ffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:26 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:26 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0xfffffffffffffffe, 0x0) 20:31:27 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3178.674696][ T26] audit: type=1400 audit(1553718687.281:619): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=15748 comm="syz-executor.1" 20:31:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000007c0)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1yD\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x015\t\x9f\x7fz\x98\x97:\x16r\x8e,R\x82|\x96\x97w\xe3\xc2{\x9b}\xa5\x9e\xb0\x02b\xb14\x7f\xa9%\x86D\xdf\xf1\xae\x1a\x90\x80\xf4\xfb\xa6\x92\xa9\"\xb7\xd0\xb8\x80\xeb\xf2>\xd2V\x0e\x83S\xbe\"\x81\xb5\n\xb3a\xb3\xb9\xd3\x90\xd8Z\xa1\xfc\xd6\x8c?Tn&\xe4F\xf4\xc6\xcf:>B,\x95:w\xf9\"aO\x05BFU2i\xea\x11h\x152(=\xe3\x83\x88\x90xH\xdf\x8e\r\xe3\xa5\xae\xcd\xe4|\xe7\x8a\x18-\x1a\x8cR\xca\xd5=U\xcc\x01g\xcc\n\xb6\"\x84\xb0\\\xcff\xd69\x9c\xdb\xf2L?I\xb9y\xdea(\xd1M\xb6\x11\xeb\xbe\v\xdb\xb63\v\x8a\xdd.\xbe\xe3\xdd\xd2\x12@\xc8\x17~\xc362\x06\xac;\xael\xe6\x0f\x1eK/\x05R?\xe5O8@\x9f\x88\x16\v\x84\xa8\x92+\xd5\x04\'\xb7ht\xbc0\x9f\xa3\x8b\xcc\xd9\xd0\xd4\xe2\xdd\x14\xce\xbaS\xf7u\xd41sb\xf6\xa1\xbb;n\x84\xc4\x91G\xca\rk\x1a\xd2', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3wm5\'-\xfb\r\v\\W\xf1\x16\x97K$\xa783\'ODF\xa4W4\xf2\b\x0e\xe3\xc3\x19\xc6Q\xd2\xd7!\xc9\xfa3D\xb3\x88\xf6L\x9b\x9f\xd3\x04\x89y\xf9S\xb2\x1bd\xb9\x8f\xc3\xaa\xa0qX_\x03\x15r\xe4C\x1a\xec\xf7\xb7-\x8e\xdf\xe6\x7f;H\x16\x99\xe5\x7f\x90I\xc5\x02!\xd0\xbc_\\\xfbw\xb2\xa0c\xeb\xfb\x9aiJ\xeb\xc1\x9c$7-o\x99\xc6\x11\x02\xd0\x93\xbe\xb0\x19\xb2\xb3@?\xc6\xfe@\xe18\xb3\xb3<>aD\r$\xb9\x9d\xbe\x17\\s\x1e\xc1\xe69\x84P\x92\xb8H\x1f\' \xa6\x95\xe7\xbcQ\x87v\x1d\x8c\x80Vq'}, 0x2fa) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x139f02) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)=0x1) [ 3178.827648][ T26] audit: type=1400 audit(1553718687.311:620): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=15748 comm="syz-executor.1" 20:31:27 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(0x0, 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3178.935862][ T26] audit: type=1400 audit(1553718687.541:621): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B179441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B pid=15836 comm="syz-executor.1" 20:31:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x4ffffffffffffffc, 0x2) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/220) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb6f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06772e42e9d1db9e78d24341bf0c2bd2979bac2e0d4494f1ee8ad5379dfed204dd4ee8d1bb83d536c320686bca79dfffffff7f00000000957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae689d8a0b78d6879b2b60525f24318551347a415166d9258398c127ae058f23de581368ddd5a227dada44bd047d0229822a4633d025628650f8587f12cf35e14262ffb7fb9fdb84233dca198169be9f0d4bba98afc728c0d3bf451187cee6c5c88c0f6b"], 0x46) r2 = semget(0x0, 0x7, 0x2) semop(r2, &(0x7f0000000040)=[{0x1, 0x9, 0x1800}, {0x3, 0x6, 0x800}, {0x4, 0x4, 0x1800}, {0x0, 0x1, 0x800}], 0x4) [ 3179.006644][ T26] audit: type=1400 audit(1553718687.551:622): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B179441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B pid=15836 comm="syz-executor.1" 20:31:27 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:27 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x101c02, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7, 0x400) sendmsg$kcm(r1, &(0x7f00000008c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x2, 0x2, 