to_usermode+0x350/0x350 [ 467.981763] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 467.987112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.991942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.997112] RIP: 0033:0x454e79 [ 468.000279] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:42 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000469ffc), 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e20}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_matches\x00') poll(&(0x7f0000084ff0)=[{}], 0x20000000000000b5, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) pipe2(&(0x7f0000000100), 0x0) mq_open(&(0x7f0000000640)='-$\x00', 0x0, 0x6, &(0x7f0000664fc0)={0x0, 0x1, 0x9}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000000)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000880)={0x0, 0x206, 0x0, 0x0, r2}, 0x10) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000000c0)={0x0, 0xb67, &(0x7f00000008c0)="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"}) 2033/05/18 03:38:42 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0), 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:42 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x0, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 468.007970] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 468.015219] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 468.022466] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 468.029715] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 468.036972] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001f 2033/05/18 03:38:43 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0x8000000) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e20, 0x9, @empty, 0x8000}}, 0x9, 0x2, 0x15, 0xffff}, &(0x7f0000000ac0)=0x98) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000b00)={r1, 0x1fc00000000}, 0x8) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:43 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:43 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0), 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:43 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x0, 0x100}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000005c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffffffffffc1}}, 0x3, 0xcd6}, &(0x7f00000002c0)=0x90) setreuid(0x0, r4) inotify_init1(0x0) fcntl$setown(r0, 0x8, r3) ptrace$peekuser(0x3, r3, 0x5) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000680)={0xff}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r8, &(0x7f0000000080)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x1, 0x1, 0xa5838aebecb24ff7}, 0x14}, 0x1}, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="d98ecbdc880369c0e305db7c743208000000200000002c196b0f7dff06e942a60d4c56834209498ff680227987bea42315c4360034887d86a2d1edab8baaf77678351fd9b74405c99ff11e1ba4255e341a8148fb74c19c96fb4d47666ce0ffffff0f002a04086d080000d7136cde5462279500d506198d9c0fcb77c8ae387a79925cb1c7e6bffd4a220651ea0b81c9b61d58fa5e179e5aecd2d8300c3841b379f2dd85e7356006bc3ae0fb82000e219d1ffb1bb967ef73eb9e00fe03836c2218f81e954f29847d5faffe6acef491b516dc7cf50b75244d2d9355f30300f454418e35d8a6560a2d0ede5ab71b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) prctl$setptracer(0x59616d61, 0x0) 2033/05/18 03:38:43 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:43 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x0, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:43 executing program 7 (fault-call:10 fault-nth:32): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:43 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) [ 468.607773] __report_access: 19 callbacks suppressed [ 468.607783] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28589] 2033/05/18 03:38:43 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0), 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:43 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 468.694748] FAULT_INJECTION: forcing a failure. [ 468.694748] name failslab, interval 1, probability 0, space 0, times 0 [ 468.706172] CPU: 1 PID: 28600 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 468.713375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.722735] Call Trace: [ 468.725339] dump_stack+0x194/0x24d [ 468.728982] ? arch_local_irq_restore+0x53/0x53 [ 468.733671] ? __save_stack_trace+0x7e/0xd0 2033/05/18 03:38:43 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, r3) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="05060005e3"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:43 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x109000, 0x10) statx(r10, &(0x7f0000000280)='./file0\x00', 0x1800, 0x140, &(0x7f0000000a00)) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 468.734600] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28607] [ 468.738006] should_fail+0x8c0/0xa40 [ 468.738026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 468.738042] ? kasan_kmalloc+0xad/0xe0 [ 468.738054] ? kmem_cache_alloc_trace+0x136/0x740 [ 468.738068] ? __memcg_init_list_lru_node+0x169/0x270 [ 468.738074] ? __list_lru_init+0x544/0x750 [ 468.738091] ? sget_userns+0x691/0xe40 [ 468.778314] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 468.783091] ? kern_mount_data+0x50/0xb0 [ 468.787168] ? pid_ns_prepare_proc+0x1e/0x80 [ 468.791588] ? alloc_pid+0x87e/0xa00 2033/05/18 03:38:43 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:43 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 468.795314] ? copy_process.part.38+0x2516/0x4bd0 [ 468.800202] ? _do_fork+0x1f7/0xf70 [ 468.803834] ? SyS_clone+0x37/0x50 [ 468.807385] ? find_held_lock+0x35/0x1d0 [ 468.811455] ? __lock_is_held+0xb6/0x140 [ 468.815531] ? check_same_owner+0x320/0x320 [ 468.819860] ? rcu_note_context_switch+0x710/0x710 [ 468.824805] should_failslab+0xec/0x120 [ 468.828794] kmem_cache_alloc_trace+0x4b/0x740 [ 468.833382] ? __kmalloc_node+0x33/0x70 [ 468.837360] ? __kmalloc_node+0x33/0x70 2033/05/18 03:38:43 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 468.841346] ? rcu_read_lock_sched_held+0x108/0x120 [ 468.846377] __memcg_init_list_lru_node+0x169/0x270 [ 468.851402] ? list_lru_add+0x7c0/0x7c0 [ 468.855382] ? __kmalloc_node+0x47/0x70 [ 468.859360] __list_lru_init+0x544/0x750 [ 468.863428] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 468.869317] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 468.874339] ? __lockdep_init_map+0xe4/0x650 [ 468.878754] ? lockdep_init_map+0x9/0x10 [ 468.880351] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28617] 2033/05/18 03:38:43 executing program 1: pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 468.882812] sget_userns+0x691/0xe40 [ 468.882822] ? set_anon_super+0x20/0x20 [ 468.882833] ? put_filp+0x90/0x90 [ 468.882844] ? destroy_unused_super.part.6+0xd0/0xd0 [ 468.882860] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 468.882875] ? save_stack+0xa3/0xd0 [ 468.882888] ? save_stack+0x43/0xd0 [ 468.920758] ? kasan_slab_alloc+0x12/0x20 [ 468.924909] ? kmem_cache_alloc+0x12e/0x760 [ 468.929232] ? alloc_pid+0xc1/0xa00 [ 468.932868] ? __radix_tree_replace+0x1af/0x310 [ 468.937547] ? radix_tree_delete+0x30/0x30 [ 468.941794] ? node_tag_clear+0xf2/0x180 [ 468.945868] ? proc_get_inode+0x620/0x620 [ 468.950023] mount_ns+0x6d/0x190 [ 468.953400] proc_mount+0x7a/0x90 [ 468.956856] mount_fs+0x66/0x2d0 [ 468.960233] vfs_kern_mount.part.26+0xc6/0x4a0 [ 468.964826] ? may_umount+0xa0/0xa0 [ 468.968456] ? idr_alloc_cyclic+0x1d6/0x320 [ 468.972789] ? do_raw_spin_trylock+0x190/0x190 [ 468.977384] ? idr_alloc+0x180/0x180 [ 468.981105] kern_mount_data+0x50/0xb0 [ 468.984986] pid_ns_prepare_proc+0x1e/0x80 [ 468.989212] alloc_pid+0x87e/0xa00 [ 468.992744] ? __change_pid+0x400/0x400 [ 468.996704] ? ns_capable_common+0xcf/0x160 [ 469.001021] ? memset+0x31/0x40 [ 469.004286] ? copy_thread_tls+0x268/0x8f0 [ 469.008506] copy_process.part.38+0x2516/0x4bd0 [ 469.013163] ? __cleanup_sighand+0x40/0x40 [ 469.017389] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 469.022561] ? __lock_acquire+0x664/0x3e00 [ 469.026777] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 469.031957] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 469.037124] ? __lock_acquire+0x664/0x3e00 [ 469.041341] ? mntput_no_expire+0x130/0xa90 [ 469.045645] ? print_irqtrace_events+0x270/0x270 [ 469.050384] ? trace_hardirqs_off+0x10/0x10 [ 469.054687] ? lock_release+0xa40/0xa40 [ 469.058657] ? lock_acquire+0x1d5/0x580 [ 469.062726] ? trace_hardirqs_off+0x10/0x10 [ 469.067140] ? trace_hardirqs_off+0x10/0x10 [ 469.071446] ? __lock_acquire+0x664/0x3e00 [ 469.075663] ? check_same_owner+0x320/0x320 [ 469.079972] ? find_held_lock+0x35/0x1d0 [ 469.084029] ? _parse_integer+0xe9/0x140 [ 469.088089] ? trace_hardirqs_off+0x10/0x10 [ 469.092395] ? _parse_integer+0x140/0x140 [ 469.096534] ? trace_hardirqs_off+0x10/0x10 [ 469.100845] ? get_pid_task+0x93/0x140 [ 469.104715] ? lock_downgrade+0x980/0x980 [ 469.108852] ? find_held_lock+0x35/0x1d0 [ 469.112901] ? __f_unlock_pos+0x19/0x20 [ 469.116860] ? lock_downgrade+0x980/0x980 [ 469.121081] ? get_pid_task+0xbc/0x140 [ 469.124977] ? proc_fail_nth_write+0x9b/0x1d0 [ 469.129457] ? map_files_get_link+0x3a0/0x3a0 [ 469.133941] _do_fork+0x1f7/0xf70 [ 469.137383] ? fork_idle+0x2d0/0x2d0 [ 469.141080] ? wait_for_completion+0x770/0x770 [ 469.145652] ? __lock_is_held+0xb6/0x140 [ 469.149710] ? __sb_end_write+0xa0/0xd0 [ 469.153670] ? fput+0xd2/0x140 [ 469.156845] ? SyS_write+0x184/0x220 [ 469.160541] ? SyS_read+0x220/0x220 [ 469.164152] SyS_clone+0x37/0x50 [ 469.167500] ? sys_vfork+0x30/0x30 [ 469.171028] do_syscall_64+0x281/0x940 [ 469.174903] ? vmalloc_sync_all+0x30/0x30 [ 469.179037] ? _raw_spin_unlock_irq+0x27/0x70 [ 469.183519] ? finish_task_switch+0x1c1/0x7e0 [ 469.188000] ? syscall_return_slowpath+0x550/0x550 [ 469.192916] ? syscall_return_slowpath+0x2ac/0x550 [ 469.197825] ? prepare_exit_to_usermode+0x350/0x350 [ 469.202826] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 469.208174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.213000] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 469.218177] RIP: 0033:0x454e79 [ 469.221347] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 469.229040] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 469.236292] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 469.243543] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 469.250795] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 469.258046] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000020 [ 469.286191] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28624] 2033/05/18 03:38:44 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:44 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:44 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:44 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(r4, r4) r5 = inotify_init1(0x0) fcntl$setown(r1, 0x8, r3) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:44 executing program 7 (fault-call:10 fault-nth:33): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:44 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x2, 0x3) ioctl$KVM_SET_TSC_KHZ(r4, 0xaea2, 0x7) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 2033/05/18 03:38:44 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/rtc\x00', 0x200, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x80807, 0x6, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r2, 0xc0045878) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) ioctl$KVM_RUN(r1, 0xae80, 0x0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) dup2(r0, r1) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000009c0)=0x7) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") [ 469.856236] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28653] [ 469.877516] FAULT_INJECTION: forcing a failure. [ 469.877516] name failslab, interval 1, probability 0, space 0, times 0 [ 469.888859] CPU: 1 PID: 28656 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 469.896058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.905418] Call Trace: [ 469.908020] dump_stack+0x194/0x24d [ 469.911671] ? arch_local_irq_restore+0x53/0x53 [ 469.916357] should_fail+0x8c0/0xa40 [ 469.920091] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 469.925208] ? trace_event_raw_event_lock+0x340/0x340 [ 469.930416] ? trace_hardirqs_off+0x10/0x10 [ 469.934755] ? lock_downgrade+0x980/0x980 [ 469.938918] ? trace_hardirqs_off+0x10/0x10 [ 469.943252] ? find_held_lock+0x35/0x1d0 [ 469.947328] ? __lock_is_held+0xb6/0x140 [ 469.951413] ? check_same_owner+0x320/0x320 2033/05/18 03:38:44 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:44 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:44 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) [ 469.955749] ? rcu_note_context_switch+0x710/0x710 [ 469.960693] ? rcu_note_context_switch+0x710/0x710 [ 469.965637] should_failslab+0xec/0x120 [ 469.969626] __kmalloc+0x63/0x760 [ 469.973098] ? __kmalloc_node+0x47/0x70 [ 469.977087] ? __list_lru_init+0xcf/0x750 [ 469.981254] __list_lru_init+0xcf/0x750 [ 469.985242] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 469.991143] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 469.994181] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28672] [ 469.996175] ? lockdep_init_map+0x9/0x10 [ 469.996193] sget_userns+0x6b1/0xe40 [ 469.996203] ? set_anon_super+0x20/0x20 [ 469.996217] ? put_filp+0x90/0x90 [ 469.996229] ? destroy_unused_super.part.6+0xd0/0xd0 [ 469.996242] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 470.030911] ? perf_trace_lock+0xd6/0x900 [ 470.035047] ? save_stack+0xa3/0xd0 [ 470.038661] ? kasan_slab_alloc+0x12/0x20 [ 470.042788] ? alloc_pid+0xc1/0xa00 [ 470.046397] ? __radix_tree_replace+0x1af/0x310 [ 470.051051] ? radix_tree_delete+0x30/0x30 [ 470.055266] ? node_tag_clear+0xf2/0x180 [ 470.059323] ? proc_get_inode+0x620/0x620 [ 470.063452] mount_ns+0x6d/0x190 [ 470.066802] proc_mount+0x7a/0x90 [ 470.070237] mount_fs+0x66/0x2d0 [ 470.073587] vfs_kern_mount.part.26+0xc6/0x4a0 [ 470.078154] ? may_umount+0xa0/0xa0 [ 470.081759] ? idr_alloc_cyclic+0x1d6/0x320 [ 470.086066] ? do_raw_spin_trylock+0x190/0x190 [ 470.090631] ? idr_alloc+0x180/0x180 [ 470.094330] kern_mount_data+0x50/0xb0 [ 470.098202] pid_ns_prepare_proc+0x1e/0x80 [ 470.102417] alloc_pid+0x87e/0xa00 [ 470.105940] ? __change_pid+0x400/0x400 [ 470.109892] ? ns_capable_common+0xcf/0x160 [ 470.114200] ? memset+0x31/0x40 [ 470.117460] ? copy_thread_tls+0x268/0x8f0 [ 470.121684] copy_process.part.38+0x2516/0x4bd0 [ 470.126344] ? __cleanup_sighand+0x40/0x40 [ 470.130571] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 470.135744] ? __lock_acquire+0x664/0x3e00 [ 470.139960] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 470.145131] ? perf_trace_lock+0xd6/0x900 [ 470.149268] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 470.154433] ? perf_trace_lock+0xd6/0x900 [ 470.158561] ? mntput_no_expire+0x130/0xa90 [ 470.162873] ? trace_event_raw_event_lock+0x340/0x340 [ 470.168041] ? perf_trace_lock+0xd6/0x900 [ 470.172177] ? lock_acquire+0x1d5/0x580 [ 470.176130] ? trace_hardirqs_off+0x10/0x10 [ 470.180432] ? perf_trace_lock+0xd6/0x900 [ 470.184570] ? find_held_lock+0x35/0x1d0 [ 470.188617] ? perf_trace_lock+0xd6/0x900 [ 470.192748] ? trace_event_raw_event_lock+0x340/0x340 [ 470.197920] ? _parse_integer+0x140/0x140 [ 470.202059] ? trace_hardirqs_off+0x10/0x10 [ 470.206367] ? get_pid_task+0x93/0x140 [ 470.210237] ? perf_trace_lock+0xd6/0x900 [ 470.214370] ? find_held_lock+0x35/0x1d0 [ 470.218421] ? __f_unlock_pos+0x19/0x20 [ 470.222379] ? lock_downgrade+0x980/0x980 [ 470.226507] ? get_pid_task+0xbc/0x140 [ 470.230376] ? proc_fail_nth_write+0x9b/0x1d0 [ 470.234852] ? map_files_get_link+0x3a0/0x3a0 [ 470.239333] _do_fork+0x1f7/0xf70 [ 470.242772] ? fork_idle+0x2d0/0x2d0 [ 470.246467] ? wait_for_completion+0x770/0x770 [ 470.251052] ? __sb_end_write+0xa0/0xd0 [ 470.255011] ? fput+0xd2/0x140 [ 470.258188] ? SyS_write+0x184/0x220 [ 470.261883] ? SyS_read+0x220/0x220 [ 470.265493] SyS_clone+0x37/0x50 [ 470.268839] ? sys_vfork+0x30/0x30 [ 470.272363] do_syscall_64+0x281/0x940 [ 470.276229] ? vmalloc_sync_all+0x30/0x30 [ 470.280356] ? _raw_spin_unlock_irq+0x27/0x70 [ 470.284831] ? finish_task_switch+0x1c1/0x7e0 [ 470.289304] ? syscall_return_slowpath+0x550/0x550 [ 470.294212] ? syscall_return_slowpath+0x2ac/0x550 [ 470.299122] ? prepare_exit_to_usermode+0x350/0x350 [ 470.304124] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 470.309477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.314306] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.319475] RIP: 0033:0x454e79 [ 470.322644] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 470.330334] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 470.337584] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 470.344835] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 2033/05/18 03:38:45 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r2) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000000240)=""/49) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 470.352087] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 