0x1, {0xa, 0x4e21, 0x2, @remote, 0x5}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)="1bd7ab813110463bb1b7e139cc93432147df07352ace3e1322609882e0f4c1ad24d7e778520a2b3112352ace7e24998a2ba46de4025e5b9d606bc84f81e595e70c8d8f0d594668ec040ca6bc01d6791f0c659b32d30a90b70c952875a05eb3150fa523237bf7bac71189e9f0176c3882d78344cd5ecc325c838a2bd19743b5e44f3c6fb1805210ceb817c38025d6bd4ec79800ccb4e82902d47f8d904255a319f74648de886e1ad700533cc032f57b216d746ea0eb5afb600a7c96a6735d302fe822ce19513808787e47366deb49f7ad2022db782038c43d70fcba8cac2f", 0xde}, {&(0x7f0000000440)}], 0x2, &(0x7f00000004c0)=[{0x98, 0x84, 0x40, "60175f3b10d82107a930902037ac98ae84ff31712f0e80ebf6bd70232f6610d36de08be5150b01739fd615ddbccfead91cf9d943f8766e522d1843179d58eb8785266b6f3561176e5386bc09a712f9ebbfa9af04f4d9ca8708ff6953e63f40c913dd402d9e3f07b8b38f67d1519b684ddc6e869b78392a2c626b5e00702f27c16acd2b"}, {0xb0, 0x18a, 0xfffffffffffffffc, "762a728bf17bb0a5c235827ae467fffaa9cfb7ae64da6641d81a46322fc735a66b50be279392b03de634d43eb3180d9544e1d151486006cafc295273b5f515496b5051d8424e828499e5233e8acfe38125d1723951c105ee6bcf06842bbbc45feb0b152bb0149c94e96471ecd5325a23ffcbf89a4843b8aea11987c6fdab09a585a8d560cc833c034b41ddd74c82c800fcae154e6928cec85e26e071c2bd5fec"}, {0x68, 0x114, 0xfffffffffffffff9, "571866205c176aa79c1a4cac5492588ce7923375c127b5b8864e12f6ec73167e5423a63eea84024f0f2b4d77017a9627026be04e1fe5eb88c25eae8543696b71a19de5de8994bc76bcc547783d4fc304e0e0"}, {0xf8, 0x19d, 0x0, "6f6d462ba1cedf6ff4da0c4322a14ac9664c95e1b65d46bbbe20cf2ddd26edef309eaec577b55959679c40f4f2cafdb45476c0ab5486f574c457c0910db33b64cd624dcb42d495a6a01bb5e01d6f4f0f21139866750de1ebd11416bd23e7ca05519282aeb3a316f865fcc697bde4fe7d1888fe3cf7114178d1b2d385a26dc4872fa085c7f31c4400b8dd376355be747dbfe0f92fe4d1e368bb61d740dd6d17deae07569a9144648bbbcfce9e1ba288df0448c5ab5c9544c276e59521a18fdf3fcd30b7d6d987f1c95e701a9f1d0337b501bc55c3e9b6737e1eac396dbeeaba57697cb4"}, {0x40, 0x107, 0x7f, "7088bffb836eff6e323399a65692daa238ccec77fb51b1e9051d9b16ce5d5cd7f5695905d450d3d449be611442"}, {0xf8, 0x116, 0x5, "fac6d883bd44f83f8a98eb8b33fe51d29391c8a36051ca6ee47b382a787f3a170cdbe6dd9622a484116dd8773dcec5115746ddea629754b60e1bbd681d2471bb5212ec30035616913af7fdd26cda37a8a8a3e3fa6bfb97168aadccdf0e485aa17f9baefdd71623b99c780cd518cc5f92833c771c87934843604106caa21e22a56ea9cca6476199d2a30ef261b0bcf578274fb8330f0878ba3a274791a3f7de887b2586aea9688d8b4872b65fac3953750561bb5b7df44fb97e02b904d8381f9b4de60b5f4d2fad78b655ecd645120b67a82f0bc9f36cd6629490e4d6652a0b1abbdf882c"}], 0x3e0}, 0x40) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) r3 = getuid() mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x1000000, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x81}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x8feb}}], [{@uid_gt={'uid>', r1}}, {@seclabel='seclabel'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r2}}, {@fowner_gt={'fowner>', r3}}, {@fsmagic={'fsmagic', 0x3d, 0xf34d}}]}) 20:31:28 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3179.586535][T15909] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:28 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:28 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:28 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x9, 0xcbc7, 0xaf}) 20:31:28 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:28 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x2000) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f00000007c0)) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:28 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:28 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x80000001, 0x10000, 0x8, 0xbb99, 0x3, 0x3e, 0x8001, 0x9b, 0x38, 0x2b4, 0x91, 0x100000000, 0x20, 0x2, 0x2, 0x100, 0x3}, [{0x7, 0x1000, 0x2, 0x8, 0x1, 0x1, 0x80, 0x2}, {0x3, 0x9, 0x0, 0x3, 0x0, 0x6, 0x0, 0x400}], "83982d72181b611e80b5f6d8d076b316f066b6ba7bae74de774dc89d5ad778ce8eb6547e9990989aefe603bac9d0f962d4cdd2dfb10823afde1806d37a00471e132267ee133d960c1d31d12966922b191347382922351ce0f1c22615e2022337db5bfff7932bf3e55439029bbd9a2ef0b2d4fe25f35e583caa69b9e3e1fdc2e0609a1d664e8be6688ae4f76fa7a05a29ab2dce"}, 0x10b) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x0, 0x400001) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000380)={0x7fff}) 20:31:28 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:28 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3180.348107][T16044] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing 20:31:29 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3180.905296][T16188] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:29 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:29 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:29 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:29 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:29 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:29 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 20:31:29 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) socket$inet6(0xa, 0x4, 0x1ff) [ 3181.405757][T16419] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:30 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:30 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) socketpair(0x18, 0x800, 0xc607, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x7, 0x9, 0x200, "dc73444922442673be7b6125cefc9b8f2b6b4c6d9c6e6d987d7d8f2abd8e00783f4a49f1280fbde136abc46e75b7f088f613bcb8d7ec8249e8ab80910123b9", 0x6}, 0x60) 20:31:30 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:30 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:30 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3181.834243][T16475] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing 20:31:30 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:30 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8002, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xbd41, 0x80) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032dbd7000fddbdf25030000000800020010000000080003002f0000000800040002000000080001004e200065762f07006888ea0c46382df3e445dbba3c31059a1d280da52e944ce2e74714b800a8f866daa529db22c7d03510fcba22be864015ae4cb770c8b56e7242df94ce89bd29794b39520be8c4ecae7b3c20bc59b26594fff2aa33c69ac76bbab82a85a87d9cfde76be0f048ca0f18623e51d22755e53cdfb39f383256b08ce8f5ddd2d6533e4f8e8a90fd1e490df90bc2234ab9564fffa6ccc5bdfc006daa898282b6562a475f21"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:30 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3182.128053][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 3182.128071][ T26] audit: type=1400 audit(1553718690.731:636): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=16601 comm="syz-executor.1" 20:31:30 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:30 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:30 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:30 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3182.369754][ T26] audit: type=1400 audit(1553718690.971:637): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=16619 comm="syz-executor.1" 20:31:31 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x46) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x30000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x3, @rand_addr="cb0f36383b1b7be551fbaf8fc5a9c052", 0x3}}, 0x7, 0x8, 0x6, 0x9, 