470.359337] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000021 2033/05/18 03:38:45 executing program 7 (fault-call:10 fault-nth:34): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:45 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 2033/05/18 03:38:45 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="0506d3df00a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x0, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 470.528829] FAULT_INJECTION: forcing a failure. [ 470.528829] name failslab, interval 1, probability 0, space 0, times 0 [ 470.540171] CPU: 1 PID: 28692 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 470.547367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.556729] Call Trace: [ 470.558248] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28701] [ 470.559326] dump_stack+0x194/0x24d [ 470.559344] ? arch_local_irq_restore+0x53/0x53 [ 470.559360] ? kernel_text_address+0xd1/0xe0 [ 470.559377] ? __unwind_start+0x169/0x330 [ 470.585639] should_fail+0x8c0/0xa40 [ 470.589375] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 470.594498] ? save_stack+0x43/0xd0 [ 470.598138] ? kasan_kmalloc+0xad/0xe0 [ 470.602035] ? __kmalloc+0x162/0x760 [ 470.605762] ? __list_lru_init+0xcf/0x750 [ 470.609923] ? find_held_lock+0x35/0x1d0 [ 470.614003] ? __lock_is_held+0xb6/0x140 [ 470.618088] ? check_same_owner+0x320/0x320 [ 470.622427] ? rcu_note_context_switch+0x710/0x710 [ 470.627372] should_failslab+0xec/0x120 [ 470.631350] kmem_cache_alloc_node_trace+0x5a/0x760 [ 470.636372] ? mark_held_locks+0xaf/0x100 [ 470.640529] ? __raw_spin_lock_init+0x1c/0x100 [ 470.645116] __kmalloc_node+0x33/0x70 [ 470.648918] kvmalloc_node+0x99/0xd0 [ 470.652636] __list_lru_init+0x5d5/0x750 [ 470.656703] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 470.662595] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 470.667636] ? lockdep_init_map+0x9/0x10 [ 470.671709] sget_userns+0x6b1/0xe40 [ 470.675431] ? set_anon_super+0x20/0x20 2033/05/18 03:38:45 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 2033/05/18 03:38:45 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000001, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 470.679414] ? put_filp+0x90/0x90 [ 470.682871] ? destroy_unused_super.part.6+0xd0/0xd0 [ 470.687980] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 470.693007] ? save_stack+0xa3/0xd0 [ 470.696645] ? save_stack+0x43/0xd0 [ 470.700285] ? kasan_slab_alloc+0x12/0x20 [ 470.703490] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28699] [ 470.704428] ? kmem_cache_alloc+0x12e/0x760 [ 470.704438] ? alloc_pid+0xc1/0xa00 [ 470.704452] ? __radix_tree_replace+0x1af/0x310 [ 470.704463] ? radix_tree_delete+0x30/0x30 [ 470.730711] ? node_tag_clear+0xf2/0x180 [ 470.734791] ? proc_get_inode+0x620/0x620 [ 470.738949] mount_ns+0x6d/0x190 [ 470.742324] proc_mount+0x7a/0x90 [ 470.745782] mount_fs+0x66/0x2d0 [ 470.749154] vfs_kern_mount.part.26+0xc6/0x4a0 [ 470.753743] ? may_umount+0xa0/0xa0 [ 470.757375] ? idr_alloc_cyclic+0x1d6/0x320 [ 470.761708] ? do_raw_spin_trylock+0x190/0x190 [ 470.766298] ? idr_alloc+0x180/0x180 [ 470.770025] kern_mount_data+0x50/0xb0 [ 470.773925] pid_ns_prepare_proc+0x1e/0x80 [ 470.778169] alloc_pid+0x87e/0xa00 [ 470.781728] ? __change_pid+0x400/0x400 [ 470.785712] ? ns_capable_common+0xcf/0x160 [ 470.790042] ? memset+0x31/0x40 [ 470.793332] ? copy_thread_tls+0x268/0x8f0 [ 470.797578] copy_process.part.38+0x2516/0x4bd0 [ 470.802262] ? __cleanup_sighand+0x40/0x40 [ 470.805195] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28718] [ 470.806508] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 470.806522] ? __lock_acquire+0x664/0x3e00 [ 470.806535] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 470.830570] ? environ_open+0x80/0x80 [ 470.834389] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 470.839581] ? __lock_acquire+0x664/0x3e00 [ 470.843821] ? mntput_no_expire+0x130/0xa90 [ 470.848151] ? print_irqtrace_events+0x270/0x270 [ 470.852907] ? trace_hardirqs_off+0x10/0x10 [ 470.857225] ? lock_release+0xa40/0xa40 [ 470.861202] ? lock_acquire+0x1d5/0x580 [ 470.865176] ? trace_hardirqs_off+0x10/0x10 [ 470.869498] ? trace_hardirqs_off+0x10/0x10 [ 470.873819] ? __lock_acquire+0x664/0x3e00 [ 470.878052] ? check_same_owner+0x320/0x320 [ 470.882372] ? find_held_lock+0x35/0x1d0 [ 470.886437] ? _parse_integer+0xe9/0x140 [ 470.890500] ? trace_hardirqs_off+0x10/0x10 [ 470.894819] ? _parse_integer+0x140/0x140 [ 470.898966] ? trace_hardirqs_off+0x10/0x10 [ 470.903282] ? get_pid_task+0x93/0x140 [ 470.907169] ? lock_downgrade+0x980/0x980 [ 470.911321] ? find_held_lock+0x35/0x1d0 [ 470.915385] ? __f_unlock_pos+0x19/0x20 [ 470.917296] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28717] [ 470.919352] ? lock_downgrade+0x980/0x980 [ 470.919363] ? get_pid_task+0xbc/0x140 [ 470.919381] ? proc_fail_nth_write+0x9b/0x1d0 [ 470.941303] ? map_files_get_link+0x3a0/0x3a0 [ 470.945814] _do_fork+0x1f7/0xf70 [ 470.949270] ? fork_idle+0x2d0/0x2d0 [ 470.952981] ? wait_for_completion+0x770/0x770 [ 470.957567] ? __lock_is_held+0xb6/0x140 [ 470.961633] ? __sb_end_write+0xa0/0xd0 [ 470.965603] ? fput+0xd2/0x140 [ 470.968793] ? SyS_write+0x184/0x220 [ 470.972503] ? SyS_read+0x220/0x220 [ 470.976133] SyS_clone+0x37/0x50 [ 470.979493] ? sys_vfork+0x30/0x30 [ 470.983034] do_syscall_64+0x281/0x940 [ 470.986919] ? vmalloc_sync_all+0x30/0x30 [ 470.991068] ? _raw_spin_unlock_irq+0x27/0x70 [ 470.995562] ? finish_task_switch+0x1c1/0x7e0 [ 471.000056] ? syscall_return_slowpath+0x550/0x550 [ 471.004985] ? syscall_return_slowpath+0x2ac/0x550 [ 471.009909] ? prepare_exit_to_usermode+0x350/0x350 [ 471.014924] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 471.020291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 471.025141] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2033/05/18 03:38:45 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) rt_sigreturn() ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:45 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}, 0x8000, 0x6a2, 0x5, 0x440000000000000, 0x4}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f00000007c0)={r10, 0xffffffffffffffb3, 0xffffffff863eda2d, 0x100000000000000}, &(0x7f0000000800)=0x10) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:45 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x4) 2033/05/18 03:38:45 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x0, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:45 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr}, &(0x7f0000000600)=0xc) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r9, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 471.030329] RIP: 0033:0x454e79 [ 471.033512] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 471.041222] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 471.048494] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 471.055766] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 471.063054] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 471.070324] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000022 2033/05/18 03:38:46 executing program 7 (fault-call:10 fault-nth:35): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:46 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:46 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x800, 0x15) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) utimensat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000680)={{r11, r12/1000+30000}}, 0x0) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:46 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x0, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:46 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 2033/05/18 03:38:46 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000a00)) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:46 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:46 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="2721df6407e3ad1c67718f512f0aab0ace90f2f6509f80ebde3accdecca25dc76d0ceeea8eb7034fc70c121d62461fb7c22fe27bad4b4a358ac3ec1ac8bddc"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:46 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x4) 2033/05/18 03:38:46 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 472.047649] FAULT_INJECTION: forcing a failure. [ 472.047649] name failslab, interval 1, probability 0, space 0, times 0 [ 472.059113] CPU: 1 PID: 28755 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 472.066313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.075790] Call Trace: [ 472.078403] dump_stack+0x194/0x24d [ 472.082053] ? arch_local_irq_restore+0x53/0x53 [ 472.086748] should_fail+0x8c0/0xa40 [ 472.090481] ? is_bpf_text_address+0xa4/0x120 [ 472.094997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 472.100116] ? __kernel_text_address+0xd/0x40 [ 472.104633] ? unwind_get_return_address+0x61/0xa0 [ 472.109596] ? find_held_lock+0x35/0x1d0 [ 472.113682] ? __lock_is_held+0xb6/0x140 [ 472.117777] ? check_same_owner+0x320/0x320 [ 472.122125] ? rcu_note_context_switch+0x710/0x710 [ 472.127084] should_failslab+0xec/0x120 [ 472.131078] kmem_cache_alloc_trace+0x4b/0x740 [ 472.135677] ? __kmalloc_node+0x33/0x70 [ 472.139665] ? __kmalloc_node+0x33/0x70 [ 472.143653] ? rcu_read_lock_sched_held+0x108/0x120 [ 472.148688] __memcg_init_list_lru_node+0x169/0x270 [ 472.153723] ? list_lru_add+0x7c0/0x7c0 [ 472.157717] ? __kmalloc_node+0x47/0x70 [ 472.161708] __list_lru_init+0x544/0x750 [ 472.165784] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 472.171684] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 472.176716] ? lockdep_init_map+0x9/0x10 [ 472.180787] sget_userns+0x6b1/0xe40 [ 472.184502] ? set_anon_super+0x20/0x20 [ 472.188490] ? put_filp+0x90/0x90 [ 472.191948] ? destroy_unused_super.part.6+0xd0/0xd0 2033/05/18 03:38:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(camellia))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 472.197067] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 472.202098] ? perf_trace_lock+0xd6/0x900 [ 472.206265] ? save_stack+0xa3/0xd0 [ 472.209911] ? kasan_slab_alloc+0x12/0x20 [ 472.214075] ? alloc_pid+0xc1/0xa00 [ 472.217723] ? __radix_tree_replace+0x1af/0x310 [ 472.222405] ? radix_tree_delete+0x30/0x30 [ 472.226648] ? node_tag_clear+0xf2/0x180 [ 472.230729] ? proc_get_inode+0x620/0x620 [ 472.234886] mount_ns+0x6d/0x190 [ 472.238266] proc_mount+0x7a/0x90 [ 472.241725] mount_fs+0x66/0x2d0 2033/05/18 03:38:47 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:47 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 472.245110] vfs_kern_mount.part.26+0xc6/0x4a0 [ 472.249821] ? may_umount+0xa0/0xa0 [ 472.253594] ? idr_alloc_cyclic+0x1d6/0x320 [ 472.257932] ? do_raw_spin_trylock+0x190/0x190 [ 472.262524] ? idr_alloc+0x180/0x180 [ 472.266252] kern_mount_data+0x50/0xb0 [ 472.270155] pid_ns_prepare_proc+0x1e/0x80 [ 472.274401] alloc_pid+0x87e/0xa00 [ 472.277957] ? __change_pid+0x400/0x400 [ 472.281943] ? ns_capable_common+0xcf/0x160 [ 472.286279] ? memset+0x31/0x40 [ 472.289567] ? copy_thread_tls+0x268/0x8f0 [ 472.293819] copy_process.part.38+0x2516/0x4bd0 [ 472.298509] ? __cleanup_sighand+0x40/0x40 [ 472.302770] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 472.307973] ? __lock_acquire+0x664/0x3e00 [ 472.312221] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 472.317422] ? perf_trace_lock+0xd6/0x900 [ 472.321588] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 472.326790] ? perf_trace_lock+0xd6/0x900 [ 472.330954] ? mntput_no_expire+0x130/0xa90 [ 472.335295] ? trace_event_raw_event_lock+0x340/0x340 [ 472.340498] ? perf_trace_lock+0xd6/0x900 [ 472.344661] ? lock_acquire+0x1d5/0x580 [ 472.348643] ? trace_hardirqs_off+0x10/0x10 [ 472.352975] ? perf_trace_lock+0xd6/0x900 [ 472.357144] ? find_held_lock+0x35/0x1d0 [ 472.361225] ? perf_trace_lock+0xd6/0x900 [ 472.365385] ? trace_event_raw_event_lock+0x340/0x340 [ 472.370588] ? _parse_integer+0x140/0x140 [ 472.374752] ? trace_hardirqs_off+0x10/0x10 [ 472.379080] ? get_pid_task+0x93/0x140 [ 472.382979] ? perf_trace_lock+0xd6/0x900 [ 472.387143] ? find_held_lock+0x35/0x1d0 [ 472.391219] ? __f_unlock_pos+0x19/0x20 [ 472.395197] ? lock_downgrade+0x980/0x980 [ 472.399352] ? get_pid_task+0xbc/0x140 [ 472.403250] ? proc_fail_nth_write+0x9b/0x1d0 [ 472.407759] ? map_files_get_link+0x3a0/0x3a0 [ 472.412270] _do_fork+0x1f7/0xf70 [ 472.415737] ? fork_idle+0x2d0/0x2d0 [ 472.419460] ? wait_for_completion+0x770/0x770 [ 472.424074] ? __sb_end_write+0xa0/0xd0 [ 472.428072] ? fput+0xd2/0x140 [ 472.431277] ? SyS_write+0x184/0x220 [ 472.435002] ? SyS_read+0x220/0x220 [ 472.438649] SyS_clone+0x37/0x50 [ 472.442018] ? sys_vfork+0x30/0x30 [ 472.445571] do_syscall_64+0x281/0x940 [ 472.449462] ? vmalloc_sync_all+0x30/0x30 [ 472.453620] ? _raw_spin_unlock_irq+0x27/0x70 [ 472.458144] ? finish_task_switch+0x1c1/0x7e0 [ 472.462654] ? syscall_return_slowpath+0x550/0x550 [ 472.467593] ? syscall_return_slowpath+0x2ac/0x550 [ 472.472535] ? prepare_exit_to_usermode+0x350/0x350 [ 472.477565] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 472.482944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 472.487809] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 472.493801] RIP: 0033:0x454e79 2033/05/18 03:38:47 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000), 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:47 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:47 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000), 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 472.496993] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 472.504714] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 472.511992] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 472.519270] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 472.526553] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 472.533835] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000023 2033/05/18 03:38:48 executing program 7 (fault-call:10 fault-nth:36): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:48 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 6: clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000680)={r0, r1+10000000}, 0x8) munlock(&(0x7f000081f000/0x3000)=nil, 0x3000) r2 = dup(0xffffffffffffff9c) inotify_add_watch(r2, &(0x7f0000000080)='./file0\x00', 0x191) fadvise64(r2, 0x0, 0x7fff, 0x7) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000400)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000003000)={0x0, 0x0, 0x20}, &(0x7f0000001ffc)=0xc) mbind(&(0x7f0000885000/0x4000)=nil, 0x4000, 0x8002, &(0x7f0000000000)=0x1, 0x8, 0x1) prctl$getreaper(0x66, &(0x7f0000002ffc)) 2033/05/18 03:38:48 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000), 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000280)={0x800, 0x1, 0x40}) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:48 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0xc) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x22, &(0x7f0000ddfffc)=0x20000000001, 0x4) setsockopt$inet_tcp_int(r6, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r6, &(0x7f0000d9dff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r6, &(0x7f0000009b00)=[{{&(0x7f00000000c0)=@rc={0x1f}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000340)='P', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}}], 0x1, 0x200000c0) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r7, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r9 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r9) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000000880)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x40000001) 2033/05/18 03:38:48 executing program 3: r0 = creat(&(0x7f0000000a00)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:48 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 473.356016] FAULT_INJECTION: forcing a failure. [ 473.356016] name failslab, interval 1, probability 0, space 0, times 0 [ 473.367369] CPU: 1 PID: 28808 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 473.374741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.384106] Call Trace: [ 473.386722] dump_stack+0x194/0x24d [ 473.390379] ? arch_local_irq_restore+0x53/0x53 [ 473.395088] should_fail+0x8c0/0xa40 [ 473.398823] ? is_bpf_text_address+0xa4/0x120 [ 473.403341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 473.408460] ? __kernel_text_address+0xd/0x40 [ 473.412970] ? unwind_get_return_address+0x61/0xa0 [ 473.417925] ? find_held_lock+0x35/0x1d0 [ 473.422002] ? __lock_is_held+0xb6/0x140 [ 473.426096] ? check_same_owner+0x320/0x320 [ 473.430437] ? rcu_note_context_switch+0x710/0x710 [ 473.435393] should_failslab+0xec/0x120 [ 473.439382] kmem_cache_alloc_trace+0x4b/0x740 [ 473.443978] ? __kmalloc_node+0x33/0x70 [ 473.447966] ? __kmalloc_node+0x33/0x70 [ 473.451957] ? rcu_read_lock_sched_held+0x108/0x120 [ 473.456986] __memcg_init_list_lru_node+0x169/0x270 [ 473.461998] ? list_lru_add+0x7c0/0x7c0 [ 473.465964] ? __kmalloc_node+0x47/0x70 [ 473.469924] __list_lru_init+0x544/0x750 [ 473.473969] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 473.479836] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 473.484838] ? lockdep_init_map+0x9/0x10 [ 473.488884] sget_userns+0x6b1/0xe40 [ 473.492577] ? set_anon_super+0x20/0x20 [ 473.496539] ? put_filp+0x90/0x90 [ 473.499978] ? destroy_unused_super.part.6+0xd0/0xd0 [ 473.505065] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 473.510062] ? perf_trace_lock+0xd6/0x900 [ 473.514195] ? save_stack+0xa3/0xd0 [ 473.517808] ? kasan_slab_alloc+0x12/0x20 [ 473.521935] ? alloc_pid+0xc1/0xa00 [ 473.525546] ? __radix_tree_replace+0x1af/0x310 [ 473.530198] ? radix_tree_delete+0x30/0x30 [ 473.534411] ? node_tag_clear+0xf2/0x180 [ 473.538463] ? proc_get_inode+0x620/0x620 [ 473.542589] mount_ns+0x6d/0x190 [ 473.545938] proc_mount+0x7a/0x90 [ 473.549373] mount_fs+0x66/0x2d0 [ 473.552727] vfs_kern_mount.part.26+0xc6/0x4a0 [ 473.557291] ? may_umount+0xa0/0xa0 [ 473.560898] ? idr_alloc_cyclic+0x1d6/0x320 [ 473.565204] ? do_raw_spin_trylock+0x190/0x190 [ 473.569767] ? idr_alloc+0x180/0x180 [ 473.573461] kern_mount_data+0x50/0xb0 [ 473.577330] pid_ns_prepare_proc+0x1e/0x80 [ 473.581547] alloc_pid+0x87e/0xa00 [ 473.585070] ? __change_pid+0x400/0x400 [ 473.589031] ? ns_capable_common+0xcf/0x160 [ 473.593340] ? memset+0x31/0x40 [ 473.596602] ? copy_thread_tls+0x268/0x8f0 [ 473.600825] copy_process.part.38+0x2516/0x4bd0 [ 473.605481] ? __cleanup_sighand+0x40/0x40 [ 473.609706] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 473.614878] ? __lock_acquire+0x664/0x3e00 [ 473.619093] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 473.624266] ? perf_trace_lock+0xd6/0x900 [ 473.628402] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 473.633570] ? perf_trace_lock+0xd6/0x900 [ 473.637697] ? mntput_no_expire+0x130/0xa90 [ 473.642003] ? trace_event_raw_event_lock+0x340/0x340 [ 473.647178] ? perf_trace_lock+0xd6/0x900 [ 473.651311] ? lock_acquire+0x1d5/0x580 [ 473.655267] ? trace_hardirqs_off+0x10/0x10 [ 473.659573] ? perf_trace_lock+0xd6/0x900 [ 473.663710] ? find_held_lock+0x35/0x1d0 [ 473.667756] ? perf_trace_lock+0xd6/0x900 [ 473.671888] ? trace_event_raw_event_lock+0x340/0x340 [ 473.677058] ? _parse_integer+0x140/0x140 [ 473.681192] ? trace_hardirqs_off+0x10/0x10 [ 473.685499] ? get_pid_task+0x93/0x140 [ 473.689369] ? perf_trace_lock+0xd6/0x900 [ 473.693503] ? find_held_lock+0x35/0x1d0 [ 473.697552] ? __f_unlock_pos+0x19/0x20 [ 473.701506] ? lock_downgrade+0x980/0x980 [ 473.705634] ? get_pid_task+0xbc/0x140 [ 473.709502] ? proc_fail_nth_write+0x9b/0x1d0 [ 473.713978] ? map_files_get_link+0x3a0/0x3a0 [ 473.718462] _do_fork+0x1f7/0xf70 [ 473.721901] ? fork_idle+0x2d0/0x2d0 [ 473.725599] ? wait_for_completion+0x770/0x770 [ 473.730183] ? __sb_end_write+0xa0/0xd0 [ 473.734141] ? fput+0xd2/0x140 [ 473.737322] ? SyS_write+0x184/0x220 [ 473.741026] ? SyS_read+0x220/0x220 [ 473.744636] SyS_clone+0x37/0x50 [ 473.747982] ? sys_vfork+0x30/0x30 [ 473.751505] do_syscall_64+0x281/0x940 [ 473.755388] ? vmalloc_sync_all+0x30/0x30 [ 473.759517] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 473.765042] ? syscall_return_slowpath+0x550/0x550 [ 473.769949] ? syscall_return_slowpath+0x2ac/0x550 [ 473.774866] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 473.780212] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 473.785044] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.790214] RIP: 0033:0x454e79 [ 473.793381] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:48 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="51ffd4adf56be7301807682fe3a9f0234e836b1bb588d409f693ac0dabf2005616429be0439d4b9837f625245434b1bd3ca162dd0a92c6105bbd974db1c0ea291a0d833f473bf3db09405b84ff126db225fe6a025d5165981e0d6ea66a7cebadb5a3d14cd88122c4b4714a90f3ef56ffd77274bab2344e4dc91ce359c9604fe54180f36e14063830678b3e81a6e04aa752c59834073ff17de730ba3a5a50197ec23586955b695e02c188eb09e3a952c9f22b50861629d32607148b76417b2070c39c01a9ba0bd6ef425615312a58fe4daa"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:48 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 473.801072] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 473.808319] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 473.815568] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 473.822817] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 473.830065] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000024 [ 473.866412] __report_access: 16 callbacks suppressed [ 473.866423] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28830] [ 473.880974] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[28832] [ 473.897331] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28834] 2033/05/18 03:38:49 executing program 7 (fault-call:10 fault-nth:37): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:49 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:49 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:49 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r8) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:49 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="970ade21242dd329d08ee5baebb0f1d936b16b72a96cf1bd3424e901b0e784852f9fd074595c8055f7c67a00fedabaeb2aab04a3bf944b57892cb722b9759e2276d31dc2855c08b7fbdcabd108dac40e8b326ac7c115517e11973dab3d5ce645cccafd88b036dc"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)) prctl$setptracer(0x59616d61, r3) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:49 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) getresgid(&(0x7f0000000480), &(0x7f0000000680), &(0x7f0000000780)) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) r10 = dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(r10, 0xc04064a0, &(0x7f0000000a40)={&(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1, 0x8, 0x6}) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x81, 0x400) 2033/05/18 03:38:49 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000a00)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000a40)=0x20) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000a80)={r1, 0x35e37185}, &(0x7f0000000ac0)=0x8) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000b00)={{0xa, 0x4e23, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x2e58}, {0xa, 0x4e23, 0x1400, @local={0xfe, 0x80, [], 0xaa}, 0x3ff}, 0x8, [0x6, 0x6, 0x2, 0x400, 0x9, 0xfff, 0x7e, 0x3ff]}, 0x5c) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:49 executing program 6: r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'ip6tnl0\x00', 0x800}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30a) close(r0) capset(&(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x10001}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x80000001) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) poll(&(0x7f0000084ff0), 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000400)=""/123, 0x7b}], 0x1) dup2(r1, 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='syz_tun\x00') fanotify_mark(r2, 0x0, 0x10000, r2, &(0x7f00000004c0)='./file1\x00') write(r2, &(0x7f0000ffdffb)='#', 0x1) accept4$ipx(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)=0x0) sched_getscheduler(r3) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@flushsa={0x64, 0x1c, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@mark={0xc, 0x15, {0x35075d, 0x7}}, @tmpl={0x44, 0x5, [{{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0xa, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x80c0}, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000200)) execveat(r2, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='/dev/vga_arbiter\x00', &(0x7f0000000540)='/r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000007060804002000fffc0c6565643b799365195f1b76"], 0x1000) fchdir(0xffffffffffffffff) r4 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$tun(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="00004f3328e4e7dc9f1fd0f600"], 0x1) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff0000000, 0x5, 0x3, 0x1}, 0x14) [ 474.500637] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28864] [ 474.502782] FAULT_INJECTION: forcing a failure. [ 474.502782] name failslab, interval 1, probability 0, space 0, times 0 [ 474.521638] CPU: 0 PID: 28862 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 474.528839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.538204] Call Trace: [ 474.540815] dump_stack+0x194/0x24d [ 474.544465] ? arch_local_irq_restore+0x53/0x53 2033/05/18 03:38:49 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0x0, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 474.549154] ? __save_stack_trace+0x7e/0xd0 [ 474.553510] should_fail+0x8c0/0xa40 [ 474.557260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 474.562382] ? kasan_kmalloc+0xad/0xe0 [ 474.566292] ? kmem_cache_alloc_trace+0x136/0x740 [ 474.571155] ? __memcg_init_list_lru_node+0x169/0x270 [ 474.576375] ? __list_lru_init+0x544/0x750 [ 474.580631] ? sget_userns+0x6b1/0xe40 [ 474.584543] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 474.589293] ? kern_mount_data+0x50/0xb0 [ 474.593336] ? pid_ns_prepare_proc+0x1e/0x80 [ 474.597726] ? alloc_pid+0x87e/0xa00 [ 474.601421] ? copy_process.part.38+0x2516/0x4bd0 [ 474.606246] ? _do_fork+0x1f7/0xf70 [ 474.609851] ? SyS_clone+0x37/0x50 [ 474.613376] ? find_held_lock+0x35/0x1d0 [ 474.617421] ? __lock_is_held+0xb6/0x140 [ 474.621472] ? check_same_owner+0x320/0x320 [ 474.625780] ? rcu_note_context_switch+0x710/0x710 [ 474.630697] should_failslab+0xec/0x120 [ 474.634655] kmem_cache_alloc_trace+0x4b/0x740 [ 474.639218] ? __kmalloc_node+0x33/0x70 [ 474.643171] ? __kmalloc_node+0x33/0x70 [ 474.647125] ? rcu_read_lock_sched_held+0x108/0x120 [ 474.652124] __memcg_init_list_lru_node+0x169/0x270 [ 474.657697] ? list_lru_add+0x7c0/0x7c0 [ 474.661655] ? __kmalloc_node+0x47/0x70 [ 474.665615] __list_lru_init+0x544/0x750 [ 474.669658] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 474.675530] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 474.680540] ? lockdep_init_map+0x9/0x10 [ 474.684584] sget_userns+0x6b1/0xe40 [ 474.688273] ? set_anon_super+0x20/0x20 [ 474.692231] ? put_filp+0x90/0x90 [ 474.695667] ? destroy_unused_super.part.6+0xd0/0xd0 [ 474.700757] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 474.705757] ? save_stack+0xa3/0xd0 [ 474.709364] ? save_stack+0x43/0xd0 [ 474.712972] ? kasan_slab_alloc+0x12/0x20 [ 474.717098] ? kmem_cache_alloc+0x12e/0x760 [ 474.721398] ? alloc_pid+0xc1/0xa00 [ 474.725011] ? __radix_tree_replace+0x1af/0x310 [ 474.729667] ? radix_tree_delete+0x30/0x30 [ 474.733882] ? node_tag_clear+0xf2/0x180 [ 474.737931] ? proc_get_inode+0x620/0x620 [ 474.742059] mount_ns+0x6d/0x190 [ 474.745408] proc_mount+0x7a/0x90 [ 474.748842] mount_fs+0x66/0x2d0 [ 474.752193] vfs_kern_mount.part.26+0xc6/0x4a0 [ 474.756757] ? may_umount+0xa0/0xa0 [ 474.760365] ? idr_alloc_cyclic+0x1d6/0x320 [ 474.764670] ? do_raw_spin_trylock+0x190/0x190 [ 474.769320] ? idr_alloc+0x180/0x180 [ 474.773023] kern_mount_data+0x50/0xb0 [ 474.776898] pid_ns_prepare_proc+0x1e/0x80 [ 474.781113] alloc_pid+0x87e/0xa00 [ 474.784638] ? __change_pid+0x400/0x400 [ 474.788594] ? ns_capable_common+0xcf/0x160 [ 474.792904] ? memset+0x31/0x40 [ 474.796167] ? copy_thread_tls+0x268/0x8f0 [ 474.800390] copy_process.part.38+0x2516/0x4bd0 [ 474.805053] ? __cleanup_sighand+0x40/0x40 [ 474.809282] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 474.814454] ? __lock_acquire+0x664/0x3e00 [ 474.818670] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 474.823845] ? environ_open+0x80/0x80 [ 474.827640] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 474.832813] ? __lock_acquire+0x664/0x3e00 [ 474.837031] ? mntput_no_expire+0x130/0xa90 [ 474.841335] ? print_irqtrace_events+0x270/0x270 [ 474.846075] ? trace_hardirqs_off+0x10/0x10 [ 474.850375] ? lock_release+0xa40/0xa40 [ 474.854337] ? lock_acquire+0x1d5/0x580 [ 474.858290] ? trace_hardirqs_off+0x10/0x10 [ 474.862596] ? trace_hardirqs_off+0x10/0x10 [ 474.866898] ? __lock_acquire+0x664/0x3e00 [ 474.871112] ? check_same_owner+0x320/0x320 [ 474.875418] ? find_held_lock+0x35/0x1d0 [ 474.879469] ? _parse_integer+0xe9/0x140 [ 474.883525] ? trace_hardirqs_off+0x10/0x10 [ 474.887832] ? _parse_integer+0x140/0x140 [ 474.891966] ? trace_hardirqs_off+0x10/0x10 [ 474.896270] ? get_pid_task+0x93/0x140 [ 474.900138] ? lock_downgrade+0x980/0x980 [ 474.904272] ? find_held_lock+0x35/0x1d0 [ 474.908322] ? __f_unlock_pos+0x19/0x20 [ 474.912276] ? lock_downgrade+0x980/0x980 [ 474.916403] ? get_pid_task+0xbc/0x140 [ 474.920273] ? proc_fail_nth_write+0x9b/0x1d0 [ 474.924751] ? map_files_get_link+0x3a0/0x3a0 [ 474.929238] _do_fork+0x1f7/0xf70 [ 474.932676] ? fork_idle+0x2d0/0x2d0 [ 474.936373] ? wait_for_completion+0x770/0x770 [ 474.940939] ? __lock_is_held+0xb6/0x140 [ 474.944992] ? __sb_end_write+0xa0/0xd0 [ 474.948950] ? fput+0xd2/0x140 [ 474.952124] ? SyS_write+0x184/0x220 [ 474.955818] ? SyS_read+0x220/0x220 [ 474.959430] SyS_clone+0x37/0x50 [ 474.962774] ? sys_vfork+0x30/0x30 [ 474.966296] do_syscall_64+0x281/0x940 [ 474.970164] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 474.975684] ? syscall_return_slowpath+0x550/0x550 [ 474.980596] ? syscall_return_slowpath+0x2ac/0x550 [ 474.985518] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 474.990870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.995702] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2033/05/18 03:38:49 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.000874] RIP: 0033:0x454e79 [ 475.004045] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 475.011735] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 475.018984] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 475.026299] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 475.033648] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 475.040905] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000025 2033/05/18 03:38:49 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r8) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:49 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') [ 475.068458] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28869] [ 475.084898] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28878] 2033/05/18 03:38:50 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="000040001a2c02b7d347eaac8eae988142c3e243fb07579a8239f62c297ff5dfdefb99b48225367e03b6d0c0"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x1, 0x5, 0x12, r0, 0x1f}, 0xfffffffffffffe36) r9 = accept$ax25(r2, &(0x7f0000000040), &(0x7f0000000640)=0xfffffffffffffef8) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0x0, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.244522] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28896] [ 475.261819] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[28898] 2033/05/18 03:38:50 executing program 7 (fault-call:10 fault-nth:38): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:50 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r8) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)=0x2f13, 0x4) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:50 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0x0, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 3: pipe2(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000a80)={0x6, 0xffffffff7fffffff, 0x1}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000980), &(0x7f0000000ac0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r1, 0x5450) r2 = getpgid(0xffffffffffffffff) memfd_create(&(0x7f00000009c0)="636c6561725f72656673007edb", 0x1) syz_open_procfs(r2, &(0x7f0000000a00)='attr/exec\x00') ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r1, r1}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000bc0)=[r3]) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") ioprio_set$pid(0x2, r2, 0x10001) 2033/05/18 03:38:50 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xfe16) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x800010001) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='3}s', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="3232b21cd16b92540b4ee52112e5829dc94800f2f655d5dedb5b7522d048b9f1065fe3ecb5132e89c4900c5d54d7f32d88e509dd3ada6d8b3fe71f91927cc4e0fa6963f48ac0aa310624976ea3efdee5fbab7da3d84d26d498838fc06f3bc45bdc31ebf71343ab2cf4516b699d0ff747fce25e682b7e5ef4a3b749def4d61baa631924ecb9581bfcc03d8edd4077f2f7eb8b472d22bb7edb2a409da2f151ec9741e5dd0ecbcfabe6a081cd62d92311c02096528d51c6a993186162cd1cc23a35"], 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r10 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r11, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r12) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000680)=0x66c949c8077071e1) getsockname$ax25(r10, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept(r0, 0x0, &(0x7f00000008c0)) setsockopt$inet_dccp_buf(r1, 0x21, 0xcd, &(0x7f0000000900)="f2d4aded999700c739c21d39659dcfcaa03c322c4c19f684beef188c4c38040c96ae53d760c890f7cbd10732cf59bc4d6d5276d3a9853dd5c66f6cf30a8545fe2aa78d3bbd339d", 0x47) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x400) r3 = accept4(r2, &(0x7f0000000100)=@nl, &(0x7f0000000000)=0x80, 0x80800) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000180)={0x5, 0x0, 0x7, 0x1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x2000000000000349, &(0x7f0000000040)=@raw=[@generic={0x8, 