0x8}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x4}, 0x8) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/152) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 20:31:31 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3182.672856][ T26] audit: type=1400 audit(1553718691.281:638): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC836423FE1A0244C083CD7BE4441D3BDE83557DE030BD7DC2C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D9 pid=16745 comm="syz-executor.1" [ 3182.784112][T16712] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:31 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3182.808659][ T26] audit: type=1400 audit(1553718691.311:639): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC836423FE1A0244C083CD7BE4441D3BDE83557DE030BD7DC2C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D9 pid=16745 comm="syz-executor.1" 20:31:31 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3182.895723][T16681] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:31 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = msgget(0x2, 0x100) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000240)=""/7) write$apparmor_exec(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x3, 0x800) [ 3182.993744][ T26] audit: type=1400 audit(1553718691.551:640): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=16756 comm="syz-executor.1" 20:31:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:32 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:32 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:32 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x8000) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f00000007c0)={0x1, 0x0, 0x2080, {0x13000, 0x10000, 0x1}, [], "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", "e1bc8cb95ee77e538f3f307758fb9a14cc8f15cfecf5b5a9a38b8af5911975a968ee3b3181d9440e63582a44ffdc7686cb496fcc1c52a1e77ced3b480c9c8f1cf550660db6fd2f63e0bd1b78b1616219ca0d3e976983d9cb309dc65f0f45a7ba3ac020ca74045792562c919aab5b594cfafc73f3ce987f6aa9d665f8dba9e544245d7496b1e97641d5a636661e84c448ea86005bcbff036b6386cd6cab54e75d4d705b944112baced11fefdff300b3152baf8cf838dc1ad8a16d323a5a8f67eae140e01f241a506e54aba786accdab9b9c9062e4f45ece71e123d4bc1c6545a97c0df7625cb54fbab9479b3b37ba0011da825f769ba5675287595509a981ef12fb40b536dec6b8b78353af6c00f8880f0273ba7050a0d1515269a0e988f176a20c6b48fc4e0fd8ed4d818e3573ed81e17eab905c2ca91e6849d4e92300ccf5ed6d8894fcf463e8e32e4b3b694ceee382509af96b0c1ab387c519f345b388b41b31e49d5215f92428eb7825ad6caac6471611ae73c64ffa6b82927761286799d4317ab4c3c7b60733ac13f93901701df791edc560b92eaa0f657811c6ab9f6294053da0ba945b9ec7f58e85c772199adde5ba18b145d259d90432281ba83314ddab9430f6a614ab4a8954305eafc039edd7707bba20a6a65723fbbec1de9022e7931c3f8f5cddedc2cc69da831cf9eb8540173143951008013d8a318f51282874012576cbe755c72ac0c9b1ca74cda8f59d29555839f956f369bde605f476dc9a3cab1f127bc1c3cd0bae11ecaf9fc75f5ca70749a7a24e7c9855a4d54f6d992599b40d64605478bfa4fc238490e3c11cc96e95b38527390c602b85995a3942c43fdd5358538b6e43c7f5904b414d9d80aa47b48a48caa2c8b4766db6c6e1542e3652432f4c0b5e5dc4add6773d9fee651da047d016689e8320e75c05d6908d1348f7fa7b5ee9928acd81f1c3280db82ca144d4093e6d26cf65bced950c1ad4d49e06848db69d65af0595ccd376027f0fd91e87ff8e267e5421ef4d0c0794045d4b4c072ca396e87bfe5a62dd45a2d90d6d93770b8f6048504999d585d8035738f59cab72564fded9202d692490053d54248e1eaea7012e6998f3030b59dbb789367d4879728967aa9e114492d2a012782a9f8f14704933a4f0df6b2e52f548446d540a64fff75c08c43390dc8f4f7f74a8f92ba809c7a6ff19f906cc067ff5bc5d7fa4737a3ddfbc6010988692e3484438fa4ea3f925dcc0ac67de193db8efa9ecf243039920b8ef4943abe1a447c3d3dac7ae6fd96b74a732add0d743338c5ceeb19d3b34ff4bcccf5b50a9f4b913dead42630796127057a