0x5, 0x5b4f, 0x9}], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0xaa, 0x18}, 0xc) r5 = accept$inet6(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', 0x0, 0x18}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000400)={0x0, 0xfffffffffffffffe}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000480)={0x0, 0x6, 0xaa0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000500)={r6, 0x100000000, 0x3, 0x39, 0xffffffff, 0x6, 0x100000001, 0x3, {r7, @in6={{0xa, 0x4e22, 0x1000, @empty, 0x3}}, 0x9, 0x6, 0x81, 0xfffffffffffffffa, 0x80000000}}, &(0x7f00000005c0)=0xb0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}}}, &(0x7f0000000780)=0xe8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r4, 0x28, &(0x7f00000000c0)}, 0xfffffffffffffe3f) socketpair$inet6(0xa, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x1d, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}, 0xade7, 0x5, 0x5, 0x91, 0x1}, &(0x7f0000000240)=0x98) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f00000007c0)={'nr0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000280)={r8, 0xce09}, 0x8) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r9, 0x0, 0x489, &(0x7f0000000300)={{0xbf, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x0, 'lblc\x00', 0x12, 0x0, 0x7a}, {@empty, 0x4e21, 0x0, 0x6f40, 0x5, 0x8}}, 0x44) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) accept4$inet6(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x0) close(r0) 2033/05/18 03:38:50 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.675422] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[28919] [ 475.706450] FAULT_INJECTION: forcing a failure. [ 475.706450] name failslab, interval 1, probability 0, space 0, times 0 [ 475.717852] CPU: 0 PID: 28923 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 2033/05/18 03:38:50 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.725049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.734411] Call Trace: [ 475.737020] dump_stack+0x194/0x24d [ 475.740670] ? arch_local_irq_restore+0x53/0x53 [ 475.745357] ? __save_stack_trace+0x7e/0xd0 [ 475.749708] should_fail+0x8c0/0xa40 [ 475.753442] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 475.756538] ptrace attach of "/root/syz-executor5"[4497] was attempted by "/root/syz-executor5"[28935] [ 475.758549] ? kasan_kmalloc+0xad/0xe0 2033/05/18 03:38:50 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.758561] ? kmem_cache_alloc_trace+0x136/0x740 [ 475.758576] ? __memcg_init_list_lru_node+0x169/0x270 [ 475.758584] ? __list_lru_init+0x544/0x750 [ 475.758596] ? sget_userns+0x6b1/0xe40 [ 475.790042] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 475.794808] ? kern_mount_data+0x50/0xb0 [ 475.798878] ? pid_ns_prepare_proc+0x1e/0x80 [ 475.803292] ? alloc_pid+0x87e/0xa00 [ 475.807010] ? copy_process.part.38+0x2516/0x4bd0 [ 475.811863] ? _do_fork+0x1f7/0xf70 [ 475.815497] ? SyS_clone+0x37/0x50 [ 475.819053] ? find_held_lock+0x35/0x1d0 2033/05/18 03:38:50 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.823125] ? __lock_is_held+0xb6/0x140 [ 475.827201] ? check_same_owner+0x320/0x320 [ 475.831547] ? rcu_note_context_switch+0x710/0x710 [ 475.836499] should_failslab+0xec/0x120 [ 475.840498] kmem_cache_alloc_trace+0x4b/0x740 [ 475.845109] ? __kmalloc_node+0x33/0x70 [ 475.849097] ? __kmalloc_node+0x33/0x70 [ 475.853085] ? rcu_read_lock_sched_held+0x108/0x120 [ 475.858119] __memcg_init_list_lru_node+0x169/0x270 [ 475.863151] ? list_lru_add+0x7c0/0x7c0 [ 475.867152] ? __kmalloc_node+0x47/0x70 [ 475.871146] __list_lru_init+0x544/0x750 2033/05/18 03:38:50 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x5) fcntl$getownex(r4, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r6 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r8 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r9) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r8, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.875217] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 475.881112] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 475.886137] ? lockdep_init_map+0x9/0x10 [ 475.890198] sget_userns+0x6b1/0xe40 [ 475.893911] ? set_anon_super+0x20/0x20 [ 475.897894] ? put_filp+0x90/0x90 [ 475.901358] ? destroy_unused_super.part.6+0xd0/0xd0 [ 475.906476] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 475.911510] ? perf_trace_lock+0xd6/0x900 [ 475.915670] ? save_stack+0xa3/0xd0 [ 475.919306] ? kasan_slab_alloc+0x12/0x20 2033/05/18 03:38:50 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:50 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 475.923462] ? alloc_pid+0xc1/0xa00 [ 475.927106] ? __radix_tree_replace+0x1af/0x310 [ 475.931790] ? radix_tree_delete+0x30/0x30 [ 475.936035] ? node_tag_clear+0xf2/0x180 [ 475.940111] ? proc_get_inode+0x620/0x620 [ 475.944265] mount_ns+0x6d/0x190 [ 475.947640] proc_mount+0x7a/0x90 [ 475.951101] mount_fs+0x66/0x2d0 [ 475.954481] vfs_kern_mount.part.26+0xc6/0x4a0 [ 475.959079] ? may_umount+0xa0/0xa0 [ 475.962713] ? idr_alloc_cyclic+0x1d6/0x320 [ 475.967046] ? do_raw_spin_trylock+0x190/0x190 [ 475.971641] ? idr_alloc+0x180/0x180 [ 475.975375] kern_mount_data+0x50/0xb0 [ 475.979271] pid_ns_prepare_proc+0x1e/0x80 [ 475.983520] alloc_pid+0x87e/0xa00 [ 475.987070] ? __change_pid+0x400/0x400 [ 475.991050] ? ns_capable_common+0xcf/0x160 [ 475.995387] ? memset+0x31/0x40 [ 475.998672] ? copy_thread_tls+0x268/0x8f0 [ 476.002927] copy_process.part.38+0x2516/0x4bd0 [ 476.007613] ? __cleanup_sighand+0x40/0x40 [ 476.011866] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 476.017071] ? __lock_acquire+0x664/0x3e00 [ 476.021319] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 476.026520] ? perf_trace_lock+0xd6/0x900 [ 476.030682] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 476.035876] ? perf_trace_lock+0xd6/0x900 [ 476.040034] ? mntput_no_expire+0x130/0xa90 [ 476.044374] ? trace_event_raw_event_lock+0x340/0x340 [ 476.049581] ? perf_trace_lock+0xd6/0x900 [ 476.053748] ? lock_acquire+0x1d5/0x580 [ 476.057730] ? trace_hardirqs_off+0x10/0x10 [ 476.062062] ? perf_trace_lock+0xd6/0x900 [ 476.066233] ? find_held_lock+0x35/0x1d0 [ 476.070301] ? perf_trace_lock+0xd6/0x900 [ 476.074462] ? trace_event_raw_event_lock+0x340/0x340 [ 476.079672] ? _parse_integer+0x140/0x140 [ 476.083843] ? trace_hardirqs_off+0x10/0x10 [ 476.088173] ? get_pid_task+0x93/0x140 [ 476.092070] ? perf_trace_lock+0xd6/0x900 [ 476.096230] ? find_held_lock+0x35/0x1d0 [ 476.100307] ? __f_unlock_pos+0x19/0x20 [ 476.104267] ? lock_downgrade+0x980/0x980 [ 476.108394] ? get_pid_task+0xbc/0x140 [ 476.112263] ? proc_fail_nth_write+0x9b/0x1d0 [ 476.116740] ? map_files_get_link+0x3a0/0x3a0 [ 476.121224] _do_fork+0x1f7/0xf70 [ 476.124664] ? fork_idle+0x2d0/0x2d0 [ 476.128363] ? wait_for_completion+0x770/0x770 [ 476.132942] ? __sb_end_write+0xa0/0xd0 [ 476.136896] ? fput+0xd2/0x140 [ 476.140070] ? SyS_write+0x184/0x220 [ 476.143767] ? SyS_read+0x220/0x220 [ 476.147376] SyS_clone+0x37/0x50 [ 476.150723] ? sys_vfork+0x30/0x30 [ 476.154260] do_syscall_64+0x281/0x940 [ 476.158129] ? vmalloc_sync_all+0x30/0x30 [ 476.162256] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 476.167781] ? syscall_return_slowpath+0x550/0x550 [ 476.172690] ? syscall_return_slowpath+0x2ac/0x550 [ 476.177607] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 476.182955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.187786] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.192956] RIP: 0033:0x454e79 [ 476.196124] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 476.203812] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 476.211064] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 476.218313] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 2033/05/18 03:38:51 executing program 7 (fault-call:10 fault-nth:39): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 476.225577] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 476.232827] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000026 [ 476.288826] FAULT_INJECTION: forcing a failure. [ 476.288826] name failslab, interval 1, probability 0, space 0, times 0 [ 476.300125] CPU: 0 PID: 28958 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 476.307310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.316651] Call Trace: [ 476.319240] dump_stack+0x194/0x24d [ 476.322861] ? arch_local_irq_restore+0x53/0x53 [ 476.327519] ? __save_stack_trace+0x7e/0xd0 [ 476.331826] should_fail+0x8c0/0xa40 [ 476.335526] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 476.340619] ? kasan_kmalloc+0xad/0xe0 [ 476.344487] ? kmem_cache_alloc_trace+0x136/0x740 [ 476.349311] ? __memcg_init_list_lru_node+0x169/0x270 [ 476.354481] ? __list_lru_init+0x544/0x750 [ 476.358694] ? sget_userns+0x6b1/0xe40 [ 476.362562] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 476.367295] ? kern_mount_data+0x50/0xb0 [ 476.371334] ? pid_ns_prepare_proc+0x1e/0x80 [ 476.375719] ? alloc_pid+0x87e/0xa00 [ 476.379413] ? copy_process.part.38+0x2516/0x4bd0 [ 476.384236] ? _do_fork+0x1f7/0xf70 [ 476.387842] ? SyS_clone+0x37/0x50 [ 476.391365] ? find_held_lock+0x35/0x1d0 [ 476.395416] ? __lock_is_held+0xb6/0x140 [ 476.399470] ? check_same_owner+0x320/0x320 [ 476.403777] ? rcu_note_context_switch+0x710/0x710 [ 476.408706] should_failslab+0xec/0x120 [ 476.412667] kmem_cache_alloc_trace+0x4b/0x740 [ 476.417240] ? __kmalloc_node+0x33/0x70 [ 476.421203] ? __kmalloc_node+0x33/0x70 [ 476.425161] ? rcu_read_lock_sched_held+0x108/0x120 [ 476.430162] __memcg_init_list_lru_node+0x169/0x270 [ 476.435165] ? list_lru_add+0x7c0/0x7c0 [ 476.439139] ? __kmalloc_node+0x47/0x70 [ 476.443096] __list_lru_init+0x544/0x750 [ 476.447136] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 476.453005] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 476.458016] ? lockdep_init_map+0x9/0x10 [ 476.462065] sget_userns+0x6b1/0xe40 [ 476.465756] ? set_anon_super+0x20/0x20 [ 476.469713] ? put_filp+0x90/0x90 [ 476.473160] ? destroy_unused_super.part.6+0xd0/0xd0 [ 476.478253] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 476.483258] ? save_stack+0xa3/0xd0 [ 476.486874] ? save_stack+0x43/0xd0 [ 476.490492] ? kasan_slab_alloc+0x12/0x20 [ 476.494633] ? kmem_cache_alloc+0x12e/0x760 [ 476.498945] ? alloc_pid+0xc1/0xa00 [ 476.502572] ? __radix_tree_replace+0x1af/0x310 [ 476.507229] ? radix_tree_delete+0x30/0x30 [ 476.511444] ? node_tag_clear+0xf2/0x180 [ 476.515489] ? proc_get_inode+0x620/0x620 [ 476.519623] mount_ns+0x6d/0x190 [ 476.522974] proc_mount+0x7a/0x90 [ 476.526408] mount_fs+0x66/0x2d0 [ 476.529769] vfs_kern_mount.part.26+0xc6/0x4a0 [ 476.534336] ? may_umount+0xa0/0xa0 [ 476.537955] ? idr_alloc_cyclic+0x1d6/0x320 [ 476.542269] ? do_raw_spin_trylock+0x190/0x190 [ 476.546838] ? idr_alloc+0x180/0x180 [ 476.550550] kern_mount_data+0x50/0xb0 [ 476.554434] pid_ns_prepare_proc+0x1e/0x80 [ 476.558667] alloc_pid+0x87e/0xa00 [ 476.562196] ? __change_pid+0x400/0x400 [ 476.566155] ? ns_capable_common+0xcf/0x160 [ 476.570484] ? memset+0x31/0x40 [ 476.573762] ? copy_thread_tls+0x268/0x8f0 [ 476.577984] copy_process.part.38+0x2516/0x4bd0 [ 476.582660] ? __cleanup_sighand+0x40/0x40 [ 476.586903] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 476.592090] ? __lock_acquire+0x664/0x3e00 [ 476.596320] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 476.601498] ? environ_open+0x80/0x80 [ 476.605285] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 476.610456] ? __lock_acquire+0x664/0x3e00 [ 476.614674] ? mntput_no_expire+0x130/0xa90 [ 476.618982] ? print_irqtrace_events+0x270/0x270 [ 476.623729] ? trace_hardirqs_off+0x10/0x10 [ 476.628041] ? lock_release+0xa40/0xa40 [ 476.632006] ? lock_acquire+0x1d5/0x580 [ 476.635972] ? trace_hardirqs_off+0x10/0x10 [ 476.640284] ? trace_hardirqs_off+0x10/0x10 [ 476.644593] ? __lock_acquire+0x664/0x3e00 [ 476.648817] ? check_same_owner+0x320/0x320 [ 476.653132] ? find_held_lock+0x35/0x1d0 [ 476.657782] ? _parse_integer+0xe9/0x140 [ 476.661833] ? trace_hardirqs_off+0x10/0x10 [ 476.666141] ? _parse_integer+0x140/0x140 [ 476.670270] ? trace_hardirqs_off+0x10/0x10 [ 476.674570] ? get_pid_task+0x93/0x140 [ 476.678433] ? lock_downgrade+0x980/0x980 [ 476.682561] ? find_held_lock+0x35/0x1d0 [ 476.686625] ? __f_unlock_pos+0x19/0x20 [ 476.690579] ? lock_downgrade+0x980/0x980 [ 476.694716] ? get_pid_task+0xbc/0x140 [ 476.698590] ? proc_fail_nth_write+0x9b/0x1d0 [ 476.703084] ? map_files_get_link+0x3a0/0x3a0 [ 476.707579] _do_fork+0x1f7/0xf70 [ 476.711023] ? fork_idle+0x2d0/0x2d0 [ 476.714723] ? wait_for_completion+0x770/0x770 [ 476.719291] ? __lock_is_held+0xb6/0x140 [ 476.723340] ? __sb_end_write+0xa0/0xd0 [ 476.727303] ? fput+0xd2/0x140 [ 476.730489] ? SyS_write+0x184/0x220 [ 476.734215] ? SyS_read+0x220/0x220 [ 476.737854] SyS_clone+0x37/0x50 [ 476.741217] ? sys_vfork+0x30/0x30 [ 476.744755] do_syscall_64+0x281/0x940 [ 476.748640] ? vmalloc_sync_all+0x30/0x30 [ 476.752783] ? _raw_spin_unlock_irq+0x27/0x70 [ 476.757274] ? finish_task_switch+0x1c1/0x7e0 [ 476.761766] ? syscall_return_slowpath+0x550/0x550 [ 476.766689] ? syscall_return_slowpath+0x2ac/0x550 [ 476.771613] ? prepare_exit_to_usermode+0x350/0x350 [ 476.776627] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 476.781989] ? trace_hardirqs_off_thunk+0x1a/0x1c 2033/05/18 03:38:51 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000480)={0xffffffff}, 0x8) r1 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x9, 0x1, 0xa2, 0x21}, 0x14) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) fchdir(r2) mmap(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0xc, 0x41030, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000540)='./file2\x00', 0xc1) remap_file_pages(&(0x7f0000fec000/0x3000)=nil, 0x3000, 0xc, 0x8, 0x10) recvfrom$unix(r3, &(0x7f0000000240)=""/37, 0x25, 0x12000, &(0x7f00000003c0)=@file={0x1, './control/file0\x00'}, 0x6e) write$cgroup_type(r3, &(0x7f0000000040)='threaded\x00', 0xffc5) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000300)='./control\x00', 0x81000000) inotify_add_watch(r4, &(0x7f0000c31000)='./control\x00', 0x86000006) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./control/file1\x00', 0x40, 0x48) fchdir(r5) execveat(r5, &(0x7f0000001ff8)='./file0\x00', &(0x7f0000000ff0), &(0x7f0000001fe4)=[&(0x7f0000000000)='/dev/vcs\x00', &(0x7f0000001000)="747275737465641e00", &(0x7f0000001fff)='\x00'], 0x1000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r7 = creat(&(0x7f00000000c0)='./file1\x00', 0x14) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000140)={0x8, 0x52d, 0x1, 0x0, 0xacc, 0x80000000}, 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x0, 0x30, 0x4, 0x200}, &(0x7f0000000340)=0x18) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000380), 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0xfffffffffffffffa}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=r8, @ANYBLOB="070700000000000000000000ffff82e71238148ec1cb8adcf7d277c6f29e8fac3a9c61e58287120773e282284af1c80e20586e2eae36740565f8b19eedc2f210500c058f8fbfd699e03f7e9aacc633568e8d1fd2d8503d94d7d5c0ea6bcae51826f9a7a86530a07bf521138355e91eb112095ae5702931f08f8cd8cae68f636fc4740ce56e64e87450163e9393fe8968aa7f00d3ab82b3711824a33512722c2e2220fccac27be98b44c4d0000000000000000000000000000000a0cda00000000000000000000000d382af7d508ca93c73bc6de9779d3da900df3151ddca7ea90b25d6f4c926d5bf9a93c2fa9faa72a19cc7c12699657413de51940af460820c645e449111f5fcf50863059d46c4a4e34c137ac795365affcf09"], 0x2) syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x1, 0x111140) fstatfs(r6, &(0x7f0000000180)=""/144) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 2033/05/18 03:38:51 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:51 executing program 7 (fault-call:10 fault-nth:40): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:51 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:51 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x0, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:51 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r2 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r3 = fcntl$getown(r2, 0x9) r4 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000040)) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r6, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r7 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r5, 0x540e, 0x4) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'bpq0\x00'}}) close(r5) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getdents64(r0, &(0x7f0000000680)=""/14, 0xe) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) accept$inet(r1, &(0x7f0000000280)={0x0, 0x0, @loopback}, &(0x7f0000000480)=0x10) write$cgroup_int(r7, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r7, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r4, r5) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) [ 476.786833] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.792014] RIP: 0033:0x454e79 [ 476.795192] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 476.802899] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 476.810169] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 476.817446] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 476.824721] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 476.831990] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000027 2033/05/18 03:38:51 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="0100008001996b12c569cb6641c1cb388ad79e46d3664578f46680f68b0410db6e27bd7cfaef53a6fdd6046b6db8cdda6d05419cf218e438b7"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:51 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 476.920624] FAULT_INJECTION: forcing a failure. [ 476.920624] name failslab, interval 1, probability 0, space 0, times 0 [ 476.932017] CPU: 0 PID: 28971 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 476.939219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.948586] Call Trace: [ 476.951189] dump_stack+0x194/0x24d [ 476.954849] ? arch_local_irq_restore+0x53/0x53 [ 476.959541] ? __save_stack_trace+0x7e/0xd0 [ 476.963890] should_fail+0x8c0/0xa40 [ 476.967622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 476.972742] ? kasan_kmalloc+0xad/0xe0 [ 476.976622] ? kmem_cache_alloc_trace+0x136/0x740 [ 476.981449] ? __memcg_init_list_lru_node+0x169/0x270 [ 476.986620] ? __list_lru_init+0x544/0x750 [ 476.990837] ? sget_userns+0x6b1/0xe40 [ 476.994708] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 476.999443] ? kern_mount_data+0x50/0xb0 [ 477.003484] ? pid_ns_prepare_proc+0x1e/0x80 [ 477.007873] ? alloc_pid+0x87e/0xa00 [ 477.011568] ? copy_process.part.38+0x2516/0x4bd0 [ 477.016391] ? _do_fork+0x1f7/0xf70 [ 477.019996] ? SyS_clone+0x37/0x50 [ 477.023527] ? find_held_lock+0x35/0x1d0 [ 477.027575] ? __lock_is_held+0xb6/0x140 [ 477.031626] ? check_same_owner+0x320/0x320 [ 477.035932] ? rcu_note_context_switch+0x710/0x710 [ 477.040850] should_failslab+0xec/0x120 [ 477.044808] kmem_cache_alloc_trace+0x4b/0x740 [ 477.049369] ? __kmalloc_node+0x33/0x70 [ 477.053320] ? __kmalloc_node+0x33/0x70 [ 477.057277] ? rcu_read_lock_sched_held+0x108/0x120 [ 477.062276] __memcg_init_list_lru_node+0x169/0x270 [ 477.067277] ? list_lru_add+0x7c0/0x7c0 [ 477.071236] ? __kmalloc_node+0x47/0x70 [ 477.075199] __list_lru_init+0x544/0x750 [ 477.079243] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 477.085114] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 477.090115] ? lockdep_init_map+0x9/0x10 [ 477.094156] sget_userns+0x6b1/0xe40 [ 477.097846] ? set_anon_super+0x20/0x20 [ 477.101804] ? put_filp+0x90/0x90 [ 477.105240] ? destroy_unused_super.part.6+0xd0/0xd0 [ 477.110328] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 477.115322] ? perf_trace_lock+0xd6/0x900 [ 477.119453] ? save_stack+0xa3/0xd0 [ 477.123064] ? kasan_slab_alloc+0x12/0x20 [ 477.127194] ? alloc_pid+0xc1/0xa00 [ 477.130806] ? __radix_tree_replace+0x1af/0x310 [ 477.135458] ? radix_tree_delete+0x30/0x30 [ 477.139678] ? node_tag_clear+0xf2/0x180 [ 477.143732] ? proc_get_inode+0x620/0x620 [ 477.147864] mount_ns+0x6d/0x190 [ 477.151212] proc_mount+0x7a/0x90 [ 477.154651] mount_fs+0x66/0x2d0 [ 477.158004] vfs_kern_mount.part.26+0xc6/0x4a0 [ 477.162575] ? may_umount+0xa0/0xa0 [ 477.166181] ? idr_alloc_cyclic+0x1d6/0x320 [ 477.170484] ? do_raw_spin_trylock+0x190/0x190 [ 477.175047] ? idr_alloc+0x180/0x180 [ 477.178745] kern_mount_data+0x50/0xb0 [ 477.182614] pid_ns_prepare_proc+0x1e/0x80 [ 477.186826] alloc_pid+0x87e/0xa00 [ 477.190350] ? __change_pid+0x400/0x400 [ 477.194304] ? ns_capable_common+0xcf/0x160 [ 477.198613] ? memset+0x31/0x40 [ 477.201874] ? copy_thread_tls+0x268/0x8f0 [ 477.206093] copy_process.part.38+0x2516/0x4bd0 [ 477.210753] ? __cleanup_sighand+0x40/0x40 [ 477.214980] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 477.220157] ? __lock_acquire+0x664/0x3e00 [ 477.224372] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 477.229545] ? perf_trace_lock+0xd6/0x900 [ 477.233683] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 477.238850] ? perf_trace_lock+0xd6/0x900 [ 477.242979] ? mntput_no_expire+0x130/0xa90 [ 477.247286] ? trace_event_raw_event_lock+0x340/0x340 [ 477.252453] ? perf_trace_lock+0xd6/0x900 [ 477.256586] ? lock_acquire+0x1d5/0x580 [ 477.260542] ? trace_hardirqs_off+0x10/0x10 [ 477.264844] ? perf_trace_lock+0xd6/0x900 [ 477.268996] ? find_held_lock+0x35/0x1d0 [ 477.273049] ? perf_trace_lock+0xd6/0x900 [ 477.277182] ? trace_event_raw_event_lock+0x340/0x340 [ 477.282353] ? _parse_integer+0x140/0x140 [ 477.286491] ? trace_hardirqs_off+0x10/0x10 [ 477.290800] ? get_pid_task+0x93/0x140 [ 477.294672] ? perf_trace_lock+0xd6/0x900 [ 477.298803] ? find_held_lock+0x35/0x1d0 [ 477.302851] ? __f_unlock_pos+0x19/0x20 [ 477.306808] ? lock_downgrade+0x980/0x980 [ 477.310934] ? get_pid_task+0xbc/0x140 [ 477.314804] ? proc_fail_nth_write+0x9b/0x1d0 [ 477.319278] ? map_files_get_link+0x3a0/0x3a0 [ 477.323761] _do_fork+0x1f7/0xf70 [ 477.327200] ? fork_idle+0x2d0/0x2d0 [ 477.330894] ? wait_for_completion+0x770/0x770 [ 477.335479] ? __sb_end_write+0xa0/0xd0 [ 477.339437] ? fput+0xd2/0x140 [ 477.342610] ? SyS_write+0x184/0x220 [ 477.346307] ? SyS_read+0x220/0x220 [ 477.349915] SyS_clone+0x37/0x50 [ 477.353260] ? sys_vfork+0x30/0x30 [ 477.356786] do_syscall_64+0x281/0x940 [ 477.360653] ? vmalloc_sync_all+0x30/0x30 [ 477.364780] ? _raw_spin_unlock_irq+0x27/0x70 [ 477.369253] ? finish_task_switch+0x1c1/0x7e0 [ 477.373728] ? syscall_return_slowpath+0x550/0x550 [ 477.378635] ? syscall_return_slowpath+0x2ac/0x550 [ 477.383545] ? prepare_exit_to_usermode+0x350/0x350 [ 477.388546] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 477.393894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.398720] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.403890] RIP: 0033:0x454e79 [ 477.407058] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 477.414749] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 2033/05/18 03:38:52 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:52 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x0, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:52 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:52 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 477.422002] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 477.429256] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 477.436509] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 477.443763] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000028 2033/05/18 03:38:52 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000700)={r10, 0xb6, "d68ed0ac4b3a33f9158cc795b8250b1e18d71cedffaf61a776c9f6e6af45e1c2b8dbba38b642bd15d587022ed1049cedc147be1f6ab17290162faf6f694b73e5ce2e3bbfa09e201a02c323e4b03dd4a176d401bc74654d037afff16a1ff060d797f4382ae89d172b7b8512a5206b0715a105e7dc3fdb9abe5f4fb5b5c564cec5a8e119c2543778f5f2a4deb306e5daad04a27c8c5fca36ffb81047db11b7e4702d58c8bac545a45a582df4be661f452bcc1ce2e032c4"}, &(0x7f00000007c0)=0xbe) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:52 executing program 7 (fault-call:10 fault-nth:41): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 477.598520] FAULT_INJECTION: forcing a failure. [ 477.598520] name failslab, interval 1, probability 0, space 0, times 0 [ 477.609869] CPU: 1 PID: 29005 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 477.617071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.626435] Call Trace: [ 477.629045] dump_stack+0x194/0x24d [ 477.632697] ? arch_local_irq_restore+0x53/0x53 [ 477.637388] ? __save_stack_trace+0x7e/0xd0 [ 477.641734] should_fail+0x8c0/0xa40 [ 477.645472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 477.650593] ? kasan_kmalloc+0xad/0xe0 [ 477.654494] ? kmem_cache_alloc_trace+0x136/0x740 [ 477.659343] ? __memcg_init_list_lru_node+0x169/0x270 [ 477.664546] ? __list_lru_init+0x544/0x750 [ 477.668790] ? sget_userns+0x6b1/0xe40 [ 477.672669] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 477.677403] ? kern_mount_data+0x50/0xb0 [ 477.681442] ? pid_ns_prepare_proc+0x1e/0x80 [ 477.685832] ? alloc_pid+0x87e/0xa00 [ 477.689525] ? copy_process.part.38+0x2516/0x4bd0 [ 477.694344] ? _do_fork+0x1f7/0xf70 [ 477.697947] ? SyS_clone+0x37/0x50 [ 477.701471] ? find_held_lock+0x35/0x1d0 [ 477.705517] ? __lock_is_held+0xb6/0x140 [ 477.709570] ? check_same_owner+0x320/0x320 [ 477.713874] ? rcu_note_context_switch+0x710/0x710 [ 477.718795] should_failslab+0xec/0x120 [ 477.722752] kmem_cache_alloc_trace+0x4b/0x740 [ 477.727317] ? __kmalloc_node+0x33/0x70 [ 477.731270] ? __kmalloc_node+0x33/0x70 [ 477.735226] ? rcu_read_lock_sched_held+0x108/0x120 [ 477.740226] __memcg_init_list_lru_node+0x169/0x270 [ 477.745225] ? list_lru_add+0x7c0/0x7c0 [ 477.749182] ? __kmalloc_node+0x47/0x70 [ 477.753143] __list_lru_init+0x544/0x750 [ 477.757191] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 477.763064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 477.768067] ? lockdep_init_map+0x9/0x10 [ 477.772112] sget_userns+0x6b1/0xe40 [ 477.775803] ? set_anon_super+0x20/0x20 [ 477.779759] ? put_filp+0x90/0x90 [ 477.783193] ? destroy_unused_super.part.6+0xd0/0xd0 [ 477.788280] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 477.793279] ? save_stack+0xa3/0xd0 [ 477.796885] ? save_stack+0x43/0xd0 [ 477.800495] ? kasan_slab_alloc+0x12/0x20 [ 477.804620] ? kmem_cache_alloc+0x12e/0x760 [ 477.808916] ? alloc_pid+0xc1/0xa00 [ 477.812528] ? __radix_tree_replace+0x1af/0x310 [ 477.817178] ? radix_tree_delete+0x30/0x30 [ 477.821392] ? node_tag_clear+0xf2/0x180 [ 477.825441] ? proc_get_inode+0x620/0x620 [ 477.829567] mount_ns+0x6d/0x190 [ 477.832916] proc_mount+0x7a/0x90 [ 477.836357] mount_fs+0x66/0x2d0 [ 477.839705] vfs_kern_mount.part.26+0xc6/0x4a0 [ 477.844270] ? may_umount+0xa0/0xa0 [ 477.847876] ? idr_alloc_cyclic+0x1d6/0x320 [ 477.852180] ? do_raw_spin_trylock+0x190/0x190 [ 477.856739] ? idr_alloc+0x180/0x180 [ 477.860434] kern_mount_data+0x50/0xb0 [ 477.864302] pid_ns_prepare_proc+0x1e/0x80 [ 477.868518] alloc_pid+0x87e/0xa00 [ 477.872045] ? __change_pid+0x400/0x400 [ 477.876002] ? ns_capable_common+0xcf/0x160 [ 477.880316] ? memset+0x31/0x40 [ 477.883577] ? copy_thread_tls+0x268/0x8f0 [ 477.887798] copy_process.part.38+0x2516/0x4bd0 [ 477.892457] ? __cleanup_sighand+0x40/0x40 [ 477.896684] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 477.901858] ? __lock_acquire+0x664/0x3e00 [ 477.906071] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 477.911241] ? environ_open+0x80/0x80 [ 477.915039] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 477.920208] ? __lock_acquire+0x664/0x3e00 [ 477.924420] ? mntput_no_expire+0x130/0xa90 [ 477.928727] ? print_irqtrace_events+0x270/0x270 [ 477.933462] ? trace_hardirqs_off+0x10/0x10 [ 477.937761] ? lock_release+0xa40/0xa40 [ 477.941720] ? lock_acquire+0x1d5/0x580 [ 477.945674] ? trace_hardirqs_off+0x10/0x10 [ 477.949976] ? trace_hardirqs_off+0x10/0x10 [ 477.954283] ? __lock_acquire+0x664/0x3e00 [ 477.958499] ? check_same_owner+0x320/0x320 [ 477.962808] ? find_held_lock+0x35/0x1d0 [ 477.966860] ? _parse_integer+0xe9/0x140 [ 477.970909] ? trace_hardirqs_off+0x10/0x10 [ 477.975213] ? _parse_integer+0x140/0x140 [ 477.979347] ? trace_hardirqs_off+0x10/0x10 [ 477.983653] ? get_pid_task+0x93/0x140 [ 477.987523] ? lock_downgrade+0x980/0x980 [ 477.991656] ? find_held_lock+0x35/0x1d0 [ 477.995704] ? __f_unlock_pos+0x19/0x20 [ 477.999661] ? lock_downgrade+0x980/0x980 [ 478.003792] ? get_pid_task+0xbc/0x140 [ 478.007662] ? proc_fail_nth_write+0x9b/0x1d0 [ 478.012139] ? map_files_get_link+0x3a0/0x3a0 [ 478.016620] _do_fork+0x1f7/0xf70 [ 478.020062] ? fork_idle+0x2d0/0x2d0 [ 478.023756] ? wait_for_completion+0x770/0x770 [ 478.028322] ? __lock_is_held+0xb6/0x140 [ 478.032374] ? __sb_end_write+0xa0/0xd0 [ 478.036329] ? fput+0xd2/0x140 [ 478.039506] ? SyS_write+0x184/0x220 [ 478.043201] ? SyS_read+0x220/0x220 [ 478.046812] SyS_clone+0x37/0x50 [ 478.050155] ? sys_vfork+0x30/0x30 [ 478.053680] do_syscall_64+0x281/0x940 [ 478.057549] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 478.063066] ? syscall_return_slowpath+0x550/0x550 [ 478.067975] ? syscall_return_slowpath+0x2ac/0x550 [ 478.072892] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 478.078238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.083068] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.088237] RIP: 0033:0x454e79 [ 478.091405] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2033/05/18 03:38:53 executing program 6: unlink(&(0x7f0000000080)='./file0/file0\x00') r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x9516}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge0\x00'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006980)=0xe8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000580)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000640)={'raw\x00'}, &(0x7f0000000180)=0x24) setgroups(0x0, &(0x7f0000000200)) getrandom(&(0x7f0000000900)=""/5, 0x5, 0x0) close(0xffffffffffffffff) capset(&(0x7f0000000000), &(0x7f0000000040)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000c80)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) 2033/05/18 03:38:53 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:53 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x0, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:53 executing program 0: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r1, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r8) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:53 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000680)=0x8) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0xfffffec7) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xfffbffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="050600a87b8b4b68ac72c809741c48ec1aced887c5aeea8448eb0299c2d391ceeabb0a08917a0ea6e786bb9d6edc81f1deea891aade199739934895f73c09d68cbf5cac571250fe1d31df9fbb2981fb90c4a53cfa42ad9"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:53 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000a00)) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r3, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000003031900030007000000068100023b0509000100010100ff1ffe58", 0x1f}], 0x1) ioctl$void(r0, 0xc0045878) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) r4 = syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000a40)=0x1000) 2033/05/18 03:38:53 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:53 executing program 7 (fault-call:10 fault-nth:42): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 478.099097] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 478.106346] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 478.113596] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 478.120844] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 478.128095] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000029 [ 478.242591] FAULT_INJECTION: forcing a failure. [ 478.242591] name failslab, interval 1, probability 0, space 0, times 0 [ 478.253938] CPU: 1 PID: 29025 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 478.261131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.270496] Call Trace: [ 478.273110] dump_stack+0x194/0x24d [ 478.276763] ? arch_local_irq_restore+0x53/0x53 [ 478.281445] ? __save_stack_trace+0x7e/0xd0 [ 478.285788] should_fail+0x8c0/0xa40 [ 478.289512] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 478.294605] ? kasan_kmalloc+0xad/0xe0 [ 478.298472] ? kmem_cache_alloc_trace+0x136/0x740 [ 478.303294] ? __memcg_init_list_lru_node+0x169/0x270 [ 478.308461] ? __list_lru_init+0x544/0x750 [ 478.312676] ? sget_userns+0x6b1/0xe40 [ 478.316573] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 478.321313] ? kern_mount_data+0x50/0xb0 [ 478.325354] ? pid_ns_prepare_proc+0x1e/0x80 [ 478.329747] ? alloc_pid+0x87e/0xa00 [ 478.333441] ? copy_process.part.38+0x2516/0x4bd0 [ 478.338264] ? _do_fork+0x1f7/0xf70 [ 478.341871] ? SyS_clone+0x37/0x50 [ 478.345399] ? find_held_lock+0x35/0x1d0 [ 478.349451] ? __lock_is_held+0xb6/0x140 [ 478.353512] ? check_same_owner+0x320/0x320 [ 478.357819] ? rcu_note_context_switch+0x710/0x710 [ 478.362741] should_failslab+0xec/0x120 [ 478.366699] kmem_cache_alloc_trace+0x4b/0x740 [ 478.371261] ? __kmalloc_node+0x33/0x70 [ 478.375216] ? __kmalloc_node+0x33/0x70 [ 478.379171] ? rcu_read_lock_sched_held+0x108/0x120 [ 478.384175] __memcg_init_list_lru_node+0x169/0x270 [ 478.389177] ? list_lru_add+0x7c0/0x7c0 [ 478.393134] ? __kmalloc_node+0x47/0x70 [ 478.397096] __list_lru_init+0x544/0x750 [ 478.401143] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 478.407015] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 478.412028] ? lockdep_init_map+0x9/0x10 [ 478.416075] sget_userns+0x6b1/0xe40 [ 478.419768] ? set_anon_super+0x20/0x20 [ 478.423724] ? put_filp+0x90/0x90 [ 478.427158] ? destroy_unused_super.part.6+0xd0/0xd0 [ 478.432244] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 478.437241] ? perf_trace_lock+0xd6/0x900 [ 478.441372] ? save_stack+0xa3/0xd0 [ 478.444981] ? kasan_slab_alloc+0x12/0x20 [ 478.449110] ? alloc_pid+0xc1/0xa00 [ 478.452720] ? __radix_tree_replace+0x1af/0x310 [ 478.457371] ? radix_tree_delete+0x30/0x30 [ 478.461583] ? node_tag_clear+0xf2/0x180 [ 478.465633] ? proc_get_inode+0x620/0x620 [ 478.469758] mount_ns+0x6d/0x190 [ 478.473107] proc_mount+0x7a/0x90 [ 478.476543] mount_fs+0x66/0x2d0 [ 478.479897] vfs_kern_mount.part.26+0xc6/0x4a0 [ 478.484460] ? may_umount+0xa0/0xa0 [ 478.488068] ? idr_alloc_cyclic+0x1d6/0x320 [ 478.492371] ? do_raw_spin_trylock+0x190/0x190 [ 478.496934] ? idr_alloc+0x180/0x180 [ 478.500631] kern_mount_data+0x50/0xb0 [ 478.504501] pid_ns_prepare_proc+0x1e/0x80 [ 478.508714] alloc_pid+0x87e/0xa00 [ 478.512240] ? __change_pid+0x400/0x400 [ 478.516196] ? ns_capable_common+0xcf/0x160 [ 478.520508] ? memset+0x31/0x40 [ 478.523771] ? copy_thread_tls+0x268/0x8f0 [ 478.527995] copy_process.part.38+0x2516/0x4bd0 [ 478.532657] ? __cleanup_sighand+0x40/0x40 [ 478.536883] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 478.542055] ? __lock_acquire+0x664/0x3e00 [ 478.546268] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 478.551442] ? perf_trace_lock+0xd6/0x900 [ 478.555576] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 478.560747] ? perf_trace_lock+0xd6/0x900 [ 478.564877] ? mntput_no_expire+0x130/0xa90 [ 478.569183] ? trace_event_raw_event_lock+0x340/0x340 [ 478.574351] ? perf_trace_lock+0xd6/0x900 [ 478.578483] ? lock_acquire+0x1d5/0x580 [ 478.582442] ? trace_hardirqs_off+0x10/0x10 [ 478.586750] ? perf_trace_lock+0xd6/0x900 [ 478.590890] ? find_held_lock+0x35/0x1d0 [ 478.594935] ? perf_trace_lock+0xd6/0x900 [ 478.599087] ? trace_event_raw_event_lock+0x340/0x340 [ 478.604265] ? _parse_integer+0x140/0x140 [ 478.608401] ? trace_hardirqs_off+0x10/0x10 [ 478.612705] ? get_pid_task+0x93/0x140 [ 478.616575] ? perf_trace_lock+0xd6/0x900 [ 478.620708] ? find_held_lock+0x35/0x1d0 [ 478.624757] ? __f_unlock_pos+0x19/0x20 [ 478.628713] ? lock_downgrade+0x980/0x980 [ 478.632841] ? get_pid_task+0xbc/0x140 [ 478.636713] ? proc_fail_nth_write+0x9b/0x1d0 [ 478.641191] ? map_files_get_link+0x3a0/0x3a0 [ 478.645705] _do_fork+0x1f7/0xf70 [ 478.649146] ? fork_idle+0x2d0/0x2d0 [ 478.652845] ? wait_for_completion+0x770/0x770 [ 478.657445] ? __sb_end_write+0xa0/0xd0 [ 478.661405] ? fput+0xd2/0x140 [ 478.664584] ? SyS_write+0x184/0x220 [ 478.668281] ? SyS_read+0x220/0x220 [ 478.671895] SyS_clone+0x37/0x50 [ 478.675242] ? sys_vfork+0x30/0x30 [ 478.678764] do_syscall_64+0x281/0x940 [ 478.682662] ? vmalloc_sync_all+0x30/0x30 [ 478.686793] ? _raw_spin_unlock_irq+0x27/0x70 [ 478.691271] ? finish_task_switch+0x1c1/0x7e0 [ 478.695748] ? syscall_return_slowpath+0x550/0x550 [ 478.700658] ? syscall_return_slowpath+0x2ac/0x550 [ 478.705569] ? prepare_exit_to_usermode+0x350/0x350 [ 478.710567] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 478.715914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.720745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.725916] RIP: 0033:0x454e79 [ 478.729085] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 478.736779] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 478.744035] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 478.751289] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 478.758541] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 478.765792] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000002a 2033/05/18 03:38:54 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x0, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:54 executing program 0: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r1, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r8) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:54 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f0000000240)='./file0\x00', r8, r7) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:54 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) setsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000000bc0)=0x81dc, 0x4) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000b80)) clock_gettime(0x0, &(0x7f0000000a00)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000ac0)=[{0x6, 0x5, 0x7fffffff, 0x80, @time={r1, r2+10000000}, {0x0, 0x2b}, {0x5, 0x7}, @ext={0x61, &(0x7f0000000a40)="90630701a4847b6986c32d29f96e18c9d4972b5cad8a47ed28de71623dfafa1f7aa940c8d9968244091e9782397e93db05d793049cf649c2c10aa376eeec8b275abe9023a4cfe829d83f4be7b60879b8803a410e3a45d9c0a94ddfe10df6bb9772"}}, {0x8, 0x1, 0x5, 0x5882, @time, {0x5, 0x1}, {0x5, 0x3}, @connect={{0x1, 0x8f}, {0x8, 0x3}}}, {0xfff, 0x4, 0x4, 0x5, @tick=0x2, {0x200, 0x5}, {0x5, 0x1000}, @raw8={"d28d6fe46399e2d15d5f5042"}}], 0x90) 2033/05/18 03:38:54 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:54 executing program 7 (fault-call:10 fault-nth:43): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:54 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x7) fcntl$getownex(r5, 0x10, &(0x7f00000005c0)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000700)={'ipddp0\x00', 0x0}) connect$packet(r2, &(0x7f0000000740)={0x11, 0x18, r9, 0x1, 0x0, 0x6, @random="bfedbd1a3698"}, 0x14) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="050600a87b7eb60fa8f1f1871ffa370405e15a6a4816b3419ff1f60f3ffc53eeafca3218b68b93c907a35601c11801cadbbe11c738c559dbf6a6ccb5a71ce135f4a2406904e4240757d7667a072721c398eb12fbbbf53480ef34733514ed1885d1ae5791339c0ff2db5c13fef288c81e6cb58ffdae2804000000000000004e406cfcb130c505272e398f734d471a8ccad2df659b552d464de1eebb3f6fbc66a03ca7cf0d1c61dd59443f"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r10 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r11, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r12) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r10, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r2, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1f, 0x3f, 0x81, 0x7, 0xfff, 0x1, 0x81cb, 0x6, 0x2, 0x180d, 0x8, 0x0, 0xf9]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r3, 0x100000001, 0x0, 0x4, 0x7, 0x3ff}, &(0x7f0000000900)=0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0x7, 0x8001, 0xffffffffffffff80, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2, 0x4e22}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={r4}, 0x8) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000940)) r5 = getpid() process_vm_readv(r5, &(0x7f0000000200), 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000540)=""/220, 0xdc}, {&(0x7f0000000700)=""/212, 0xd4}], 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x1, 0x1f, 0xe0000000, 0xcc5}, &(0x7f0000000180)=0x98) r6 = syz_open_pts(0xffffffffffffffff, 0x2) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000001300)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) fstat(r1, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000002f00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2004010}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000980)={0x10, 0x30, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000002e00)=[@rights={0x38, 0x1, 0x1, [r6, r6, r2, r6, r1, r2, r1, r2, r6, r2]}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r5, r9, r10}, @rights={0x28, 0x1, 0x1, [r6, r6, r1, r2, r1]}, @rights={0x18, 0x1, 0x1, [r6, r6]}, @rights={0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r6, r1]}], 0xe0, 0x40000}, 0x8804) fchmod(r0, 0x80) dup3(0xffffffffffffffff, r0, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) [ 479.456131] __report_access: 14 callbacks suppressed [ 479.456142] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[29053] [ 479.482784] FAULT_INJECTION: forcing a failure. [ 479.482784] name failslab, interval 1, probability 0, space 0, times 0 [ 479.494124] CPU: 0 PID: 29051 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 479.495891] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[29057] [ 479.501321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.501327] Call Trace: [ 479.501352] dump_stack+0x194/0x24d [ 479.501369] ? arch_local_irq_restore+0x53/0x53 [ 479.501383] ? __save_stack_trace+0x7e/0xd0 [ 479.501407] should_fail+0x8c0/0xa40 [ 479.512605] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[29058] [ 479.520230] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:38:54 executing program 0: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r1, 0x5) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r6 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12}, 0x2c) r7 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r8) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:54 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000014, 0x7, 0x1000000000000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(r4, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r7 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r7) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xfff) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r8, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000000)=ANY=[]) r9 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r8, 0x4004af07, &(0x7f0000000000)=r9) ioctl$VHOST_SET_VRING_ADDR(r8, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x1, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r8, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_KICK(r8, 0x4008af20, &(0x7f0000000540)={0x0, r9}) ioctl$VHOST_VSOCK_SET_RUNNING(r8, 0x4004af61, &(0x7f0000f82ffc)=0x4001) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000000000004000000000000002900000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000005abfff1a2f80dee3dc726f36e899ff00cd940c641c74dcd4d0f20b98b6f753b4950b1347e6317c5e68c7e0eb310030adf2f456a28277dba4f24c6f87cedea7408172c976118f4f6bcc11a2d33a098ee6a973c54468a3898b6102f2d1c879f3626557beac57ef783d16d4437ad6beae20954ba5de47bc4209200a710308ee620bf119c4f61ef4d7d4c6b747f135142312603d0727ac99a16c33402b8dd3c54080f"]) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x1}, {0xfffffffffffffffb, 0x4, 0x0, 0x4}, {0x8, 0x1, 0x2b58d827, 0x7}, {0x100, 0x2, 0x3, 0x7f}, {0x4, 0x7ff, 0x3, 0xfffffffffffffffe}]}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r10, 0xc0106418, &(0x7f0000000280)={0xff, 0x9, 0x0, 0x9, 0x4, 0x1}) [ 479.520248] ? kasan_kmalloc+0xad/0xe0 [ 479.520255] ? kmem_cache_alloc_trace+0x136/0x740 [ 479.520268] ? __memcg_init_list_lru_node+0x169/0x270 [ 479.520276] ? __list_lru_init+0x544/0x750 [ 479.520285] ? sget_userns+0x6b1/0xe40 [ 479.520296] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 479.520308] ? kern_mount_data+0x50/0xb0 [ 479.584509] ? pid_ns_prepare_proc+0x1e/0x80 [ 479.588922] ? alloc_pid+0x87e/0xa00 [ 479.592646] ? copy_process.part.38+0x2516/0x4bd0 [ 479.597524] ? _do_fork+0x1f7/0xf70 [ 479.601166] ? SyS_clone+0x37/0x50 [ 479.604715] ? find_held_lock+0x35/0x1d0 [ 479.608794] ? __lock_is_held+0xb6/0x140 [ 479.612881] ? check_same_owner+0x320/0x320 [ 479.617220] ? rcu_note_context_switch+0x710/0x710 [ 479.622168] should_failslab+0xec/0x120 [ 479.626156] kmem_cache_alloc_trace+0x4b/0x740 [ 479.630751] ? __kmalloc_node+0x33/0x70 [ 479.634733] ? __kmalloc_node+0x33/0x70 [ 479.638718] ? rcu_read_lock_sched_held+0x108/0x120 [ 479.643754] __memcg_init_list_lru_node+0x169/0x270 [ 479.648780] ? list_lru_add+0x7c0/0x7c0 [ 479.652762] ? __kmalloc_node+0x47/0x70 [ 479.656749] __list_lru_init+0x544/0x750 [ 479.660567] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[29067] [ 479.660813] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 479.660827] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 479.660840] ? lockdep_init_map+0x9/0x10 [ 479.685221] sget_userns+0x6b1/0xe40 [ 479.688942] ? set_anon_super+0x20/0x20 [ 479.692927] ? put_filp+0x90/0x90 [ 479.696391] ? destroy_unused_super.part.6+0xd0/0xd0 [ 479.701510] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 479.706527] ? save_stack+0xa3/0xd0 [ 479.710142] ? save_stack+0x43/0xd0 [ 479.713756] ? kasan_slab_alloc+0x12/0x20 [ 479.717885] ? kmem_cache_alloc+0x12e/0x760 [ 479.722190] ? alloc_pid+0xc1/0xa00 [ 479.725804] ? __radix_tree_replace+0x1af/0x310 [ 479.730456] ? radix_tree_delete+0x30/0x30 [ 479.734674] ? node_tag_clear+0xf2/0x180 [ 479.738723] ? proc_get_inode+0x620/0x620 [ 479.742853] mount_ns+0x6d/0x190 [ 479.746203] proc_mount+0x7a/0x90 [ 479.749637] mount_fs+0x66/0x2d0 [ 479.752989] vfs_kern_mount.part.26+0xc6/0x4a0 [ 479.757558] ? may_umount+0xa0/0xa0 [ 479.761167] ? idr_alloc_cyclic+0x1d6/0x320 [ 479.765471] ? do_raw_spin_trylock+0x190/0x190 [ 479.770041] ? idr_alloc+0x180/0x180 [ 479.773738] kern_mount_data+0x50/0xb0 [ 479.777608] pid_ns_prepare_proc+0x1e/0x80 [ 479.781827] alloc_pid+0x87e/0xa00 [ 479.785351] ? __change_pid+0x400/0x400 [ 479.789302] ? ns_capable_common+0xcf/0x160 [ 479.793615] ? memset+0x31/0x40 [ 479.796876] ? copy_thread_tls+0x268/0x8f0 [ 479.801096] copy_process.part.38+0x2516/0x4bd0 [ 479.805753] ? __cleanup_sighand+0x40/0x40 [ 479.809978] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 479.815154] ? __lock_acquire+0x664/0x3e00 [ 479.819369] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 479.824540] ? environ_open+0x80/0x80 [ 479.828334] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 479.833519] ? __lock_acquire+0x664/0x3e00 [ 479.837740] ? mntput_no_expire+0x130/0xa90 [ 479.842046] ? print_irqtrace_events+0x270/0x270 [ 479.846784] ? trace_hardirqs_off+0x10/0x10 [ 479.851082] ? lock_release+0xa40/0xa40 [ 479.855042] ? lock_acquire+0x1d5/0x580 [ 479.859000] ? trace_hardirqs_off+0x10/0x10 [ 479.863312] ? trace_hardirqs_off+0x10/0x10 [ 479.867619] ? __lock_acquire+0x664/0x3e00 [ 479.871834] ? check_same_owner+0x320/0x320 [ 479.876144] ? find_held_lock+0x35/0x1d0 [ 479.880193] ? _parse_integer+0xe9/0x140 [ 479.884241] ? trace_hardirqs_off+0x10/0x10 [ 479.888549] ? _parse_integer+0x140/0x140 [ 479.892688] ? trace_hardirqs_off+0x10/0x10 [ 479.896993] ? get_pid_task+0x93/0x140 [ 479.900866] ? lock_downgrade+0x980/0x980 [ 479.904999] ? find_held_lock+0x35/0x1d0 [ 479.909056] ? __f_unlock_pos+0x19/0x20 [ 479.913015] ? lock_downgrade+0x980/0x980 [ 479.917146] ? get_pid_task+0xbc/0x140 [ 479.921018] ? proc_fail_nth_write+0x9b/0x1d0 [ 479.925505] ? map_files_get_link+0x3a0/0x3a0 [ 479.929990] _do_fork+0x1f7/0xf70 [ 479.933434] ? fork_idle+0x2d0/0x2d0 [ 479.937129] ? wait_for_completion+0x770/0x770 [ 479.941698] ? __lock_is_held+0xb6/0x140 [ 479.945752] ? __sb_end_write+0xa0/0xd0 [ 479.949710] ? fput+0xd2/0x140 [ 479.952884] ? SyS_write+0x184/0x220 [ 479.956579] ? SyS_read+0x220/0x220 [ 479.960189] SyS_clone+0x37/0x50 [ 479.963534] ? sys_vfork+0x30/0x30 [ 479.967055] do_syscall_64+0x281/0x940 [ 479.970924] ? vmalloc_sync_all+0x30/0x30 [ 479.975052] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 479.980572] ? syscall_return_slowpath+0x550/0x550 [ 479.985487] ? syscall_return_slowpath+0x2ac/0x550 [ 479.990401] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 479.995750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.000576] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2033/05/18 03:38:54 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:54 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r2, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1f, 0x3f, 0x81, 0x7, 0xfff, 0x1, 0x81cb, 0x6, 0x2, 0x180d, 0x8, 0x0, 0xf9]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r3, 0x100000001, 0x0, 0x4, 0x7, 0x3ff}, &(0x7f0000000900)=0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0x7, 0x8001, 0xffffffffffffff80, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2, 0x4e22}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={r4}, 0x8) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000940)) r5 = getpid() process_vm_readv(r5, &(0x7f0000000200), 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000540)=""/220, 0xdc}, {&(0x7f0000000700)=""/212, 0xd4}], 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x1, 0x1f, 0xe0000000, 0xcc5}, &(0x7f0000000180)=0x98) r6 = syz_open_pts(0xffffffffffffffff, 0x2) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000001300)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) fstat(r1, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000002f00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2004010}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000980)={0x10, 0x30, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000002e00)=[@rights={0x38, 0x1, 0x1, [r6, r6, r2, r6, r1, r2, r1, r2, r6, r2]}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r5, r9, r10}, @rights={0x28, 0x1, 0x1, [r6, r6, r1, r2, r1]}, @rights={0x18, 0x1, 0x1, [r6, r6]}, @rights={0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r6, r1]}], 0xe0, 0x40000}, 0x8804) fchmod(r0, 0x80) dup3(0xffffffffffffffff, r0, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) 2033/05/18 03:38:54 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 480.005749] RIP: 0033:0x454e79 [ 480.008918] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 480.016607] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 480.023855] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 480.031106] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 480.038354] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 480.045604] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000002b 2033/05/18 03:38:54 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x0, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf8, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x40000000008, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(r0, &(0x7f00000005c0), &(0x7f0000000140)=0x2a) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x0, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 