3c0c6a44bdc28e9113e97ea02629612478a69593fd262eae64c794bdcb009e8427df7f53a10d6b0898ee14fb695592b681a294f7d258c954b10adc05b4da64ef410200d7ca736df4a0d4e0b662d283edecf60489f72e13cf20d4ef145af29e30c48491257a4e3e8e85484c4c2524cb8bec952b2cb93c98ffab137692019e08ba65dd22223f587a5946a2eecf15d0cff0dca6287283e7a895b9f989f7408f89a92f5c3e204b7c3809a1ec412fed1f267c9cac37a9aae7593e6b2d8dd6dd030487a46158cfd6e7d85ef580cc965bcf3e76fbe548db804184c50f43ceba5e79d5044ee18fb4f3d6d5d88e82b0fc4512a18a4553261ba055056ca836522636d0bacf755f4aae2367e53bb009bb7920455374c340c08f2e85dd331c6c9dfb5a42a4b88b541303b9401983c297cc6573b0dcd9519f435942876f451d05ff7b854187a12c420ffdf0a38d58d458c0ba9edd773cfe5d3491b34d4d7231f168c798dfc8dfbcc646d6273477f42779a048eab5f2e79d91cc015d7b3bd06705312eb41a76da80bd55a47d0f114dc02deda000994dfe6083a18c4fc02f5390c76bd4d39ad5598e2503b8b7f766f250612efee53e218c7fc1a53e7420be70eb8cc6c142d3a8a5bcdd61d565238ab102f2b4a67d47bcf59bed8e72d0fe6a8247f6c7c139860e3c7dbeca682014985a15b593ce202f06184d5caa74acfb21656b39035d76b514412aa2139e1b0c1add66ef7e06042296bbd90db868d2b7ab64d09a494dd6ec5029f2b4d49c0e2914ac675c962006d94748e3496e578fe67dc5feb995531cbe2407b66f03869218564a6ee0c93f60420e7d5636e14b9f3e8e517f14d221d1a447b33968a1e25441ee616bb0919ef109f43186525a440c55e2dcbbcc377b49893a1ab70cf57d0eb883d4ce8bf0aa7456c0f87d15a527fd3663c2589c23928a65789ef0716b6c0fbdb4c028818dcea75788c25f92bf0ad6cbc697c74f8579e1736ef61110f72f7cb2af43c927d8fbf60e5f953ad80a2b01fe1335d48984c634860222c2ce0fbdcb4b57b13526c5dd91f976dae2a6314e4fd8aa5243afacd44da9d825747b7cf5e0e4f4c341bc58f07c9d21a0ed524bce75643a75fae4c64b1918ba4b1d21cd9f40bb16a0e59d30950d05535c0f3b9064ed82fe23f02606e4a9dbed862a62fe623e65cefc48bfa5da65ce48795aec7aa3db9784fe70b106f0001b0183cca0e514b3747a4e6b2a9df27735291b0409f7c0783174facdf9abebd195b28f859956038425d9b5647821ab2c26529baa0a6648047e0d90eabdf775ec0bf7fd4a7d13a5db8a8f482b1956c260019276ec25031ea94d3ff6c1914916ae70373588a678e64f4ecffe117788702fd46b0c97dd12449ab88316490a568d066cd8e052908c772a134be353b239855f827462a6644a5f8dfa9ef878910b99787753050ff65ee945b6cb0ab3629e92126f3657e719a9e116af65e040187dabc42542de7e5f27a0e200253d78bf9b3392d60e5628aba49e8dbb3d5ea7bd6e6a1b0b41d10ad993c07975ed03e983e42713aff42ae2d4e7ab5d5fcb3a255c1d1c8f7a0f631b7e7a85aff664fbddeec70b22a6c6ea818519c7cc6ee94ad8a47864ded76f1bcfe895f5e99cdddc575429a2c528dea5c8f3f0e5fa01ebd86f09db3e69402e18faad8108505ab86c81a3ed67c7fa895e243bc8b2e459ec0e5cfd3b3866b7b4dbef9e17575097be9ba753203a20a2a1bd87d2ea753c222b7bba48e2d1f969ff22098d4a210d2e9d419249a4dad3d75555f607b879ad9de5948f8754b3ead81164d411c04a0d32bac779f66fa2e10139a2a7bef125b50c4e924a48ec801571654768ee392693c5f33f18190473aa23ba7db6787a39af0535f9c6fd75dfb9a4f8d11428697fe9e56c62856d9b006391e624774c27e39913c830b3966831d0ebd578a65fcad88052131cf68e4c89b9b12afcc5673cfff9da7c6fe0a439d023dce1e41c5f246a72d31fcee81949756a32237e57504d8378d7c0de025e48d38eb2bf0918b7662f4bc8fe248814d4310ca1c978f575516c9fe549392d88a3fd72c97e55ff19408c276ea85738faefb27d9fc2c8d5d75e8f98d5927c95434f01dfd3223756ede67eab15e79ff3dbe41f085bf5992c7fc54e9f0acf77ff99bf90d6dbc4afd319bd84042cd600add659c4c57d5f0d99e73079974d297c68b30d0e131836c2491095407484fa6019d2b91c64807dfd147b22d3df26ec3c396ea61ad073040d0e32efa45ceae899ac0072d5623e07af456e87e76a88dde4f380f71377b6a6e62ac6356d9a541e8b9342287aa10733cc824030e187f6325325742a10aefc9fa94bfd181ef01f17e51f7be7cca632231a8fc0fdb215b031b78c56736480ac033e47fb10b70965ebaa51f6855c8382ed91ddf052b37f16f31380a52163bb0c14d4f7700af15304d12727e493c6a449b40feb08d11ceb00a9810ba15fce89dcab92a16bdd482c66b1e9d0cef6042abe88eb3b47d3e07086ee4699cf1a5d6f2664f046bd7825994777411bed01778b6029f8db9bcc91ede02b330de91eb07c8a594e9bb14e811155e8c0df88fd2da0c4d5cea53395d