480.148506] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[29082] [ 480.160679] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[29080] 2033/05/18 03:38:55 executing program 7 (fault-call:10 fault-nth:44): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:55 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r0 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000040)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r5 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r3, 0x540e, 0x4) close(r3) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r5, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r9) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r2, r3) chown(&(0x7f00000002c0)='./file0\x00', r7, r8) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000240)=0x1, 0x4) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:55 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x0, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 480.239332] ptrace attach of "/root/syz-executor1"[4495] was attempted by "/root/syz-executor1"[29085] [ 480.274842] FAULT_INJECTION: forcing a failure. [ 480.274842] name failslab, interval 1, probability 0, space 0, times 0 [ 480.286177] CPU: 1 PID: 29088 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 480.293379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.302743] Call Trace: [ 480.305359] dump_stack+0x194/0x24d [ 480.309019] ? arch_local_irq_restore+0x53/0x53 [ 480.313711] ? __save_stack_trace+0x7e/0xd0 [ 480.318065] should_fail+0x8c0/0xa40 [ 480.321802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 480.326923] ? kasan_kmalloc+0xad/0xe0 [ 480.330841] ? kmem_cache_alloc_trace+0x136/0x740 [ 480.335711] ? __memcg_init_list_lru_node+0x169/0x270 [ 480.340920] ? __list_lru_init+0x544/0x750 [ 480.345173] ? sget_userns+0x6b1/0xe40 [ 480.349082] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 480.353849] ? kern_mount_data+0x50/0xb0 [ 480.357926] ? pid_ns_prepare_proc+0x1e/0x80 [ 480.362345] ? alloc_pid+0x87e/0xa00 [ 480.366072] ? copy_process.part.38+0x2516/0x4bd0 [ 480.370924] ? _do_fork+0x1f7/0xf70 [ 480.374562] ? SyS_clone+0x37/0x50 [ 480.377479] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[29099] [ 480.378112] ? find_held_lock+0x35/0x1d0 [ 480.378129] ? __lock_is_held+0xb6/0x140 [ 480.395717] ? check_same_owner+0x320/0x320 [ 480.400065] ? rcu_note_context_switch+0x710/0x710 [ 480.405015] should_failslab+0xec/0x120 [ 480.409007] kmem_cache_alloc_trace+0x4b/0x740 [ 480.413599] ? __kmalloc_node+0x33/0x70 [ 480.417583] ? __kmalloc_node+0x33/0x70 [ 480.421563] ? rcu_read_lock_sched_held+0x108/0x120 [ 480.426587] __memcg_init_list_lru_node+0x169/0x270 [ 480.431589] ? list_lru_add+0x7c0/0x7c0 [ 480.435545] ? __kmalloc_node+0x47/0x70 [ 480.439504] __list_lru_init+0x544/0x750 [ 480.443548] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 480.449418] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 480.454419] ? lockdep_init_map+0x9/0x10 [ 480.458465] sget_userns+0x6b1/0xe40 [ 480.462157] ? set_anon_super+0x20/0x20 [ 480.466116] ? put_filp+0x90/0x90 [ 480.469551] ? destroy_unused_super.part.6+0xd0/0xd0 [ 480.474640] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 480.479642] ? save_stack+0xa3/0xd0 [ 480.483251] ? save_stack+0x43/0xd0 [ 480.486861] ? kasan_slab_alloc+0x12/0x20 [ 480.492053] ? kmem_cache_alloc+0x12e/0x760 [ 480.496361] ? alloc_pid+0xc1/0xa00 [ 480.499976] ? __radix_tree_replace+0x1af/0x310 [ 480.504628] ? radix_tree_delete+0x30/0x30 [ 480.508845] ? node_tag_clear+0xf2/0x180 [ 480.512895] ? proc_get_inode+0x620/0x620 [ 480.517027] mount_ns+0x6d/0x190 [ 480.520384] proc_mount+0x7a/0x90 [ 480.523824] mount_fs+0x66/0x2d0 [ 480.527181] vfs_kern_mount.part.26+0xc6/0x4a0 [ 480.531755] ? may_umount+0xa0/0xa0 [ 480.535366] ? idr_alloc_cyclic+0x1d6/0x320 [ 480.539678] ? do_raw_spin_trylock+0x190/0x190 [ 480.544248] ? idr_alloc+0x180/0x180 [ 480.547949] kern_mount_data+0x50/0xb0 [ 480.551824] pid_ns_prepare_proc+0x1e/0x80 [ 480.556044] alloc_pid+0x87e/0xa00 [ 480.559569] ? __change_pid+0x400/0x400 [ 480.563526] ? ns_capable_common+0xcf/0x160 [ 480.567840] ? memset+0x31/0x40 [ 480.571104] ? copy_thread_tls+0x268/0x8f0 [ 480.575325] copy_process.part.38+0x2516/0x4bd0 [ 480.580025] ? __cleanup_sighand+0x40/0x40 [ 480.584257] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 480.589429] ? trace_hardirqs_off+0x10/0x10 [ 480.593739] ? __lock_acquire+0x664/0x3e00 [ 480.597954] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 480.603140] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 480.608317] ? __perf_event_task_sched_out+0x267/0x14b0 [ 480.613665] ? print_irqtrace_events+0x270/0x270 [ 480.618405] ? trace_hardirqs_off+0x10/0x10 [ 480.622708] ? lock_release+0xa40/0xa40 [ 480.626665] ? __perf_event_task_sched_in+0x200/0xc20 [ 480.631839] ? lock_acquire+0x1d5/0x580 [ 480.635798] ? trace_hardirqs_off+0x10/0x10 [ 480.640101] ? trace_hardirqs_off+0x10/0x10 [ 480.644406] ? __lock_acquire+0x664/0x3e00 [ 480.648621] ? check_same_owner+0x320/0x320 [ 480.652930] ? find_held_lock+0x35/0x1d0 [ 480.657002] ? _parse_integer+0xe9/0x140 [ 480.661070] ? trace_hardirqs_off+0x10/0x10 [ 480.665379] ? _parse_integer+0x140/0x140 [ 480.669514] ? trace_hardirqs_off+0x10/0x10 [ 480.673818] ? get_pid_task+0x93/0x140 [ 480.677688] ? lock_downgrade+0x980/0x980 [ 480.681854] ? find_held_lock+0x35/0x1d0 [ 480.685903] ? __f_unlock_pos+0x19/0x20 [ 480.689861] ? lock_downgrade+0x980/0x980 [ 480.693995] ? get_pid_task+0xbc/0x140 [ 480.697868] ? proc_fail_nth_write+0x9b/0x1d0 [ 480.702344] ? map_files_get_link+0x3a0/0x3a0 [ 480.706827] _do_fork+0x1f7/0xf70 [ 480.710267] ? fork_idle+0x2d0/0x2d0 [ 480.713966] ? wait_for_completion+0x770/0x770 [ 480.718539] ? __lock_is_held+0xb6/0x140 [ 480.722595] ? __sb_end_write+0xa0/0xd0 [ 480.726550] ? fput+0xd2/0x140 [ 480.729726] ? SyS_write+0x184/0x220 [ 480.733421] ? exit_to_usermode_loop+0x198/0x2f0 [ 480.738159] ? SyS_read+0x220/0x220 [ 480.741774] SyS_clone+0x37/0x50 [ 480.745119] ? sys_vfork+0x30/0x30 [ 480.748641] do_syscall_64+0x281/0x940 [ 480.752509] ? vmalloc_sync_all+0x30/0x30 [ 480.756644] ? _raw_spin_unlock_irq+0x27/0x70 [ 480.761121] ? finish_task_switch+0x1c1/0x7e0 [ 480.765601] ? syscall_return_slowpath+0x550/0x550 [ 480.770512] ? syscall_return_slowpath+0x2ac/0x550 [ 480.775421] ? prepare_exit_to_usermode+0x350/0x350 [ 480.780424] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 480.785772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.790601] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.795772] RIP: 0033:0x454e79 [ 480.798943] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 480.806637] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 480.813890] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 480.821143] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 480.828394] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 480.835644] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000002c 2033/05/18 03:38:55 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x0, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="050600a87b4eed16aaf94d2b00625f07a567e3ac50fc5996a7b979f2d1876c2b1208dc51d3698f10d0b779331c3f046aac59b21f452e526525df71ebf6ffaebab6f88fbec2ef01"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) r1 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x80000) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000040)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r4, 0x540e, 0x4) close(r4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000480)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r6, &(0x7f0000000680)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = semget$private(0x0, 0x1, 0x0) semctl$GETPID(r11, 0x3, 0xb, &(0x7f0000000a00)=""/130) chown(&(0x7f0000000200)='./file0\x00', 0x0, r10) ioctl$TCSETAW(r6, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x100, @dev={0xfe, 0x80, [], 0x15}, 0xfff}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000280)={0xece, 0xff, 0x2, 0xfffffffffffffffa, 0x8, 0x8, 0x8, 0xffffffff00000001, r12}, 0x20) dup2(r3, r4) chown(&(0x7f00000002c0)='./file0\x00', r8, r9) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r7, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:55 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x0, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000140)={0xa, &(0x7f0000000040)=""/1, &(0x7f0000000880)=[{0x3, 0xb6, 0xfffffffffffff000, &(0x7f0000000200)=""/182}, {0x0, 0xb6, 0x100000001, &(0x7f00000002c0)=""/182}, {0x0, 0xfa, 0xc01, &(0x7f0000000380)=""/250}, {0x0, 0xa4, 0x7ff, &(0x7f0000000480)=""/164}, {0x8, 0x0, 0x3, &(0x7f0000000080)}, {0x8, 0x5c, 0x80000001, &(0x7f0000000540)=""/92}, {0x9, 0xaa, 0x1, &(0x7f00000005c0)=""/170}, {0x9, 0x33, 0x400000000000, &(0x7f00000000c0)=""/51}, {0x4, 0xd6, 0x3, &(0x7f0000000680)=""/214}, {0x4, 0xd9, 0xfffffffffffffbff, &(0x7f0000000780)=""/217}]}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000980), &(0x7f00000009c0)=0x4) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000a40)=0xaa75) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000a00)=r0) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x92d, 0x0) ioctl$void(r0, 0x5450) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) syz_open_procfs(0x0, &(0x7f000045dff3)="636c6561725f72656673007edb") 2033/05/18 03:38:55 executing program 7 (fault-call:10 fault-nth:45): r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x100, 0xff19, 0x6}, 0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x8b, 0x0, 0x0, 0x0, 0x7fff, 0x400, 0xc0000000}, &(0x7f0000000600)=0x20) setns(r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) ptrace$getsig(0x4202, r1, 0xb1b3, &(0x7f0000000100)) munlock(&(0x7f0000a92000/0x3000)=nil, 0x3000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 2033/05/18 03:38:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r2, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1f, 0x3f, 0x81, 0x7, 0xfff, 0x1, 0x81cb, 0x6, 0x2, 0x180d, 0x8, 0x0, 0xf9]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r3, 0x100000001, 0x0, 0x4, 0x7, 0x3ff}, &(0x7f0000000900)=0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0x7, 0x8001, 0xffffffffffffff80, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2, 0x4e22}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={r4}, 0x8) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000940)) r5 = getpid() process_vm_readv(r5, &(0x7f0000000200), 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000540)=""/220, 0xdc}, {&(0x7f0000000700)=""/212, 0xd4}], 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x1, 0x1f, 0xe0000000, 0xcc5}, &(0x7f0000000180)=0x98) r6 = syz_open_pts(0xffffffffffffffff, 0x2) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000001300)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) fstat(r1, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000002f00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2004010}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000980)={0x10, 0x30, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000002e00)=[@rights={0x38, 0x1, 0x1, [r6, r6, r2, r6, r1, r2, r1, r2, r6, r2]}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r5, r9, r10}, @rights={0x28, 0x1, 0x1, [r6, r6, r1, r2, r1]}, @rights={0x18, 0x1, 0x1, [r6, r6]}, @rights={0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r6, r1]}], 0xe0, 0x40000}, 0x8804) fchmod(r0, 0x80) dup3(0xffffffffffffffff, r0, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) 2033/05/18 03:38:55 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x0, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 480.908759] ptrace attach of "/root/syz-executor2"[4493] was attempted by "/root/syz-executor2"[29112] [ 480.923439] ptrace attach of "/root/syz-executor0"[7272] was attempted by "/root/syz-executor0"[29113] 2033/05/18 03:38:55 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x0, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:55 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) request_key(&(0x7f0000000740)='ceph\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000007c0)='\x00', 0xfffffffffffffffc) r8 = request_key(&(0x7f0000000a40)='cifs.idmap\x00', &(0x7f0000000a80)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000ac0)='\x00', 0xfffffffffffffff9) r9 = add_key(&(0x7f0000000900)='rxrpc\x00', &(0x7f0000000a00)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000b00)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30afd7ba000000000000", 0x31, r8) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r9) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="0da973c603"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r10 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r11, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r12) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r10, &(0x7f0000000280), &(0x7f00000002c0)=0xfd07) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 481.026941] FAULT_INJECTION: forcing a failure. [ 481.026941] name failslab, interval 1, probability 0, space 0, times 0 [ 481.039143] CPU: 0 PID: 29125 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 481.046347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.055714] Call Trace: [ 481.058322] dump_stack+0x194/0x24d [ 481.061975] ? arch_local_irq_restore+0x53/0x53 [ 481.066661] ? find_held_lock+0x35/0x1d0 [ 481.070744] should_fail+0x8c0/0xa40 [ 481.074486] ? __list_lru_init+0x352/0x750 [ 481.078741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 481.083866] ? find_next_zero_bit+0xe3/0x110 [ 481.088292] ? trace_hardirqs_off+0x10/0x10 [ 481.092635] ? find_held_lock+0x35/0x1d0 [ 481.096718] ? __lock_is_held+0xb6/0x140 [ 481.100801] ? check_same_owner+0x320/0x320 [ 481.105136] ? lock_downgrade+0x980/0x980 [ 481.109303] ? rcu_note_context_switch+0x710/0x710 [ 481.114250] ? find_held_lock+0x35/0x1d0 [ 481.118334] should_failslab+0xec/0x120 [ 481.122326] __kmalloc+0x63/0x760 [ 481.125802] ? lock_downgrade+0x980/0x980 [ 481.129965] ? register_shrinker+0x10e/0x2d0 [ 481.134385] ? trace_event_raw_event_module_request+0x320/0x320 [ 481.140470] register_shrinker+0x10e/0x2d0 [ 481.144723] ? prepare_kswapd_sleep+0x1f0/0x1f0 [ 481.149410] ? memcpy+0x45/0x50 [ 481.152703] sget_userns+0xbbf/0xe40 [ 481.156421] ? set_anon_super+0x20/0x20 [ 481.160412] ? put_filp+0x90/0x90 [ 481.163883] ? destroy_unused_super.part.6+0xd0/0xd0 [ 481.169005] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 481.174040] ? save_stack+0xa3/0xd0 2033/05/18 03:38:56 executing program 4: open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', 0x800, 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ion\x00', 0xc0000, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0xc000, 0x0, r1, 0x4, 0x8, 0x2000007fffe) r3 = fcntl$getown(r2, 0x9) r4 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000040)) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r6, 0x6, 0x1e, &(0x7f0000000700), &(0x7f0000000740)=0x4) r7 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x10001, 0x280000) ioctl$TIOCSCTTY(r5, 0x540e, 0x4) close(r5) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x8b, 0x401, 0x3, 0x4}]}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) write$cgroup_int(r7, &(0x7f0000000680)=ANY=[], 0x0) recvfrom$inet(r0, &(0x7f0000000280)=""/33, 0x21, 0x0, 0x0, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', 0x0, r11) ioctl$TCSETAW(r7, 0x5407, &(0x7f00000004c0)={0x1ff00000000000, 0x1, 0x2, 0x7, 0x9, 0x9, 0x1, 0x0, 0x3, 0x8}) dup2(r4, r5) chown(&(0x7f00000002c0)='./file0\x00', r9, r10) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000500)=0x44, 0x4) syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x2, 0x80000) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000180)='logon\x00', &(0x7f00000001c0)='/dev/snd/seq\x00') 2033/05/18 03:38:56 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000004400), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000f0c000)='clear_refs\x00') writev(r2, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1f, 0x3f, 0x81, 0x7, 0xfff, 0x1, 0x81cb, 0x6, 0x2, 0x180d, 0x8, 0x0, 0xf9]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r3, 0x100000001, 0x0, 0x4, 0x7, 0x3ff}, &(0x7f0000000900)=0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[], &(0x7f0000000240)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x8, 0x7, 0x8001, 0xffffffffffffff80, 0x7ff, 0x0, 0x5, {0x0, @in={{0x2, 0x4e22}}, 0x95, 0x7, 0x83, 0x7, 0x5}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={r4}, 0x8) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000940)) r5 = getpid() process_vm_readv(r5, &(0x7f0000000200), 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000540)=""/220, 0xdc}, {&(0x7f0000000700)=""/212, 0xd4}], 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x1, 0x1f, 0xe0000000, 0xcc5}, &(0x7f0000000180)=0x98) r6 = syz_open_pts(0xffffffffffffffff, 0x2) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000001300)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) fstat(r1, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000002f00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2004010}, 