172a000b4a8fcb4a28653a2877a5e9c30027c688e75ee3989f235d90a04c6bc9d32327f681100b46dbd83a2ebb115b8951a254047db6333e814b1694e952bfbfa79e8f668d48fd24dfc064e9caacb76d4b77b255a7c39e7c434697a5611b626b7143608ded2955ba1719f034732f930e7978212b7151756d6f666d08a8a7fdea9cad1969f30ba38564858fb83e1a8d8e3158223e991cd2eeb24e5f8ea4c246004dbcf74b1cb51b4b793962dc06f0f6353fffadf919a4526c9f0bd5b02e2eeff562fed34c438299274c6e9b791a291771fb97ebb765b7e0016ff28af6a75a81a180ad280a4d9bfea744109c619021c27f3f08647642dfd9b8c504f432f25fa40d766a3c27e141e9add00c30c3cbc9bb230e75a3ff4909d0bbcfe7bfcdf074fad3b4ac1e46818357f1055b6d5ac13b25ac0ca08431d4e7ac589eb1c813cc2e19f5fd243a1a90ae86156f05b73b26f3a6c607f7449004b8dac36ce69f35317cdaf560b93b76eb92254b84748668889015a73920ccfb4df557abddf793e48a5cad0ab60756716481c3ace9dad4cfb40bfdd790de95d39e16934d96d8c158dd4229a50d957e5596dcbedddd7b48f44d754436013e3b4943da32e5af9c6a0bd816cc1890421b26be81da9a77603fb92fdf395f8bc0b9796bacd862607a47b95920544e636bc823c1b8cd1cb23140d96da80997d2cec09a8897d869ece0519a121e33902f4aa1743058dbc2568fbd1e49af3326d4e288da34d0a22c58b89be3784807c22c7d5a0c9c3baea7ad3637c339c8f653682b213005519bcfa708fbfa137e05448b0e53b41065d3b4204345b2cfe1172a0a5bb0481320816021bd61a18f6051bef107028f20cf030228a60f17db1b40da1c274123d4cf2bc46ee10427b4f45ae8cb61164e0b593b328417264ff6e6e5ffad0a0cd32797bf44f8006fbe2274caa4751f45231b9c3a720efac18b0594b0741cc0ea2619345902237420aa0fb0e1b67a62cc2873999549ff9fd0de3a6c244590b26e8c7833ef4a01e568e7612ccad60ca42aac850e313ce7ef3285d4e6ae86a785aa624094a67f6a12bfe49cb4a85754c91adc50a4e351a34fbc578b09537290dd44ba1882c57bcd2b40ec4d38a59525a82ecc5ccef8ee9af432b50c8fb903591734c0c47d3d1e99382cde1dba69770190356ecb04f9e0e0436a8c1cd5fd454cef859694e91e98b81475371273ee8e954783928afdcd516d51802c6b4a845f3394074c98f18bd3eae874008bd5eef4873a6ec3a62bc03020db3bc663d9a066894f93eb35b7b1dae34d2bf37e0fdbe223e8259c82aeac2e49af3c96b2c83bd19cbaaf49dbf65fa659ae30f308df89102e5836d6b83f7fdd76aadca93a25571ad6465e1a1eca45724193845b3ae877da4ce724d20d3be0d824d5b51df25e035ab5a277c9c3185cc814a84710c7fd8cbc1b25db403ffe7184fbb3060d5ae1eba9968f135db7838a92ed0d5b956e5721e4b5ab03033bf31d3ddc0de56fcc87973056de21997834305969e2ad8cd661dd1d6e223bf6799199ef50d911998727523c45c12abe05a36ee6c031de7caa4f662d90ee63b5ee70ac74287633bee74599c2701e21b8632d29260a0935f875720db0dc8da1a3874798390922acadc88128561fa86a741542fb68391bd64f45691d2b75dd04a351086cd11d29fffad49539e63ed43038bd030fceecab51cbf603862cd99f49cf19dff9884d69c50b0e48baa5376f7b0aa5e303edbf7bd1919d950e227ced9569745afdc98a67e27a4120e724e558bb4c6acc7fd8d99394d791bd03797afac59365fd8b6ac2d6344ca47772a87c054bf4"}) 20:31:32 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:32 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3183.478532][ T26] audit: type=1400 audit(1553718692.081:641): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=16882 comm="syz-executor.1" 20:31:32 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3183.655531][ T26] audit: type=1400 audit(1553718692.121:642): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=16882 comm="syz-executor.1" 20:31:32 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) open(&(0x7f0000000040)='./file0\x00', 0x208000, 0x80) [ 3183.812864][ T26] audit: type=1400 audit(1553718692.421:643): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17016 comm="syz-executor.1" 20:31:32 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:32 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3184.013183][T16885] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:32 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3184.063617][ T26] audit: type=1400 audit(1553718692.671:644): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17027 comm="syz-executor.1" 20:31:32 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x20000) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000000c0)={0x7fff, 0x2, 0x0, [{0x9, 0x3, 0xffffffff, 0x7, 0x7d7e, 0x8}, {0x0, 0x0, 0x8000, 0x7, 0x5, 0x5, 0x7fffffff}]}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3184.216193][ T26] audit: type=1400 audit(1553718692.731:645): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17027 comm="syz-executor.1" 20:31:33 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:33 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:33 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80, 0x807fe) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000100)=0xffff, 0x8) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 20:31:33 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:33 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:33 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:33 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000100)) 20:31:33 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000080)=0x100000001) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:33 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:33 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:33 executing program 1: clock_getres(0x7, &(0x7f0000000040)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:33 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3185.491644][T17326] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:34 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:34 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = fcntl$getown(r0, 0x9) sched_setparam(r1, &(0x7f0000000040)=0x9) 20:31:34 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:34 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:34 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:34 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:34 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:34 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:34 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3186.011179][T17449] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:34 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 3186.056113][T17383] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 20:31:34 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:34 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3186.564711][T17607] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 3186.586752][T17613] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:35 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:35 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:35 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:35 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:35 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:35 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58d3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f837f5839b0b3901c315f72c8733dc6b5b3"], 0x46) r1 = add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000580)) r3 = request_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r2, r3}, &(0x7f0000000340)=""/100, 0x46, &(0x7f00000004c0)={&(0x7f00000003c0)={'sha512-ce\x00'}, &(0x7f0000000400)="8969707476b229d48df8520a16b02ff6c30342e03d43b24009e4e875dae1204a26f8683f7dfa5e80824ef24ddeffd785e6d3bf107cbd81e737e135f31066632d4938d25b41d4f2314e05497600305a48669d53425507611336f0ddf588aef3a4a8196b0e0be0b04b4b70355cf4dd51a7f1a7bd08f672cd5c7b8f9d29141dda53279ee578ee9fb4a2cb76aca10c27148a5f5a799bdb8a0f0fac73130c7ccb73", 0x9f}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 