0xc, &(0x7f0000002940)=[{&(0x7f0000000980)={0x10, 0x30, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f0000002e00)=[@rights={0x38, 0x1, 0x1, [r6, r6, r2, r6, r1, r2, r1, r2, r6, r2]}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r5, r9, r10}, @rights={0x28, 0x1, 0x1, [r6, r6, r1, r2, r1]}, @rights={0x18, 0x1, 0x1, [r6, r6]}, @rights={0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r6, r1]}], 0xe0, 0x40000}, 0x8804) fchmod(r0, 0x80) dup3(0xffffffffffffffff, r0, 0x0) listen(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040), 0xffab) 2033/05/18 03:38:56 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:56 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x0, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:56 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 481.177680] ? save_stack+0x43/0xd0 [ 481.181323] ? kasan_slab_alloc+0x12/0x20 [ 481.185487] ? kmem_cache_alloc+0x12e/0x760 [ 481.189821] ? alloc_pid+0xc1/0xa00 [ 481.193462] ? __radix_tree_replace+0x1af/0x310 [ 481.198150] ? radix_tree_delete+0x30/0x30 [ 481.202401] ? node_tag_clear+0xf2/0x180 [ 481.206480] ? proc_get_inode+0x620/0x620 [ 481.210640] mount_ns+0x6d/0x190 [ 481.214017] proc_mount+0x7a/0x90 [ 481.217490] mount_fs+0x66/0x2d0 [ 481.220871] vfs_kern_mount.part.26+0xc6/0x4a0 [ 481.225456] ? may_umount+0xa0/0xa0 [ 481.229083] ? idr_alloc_cyclic+0x1d6/0x320 [ 481.233397] ? do_raw_spin_trylock+0x190/0x190 [ 481.237974] ? idr_alloc+0x180/0x180 [ 481.241676] kern_mount_data+0x50/0xb0 [ 481.245550] pid_ns_prepare_proc+0x1e/0x80 [ 481.249766] alloc_pid+0x87e/0xa00 [ 481.253291] ? __change_pid+0x400/0x400 [ 481.257247] ? ns_capable_common+0xcf/0x160 [ 481.261563] ? memset+0x31/0x40 [ 481.264824] ? copy_thread_tls+0x268/0x8f0 [ 481.269048] copy_process.part.38+0x2516/0x4bd0 [ 481.273709] ? __cleanup_sighand+0x40/0x40 [ 481.277937] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 481.283113] ? __lock_acquire+0x664/0x3e00 [ 481.287330] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 481.292501] ? environ_open+0x80/0x80 [ 481.296294] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 481.301470] ? __lock_acquire+0x664/0x3e00 [ 481.305685] ? mntput_no_expire+0x130/0xa90 [ 481.309993] ? print_irqtrace_events+0x270/0x270 [ 481.314744] ? trace_hardirqs_off+0x10/0x10 [ 481.319044] ? lock_release+0xa40/0xa40 [ 481.323006] ? lock_acquire+0x1d5/0x580 [ 481.326967] ? trace_hardirqs_off+0x10/0x10 [ 481.331270] ? trace_hardirqs_off+0x10/0x10 [ 481.335572] ? __lock_acquire+0x664/0x3e00 [ 481.339785] ? check_same_owner+0x320/0x320 [ 481.344089] ? find_held_lock+0x35/0x1d0 [ 481.348135] ? _parse_integer+0xe9/0x140 [ 481.352179] ? trace_hardirqs_off+0x10/0x10 [ 481.356489] ? _parse_integer+0x140/0x140 [ 481.360711] ? trace_hardirqs_off+0x10/0x10 [ 481.365021] ? get_pid_task+0x93/0x140 [ 481.368889] ? lock_downgrade+0x980/0x980 [ 481.373029] ? find_held_lock+0x35/0x1d0 [ 481.377080] ? __f_unlock_pos+0x19/0x20 [ 481.381039] ? lock_downgrade+0x980/0x980 [ 481.385168] ? get_pid_task+0xbc/0x140 [ 481.389040] ? proc_fail_nth_write+0x9b/0x1d0 [ 481.393520] ? map_files_get_link+0x3a0/0x3a0 [ 481.398001] _do_fork+0x1f7/0xf70 [ 481.401445] ? fork_idle+0x2d0/0x2d0 [ 481.405148] ? wait_for_completion+0x770/0x770 [ 481.409716] ? __lock_is_held+0xb6/0x140 [ 481.413772] ? __sb_end_write+0xa0/0xd0 [ 481.417730] ? fput+0xd2/0x140 [ 481.420911] ? SyS_write+0x184/0x220 [ 481.424607] ? SyS_read+0x220/0x220 [ 481.428215] SyS_clone+0x37/0x50 [ 481.431564] ? sys_vfork+0x30/0x30 [ 481.435085] do_syscall_64+0x281/0x940 [ 481.438954] ? vmalloc_sync_all+0x30/0x30 [ 481.443082] ? _raw_spin_unlock_irq+0x27/0x70 [ 481.447557] ? finish_task_switch+0x1c1/0x7e0 [ 481.452037] ? syscall_return_slowpath+0x550/0x550 [ 481.456955] ? syscall_return_slowpath+0x2ac/0x550 [ 481.461874] ? prepare_exit_to_usermode+0x350/0x350 [ 481.466878] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 481.472226] ? trace_hardirqs_off_thunk+0x1a/0x1c 2033/05/18 03:38:56 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x0, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 481.477056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.482229] RIP: 0033:0x454e79 [ 481.485398] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 481.493090] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 481.500340] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 481.507592] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 481.514842] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 481.522093] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000002d 2033/05/18 03:38:56 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="017bf21728562f375d7ac831f7c162a7b597a970ca1cfad69415c8b6af151860e261bd62a996bef700ee97207c7441827ba9ce66188e1dad00ea23e33d1c31ba05fd696b0373e9f392024232f560b6f5e05f63653624a9754d1ac5c40300c5cbd91bc819771c22e5b3ae23524296476dba8a8bdac26a93214470872095d3f1a82229889402abd5973564235a41c8e64c5a0943a7870e37cf32e7cd583346a9ba0750"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0, 0x1f}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:56 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x9, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r10) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 2033/05/18 03:38:56 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x100000000, 0x4) setreuid(0x0, r4) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x5) fcntl$getownex(r5, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x100}, 0x4) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000c80)={{0xa, 0x0, 0x6cf5, @loopback={0x0, 0x1}, 0xa1}, {0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffffffc0}, 0x0, [0x9, 0x0, 0x1f, 0x8, 0x8, 0xa8, 0x0, 0x5763badf]}, 0x5c) r8 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="64e2ac15c6aab872075a6392705ee2d9ccd29b0c9b87f7443e8879b1221232c9ca89b1a0bbb510846a7906000000366852f3633a246c801fd939bcd0472b95db041dc47682c7461ff6a0e210f4ceac1264afd613cc09ae6b2042b3a3efdfebe828980292c3a6529c5ab6906e0516b682013d1a0eaa626fc989d54b21a27ad624ad1dbdbc444b7e06d88bffe1edda7560c0bc722d9b16c0fd96e358b7ce30056723e6425648fa5c0e7679a38abcafd7ba000000000000", 0xb6, 0xfffffffffffffffb) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000001200)='big_key\x00', r8) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000800)=0xffffffffffff79e9) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="050600a87b"], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xb, 0x5, 0x1, 0x5, 0x12, r0}, 0x2c) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000008c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3f, @loopback={0x0, 0x1}, 0x5}}, [0xc4, 0x2, 0x6, 0x6, 0x0, 0xffffffff, 0xfffffffffffffffb, 0x4, 0x7fff, 0x9, 0x3, 0x6, 0x417, 0xe5, 0xffffffffffffffff]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000540)={r10, 0x1}, &(0x7f0000000580)=0x8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000880)=0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) prctl$setptracer(0x59616d61, r11) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockname$ax25(r9, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 481.676304] ================================================================== [ 481.684467] BUG: KASAN: use-after-free in alloc_pid+0x9a6/0xa00 [ 481.690512] Read of size 4 at addr ffff8801cff8a418 by task syz-executor7/29125 [ 481.697932] [ 481.699540] CPU: 1 PID: 29125 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #7 [ 481.706704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.716038] Call Trace: [ 481.718610] dump_stack+0x194/0x24d [ 481.722219] ? arch_local_irq_restore+0x53/0x53 [ 481.726873] ? show_regs_print_info+0x18/0x18 [ 481.731354] ? may_umount+0xa0/0xa0 [ 481.734967] ? idr_alloc_cyclic+0x1d6/0x320 [ 481.739267] ? alloc_pid+0x9a6/0xa00 [ 481.742967] print_address_description+0x73/0x250 [ 481.747785] ? alloc_pid+0x9a6/0xa00 [ 481.751479] kasan_report+0x23c/0x360 [ 481.755262] __asan_report_load4_noabort+0x14/0x20 [ 481.760168] alloc_pid+0x9a6/0xa00 [ 481.763692] ? __change_pid+0x400/0x400 [ 481.767646] ? ns_capable_common+0xcf/0x160 [ 481.771954] ? memset+0x31/0x40 [ 481.775219] ? copy_thread_tls+0x268/0x8f0 [ 481.779437] copy_process.part.38+0x2516/0x4bd0 [ 481.784096] ? __cleanup_sighand+0x40/0x40 [ 481.788319] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 481.793491] ? __lock_acquire+0x664/0x3e00 [ 481.797708] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 481.802878] ? environ_open+0x80/0x80 [ 481.806666] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 481.811846] ? __lock_acquire+0x664/0x3e00 [ 481.816061] ? mntput_no_expire+0x130/0xa90 [ 481.820367] ? print_irqtrace_events+0x270/0x270 [ 481.825106] ? trace_hardirqs_off+0x10/0x10 [ 481.829404] ? lock_release+0xa40/0xa40 [ 481.833364] ? lock_acquire+0x1d5/0x580 [ 481.837316] ? trace_hardirqs_off+0x10/0x10 [ 481.841621] ? trace_hardirqs_off+0x10/0x10 [ 481.845924] ? __lock_acquire+0x664/0x3e00 [ 481.850137] ? check_same_owner+0x320/0x320 [ 481.854444] ? find_held_lock+0x35/0x1d0 [ 481.858491] ? _parse_integer+0xe9/0x140 [ 481.862534] ? trace_hardirqs_off+0x10/0x10 [ 481.866836] ? _parse_integer+0x140/0x140 [ 481.870970] ? trace_hardirqs_off+0x10/0x10 [ 481.875272] ? get_pid_task+0x93/0x140 [ 481.879139] ? lock_downgrade+0x980/0x980 [ 481.883270] ? find_held_lock+0x35/0x1d0 [ 481.887316] ? __f_unlock_pos+0x19/0x20 [ 481.891283] ? lock_downgrade+0x980/0x980 [ 481.895412] ? get_pid_task+0xbc/0x140 [ 481.899277] ? proc_fail_nth_write+0x9b/0x1d0 [ 481.903752] ? map_files_get_link+0x3a0/0x3a0 [ 481.908230] _do_fork+0x1f7/0xf70 [ 481.911664] ? fork_idle+0x2d0/0x2d0 [ 481.915358] ? wait_for_completion+0x770/0x770 [ 481.919924] ? __lock_is_held+0xb6/0x140 [ 481.923976] ? __sb_end_write+0xa0/0xd0 [ 481.927956] ? fput+0xd2/0x140 [ 481.931139] ? SyS_write+0x184/0x220 [ 481.934833] ? SyS_read+0x220/0x220 [ 481.938443] SyS_clone+0x37/0x50 [ 481.941789] ? sys_vfork+0x30/0x30 [ 481.945309] do_syscall_64+0x281/0x940 [ 481.949180] ? vmalloc_sync_all+0x30/0x30 [ 481.953308] ? _raw_spin_unlock_irq+0x27/0x70 [ 481.957783] ? finish_task_switch+0x1c1/0x7e0 [ 481.962257] ? syscall_return_slowpath+0x550/0x550 [ 481.967166] ? syscall_return_slowpath+0x2ac/0x550 [ 481.972074] ? prepare_exit_to_usermode+0x350/0x350 [ 481.977070] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 481.982417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 481.987250] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.992424] RIP: 0033:0x454e79 [ 481.995597] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 482.003286] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 482.010536] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 482.017786] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 482.025038] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 482.032289] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000002d [ 482.039551] [ 482.041161] Allocated by task 29125: [ 482.044861] save_stack+0x43/0xd0 [ 482.048292] kasan_kmalloc+0xad/0xe0 [ 482.051984] kasan_slab_alloc+0x12/0x20 [ 482.055934] kmem_cache_alloc+0x12e/0x760 [ 482.060062] copy_pid_ns+0x257/0xc60 [ 482.063756] create_new_namespaces+0x307/0x880 [ 482.068316] copy_namespaces+0x340/0x400 [ 482.072356] copy_process.part.38+0x2380/0x4bd0 [ 482.077004] _do_fork+0x1f7/0xf70 [ 482.080436] SyS_clone+0x37/0x50 [ 482.083781] do_syscall_64+0x281/0x940 [ 482.087651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.092811] [ 482.094415] Freed by task 4493: [ 482.097674] save_stack+0x43/0xd0 [ 482.101104] __kasan_slab_free+0x11a/0x170 [ 482.105314] kasan_slab_free+0xe/0x10 [ 482.109093] kmem_cache_free+0x83/0x2a0 [ 482.113045] delayed_free_pidns+0x82/0xb0 [ 482.117170] rcu_process_callbacks+0xd6c/0x17f0 [ 482.121817] __do_softirq+0x2d7/0xb85 [ 482.125590] [ 482.127195] The buggy address belongs to the object at ffff8801cff8a3d0 [ 482.127195] which belongs to the cache pid_namespace of size 240 [ 482.140002] The buggy address is located 72 bytes inside of [ 482.140002] 240-byte region [ffff8801cff8a3d0, ffff8801cff8a4c0) [ 482.151768] The buggy address belongs to the page: [ 482.156682] page:ffffea00073fe280 count:1 mapcount:0 mapping:ffff8801cff8a040 index:0x0 [ 482.164814] flags: 0x2fffc0000000100(slab) [ 482.169033] raw: 02fffc0000000100 ffff8801cff8a040 0000000000000000 000000010000000d [ 482.176897] raw: ffffea00070ba0e0 ffff8801d4036748 ffff8801d4eec080 0000000000000000 [ 482.184758] page dumped because: kasan: bad access detected [ 482.190446] [ 482.192049] Memory state around the buggy address: [ 482.196962] ffff8801cff8a300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 482.204303] ffff8801cff8a380: fb fb fc fc fc fc fc fc fc fc fb fb fb fb fb fb [ 482.211642] >ffff8801cff8a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 482.218979] ^ [ 482.223106] ffff8801cff8a480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 482.230445] ffff8801cff8a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 482.237784] ================================================================== [ 482.245121] Disabling lock debugging due to kernel taint [ 482.250550] Kernel panic - not syncing: panic_on_warn set ... [ 482.250550] [ 482.257891] CPU: 1 PID: 29125 Comm: syz-executor7 Tainted: G B 4.16.0-rc7+ #7 [ 482.266351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.275684] Call Trace: [ 482.278262] dump_stack+0x194/0x24d [ 482.281870] ? arch_local_irq_restore+0x53/0x53 [ 482.286520] ? kasan_end_report+0x32/0x50 [ 482.290647] ? lock_downgrade+0x980/0x980 [ 482.294772] ? vsnprintf+0x1ed/0x1900 [ 482.298549] ? alloc_pid+0x980/0xa00 [ 482.302240] panic+0x1e4/0x41c [ 482.305407] ? refcount_error_report+0x214/0x214 [ 482.310138] ? add_taint+0x40/0x50 [ 482.313654] ? alloc_pid+0x9a6/0xa00 [ 482.317345] kasan_end_report+0x50/0x50 [ 482.321296] kasan_report+0x149/0x360 [ 482.325074] __asan_report_load4_noabort+0x14/0x20 [ 482.329981] alloc_pid+0x9a6/0xa00 [ 482.333500] ? __change_pid+0x400/0x400 [ 482.337454] ? ns_capable_common+0xcf/0x160 [ 482.341757] ? memset+0x31/0x40 [ 482.345013] ? copy_thread_tls+0x268/0x8f0 [ 482.349227] copy_process.part.38+0x2516/0x4bd0 [ 482.353878] ? __cleanup_sighand+0x40/0x40 [ 482.358095] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 482.363262] ? __lock_acquire+0x664/0x3e00 [ 482.367474] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 482.372643] ? environ_open+0x80/0x80 [ 482.376425] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 482.381593] ? __lock_acquire+0x664/0x3e00 [ 482.385805] ? mntput_no_expire+0x130/0xa90 [ 482.390103] ? print_irqtrace_events+0x270/0x270 [ 482.394837] ? trace_hardirqs_off+0x10/0x10 [ 482.399152] ? lock_release+0xa40/0xa40 [ 482.403105] ? lock_acquire+0x1d5/0x580 [ 482.407054] ? trace_hardirqs_off+0x10/0x10 [ 482.411349] ? trace_hardirqs_off+0x10/0x10 [ 482.415647] ? __lock_acquire+0x664/0x3e00 [ 482.419860] ? check_same_owner+0x320/0x320 [ 482.424159] ? find_held_lock+0x35/0x1d0 [ 482.428202] ? _parse_integer+0xe9/0x140 [ 482.432240] ? trace_hardirqs_off+0x10/0x10 [ 482.436540] ? _parse_integer+0x140/0x140 [ 482.440667] ? trace_hardirqs_off+0x10/0x10 [ 482.444968] ? get_pid_task+0x93/0x140 [ 482.448830] ? lock_downgrade+0x980/0x980 [ 482.452960] ? find_held_lock+0x35/0x1d0 [ 482.456998] ? __f_unlock_pos+0x19/0x20 [ 482.460949] ? lock_downgrade+0x980/0x980 [ 482.465077] ? get_pid_task+0xbc/0x140 [ 482.468943] ? proc_fail_nth_write+0x9b/0x1d0 [ 482.473421] ? map_files_get_link+0x3a0/0x3a0 [ 482.477896] _do_fork+0x1f7/0xf70 [ 482.481328] ? fork_idle+0x2d0/0x2d0 [ 482.485024] ? wait_for_completion+0x770/0x770 [ 482.490456] ? __lock_is_held+0xb6/0x140 [ 482.494506] ? __sb_end_write+0xa0/0xd0 [ 482.498457] ? fput+0xd2/0x140 [ 482.501630] ? SyS_write+0x184/0x220 [ 482.505319] ? SyS_read+0x220/0x220 [ 482.508923] SyS_clone+0x37/0x50 [ 482.512264] ? sys_vfork+0x30/0x30 [ 482.515784] do_syscall_64+0x281/0x940 [ 482.519649] ? vmalloc_sync_all+0x30/0x30 [ 482.523774] ? _raw_spin_unlock_irq+0x27/0x70 [ 482.528245] ? finish_task_switch+0x1c1/0x7e0 [ 482.532717] ? syscall_return_slowpath+0x550/0x550 [ 482.537621] ? syscall_return_slowpath+0x2ac/0x550 [ 482.542528] ? prepare_exit_to_usermode+0x350/0x350 [ 482.547522] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 482.552876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 482.557711] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.562878] RIP: 0033:0x454e79 [ 482.566044] RSP: 002b:00007ff62b096c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 482.573731] RAX: ffffffffffffffda RBX: 00007ff62b0976d4 RCX: 0000000000454e79 [ 482.580984] RDX: 00000000209c4ffc RSI: 0000000020e69000 RDI: 0000000030000100 [ 482.588233] RBP: 000000000072bea0 R08: 0000000020a46000 R09: 0000000000000000 [ 482.595481] R10: 00000000201cc000 R11: 0000000000000246 R12: 0000000000000014 [ 482.602727] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000002d [ 483.667346] Shutting down cpus with NMI [ 483.671956] Dumping ftrace buffer: [ 483.675474] (ftrace buffer empty) [ 483.679161] Kernel Offset: disabled [ 483.682763] Rebooting in 86400 seconds..