3187.055702][T17632] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3187.138180][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 3187.138196][ T26] audit: type=1400 audit(1553718695.741:657): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17756 comm="syz-executor.1" 20:31:35 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:35 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:35 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) futex(&(0x7f0000000040)=0x1, 0x5, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000100)=""/135, 0x3}) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x401) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000300)={0x7, &(0x7f0000000240)="f89bade0b9492a60bb033366beb4b72fe0d4c228b465439df4e7fc5bab303645d1a128e0aae1330df519652f1bffd160ba774b72aa5d389201770e0079f31ecf4ebf33484d9553ac6a75f02f882925310a7f2f92a871e3faa6c1d2f3ce72efac58f0a9944a50f6c4eff062d99363bb33a68df849f43492214127130d67eb6e636f13b77977e0fe76f2e681a98e8ece3dca3a5a8c956c56"}) 20:31:35 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:36 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x1f, r0, 0x3) io_setup(0x101, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="b93c564b86c1490d5f9ef9ec63ff2d38eaac9457589d566a", 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000280)=0xc) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getregs(0x10e, r3, 0x40, &(0x7f0000000100)=""/22) sendmsg$nfc_llcp(r2, &(0x7f0000001680)={&(0x7f0000000340)={0x27, 0x0, 0x2, 0x7, 0x3f, 0x7fffffff, "7150f964955ef8b51fc98cda3ef48b63c23fc768e107cb595a86297853dd5dd6a620e55f95fba129de96ef81e6055485683f0bd311190c48bb67d83d918b11", 0x32}, 0x60, &(0x7f0000001540)=[{&(0x7f00000003c0)="cec1956a7ce240ff29b38c7acd86d9f2f9feeb3e0e93bfffd2372da9e55977c073c4b89a84f0dc88c20f607def5ff4035cd56f7e841676ab4db07f0788023f5fd01463e593500fb5c5c83ab5480eb6ed8ae486e1fb43f0bb2917d6752eeace6da80162fa8eb97d37c581f8e9e7481352bc69239cd6ea4259baec0f46be4abaf8b01fc764366ccee95720817d8a7dbab143cb6e81a6ac1526e1ec1601a8521c9c51712e615b470b42ef79877579c6d269a20ce1a2101673cedb7538a21c1fbd387a99ff8e0289bda8e4ba6ce1b916ae", 0xcf}, {&(0x7f00000002c0)="0767ede5c8a5be8cd070fe7b1494ae5b4308e0c664e9f98b336054d693c3a0f1ffd70193d4c13a69aba9ef2e667d86e29f8cc5979bbb586133", 0x39}, {&(0x7f00000004c0)="6267ad2ae57ba0146df779284f4a9eafda1703eef935c29c61626d156f748fe8ce17fe9114b5822409cb2bdd8f8bfa18c127e51d22ea8679acf3f782c7a682ed6a7ccf7b098905fa24c95e", 0x4b}, {&(0x7f0000000540)="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", 0x1000}], 0x4, &(0x7f0000001580)={0xd0, 0x10c, 0x9, "4ec607420675a173e9660d0a29ca2ab83ea95960ca38243beb485d0965928adcb26a3b36d72f635e0327b436ffa001186551c306d988437842c1dd84a8edf22322ae913424dfd4703192a227676d71f316da8611392cd609d0718a72d38bc6dd8f3b55cf3cca68c6fbf4fd76d0780556ca09b5bc9a4e71059eb897aa5edf6d1b247f038bd5ccac46c0a2f86f5f8867b9cf1ff37cd5b056a7e3ef021058f0530c0d9c38339fa2690a181f507dfa849fade0fb1083e7b9f151b3ad8e15"}, 0xd0, 0x1}, 0x4000000) r4 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x24c71ab72eae0857) epoll_pwait(r4, &(0x7f0000000200)=[{}, {}, {}, {}], 0x4, 0x10000, &(0x7f0000000240)={0x401}, 0x8) perf_event_open(&(0x7f00000016c0)={0x5, 0x70, 0x8, 0x2, 0x3, 0x7, 0x0, 0x3f, 0x0, 0x4, 0x8, 0x7, 0x100000000, 0x9, 0x5, 0x2, 0x800, 0x1, 0x0, 0x0, 0x1000, 0xb07, 0x5, 0x7, 0x1f, 0x3, 0x100000001, 0x5, 0x3, 0x4, 0x14f, 0x1000, 0x7, 0x3f, 0x9, 0xfffffffffffffff8, 0x1000, 0x4, 0x0, 0x101, 0x1, @perf_config_ext={0x6, 0xe0}, 0x80, 0x3, 0xa9, 0x8, 0xffffffff, 0xfff, 0x7}, r3, 0xe, r4, 0x8) sendmmsg$alg(r2, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0x683afc}], 0x1}], 0x1, 0x0) [ 3187.360179][ T26] audit: type=1400 audit(1553718695.791:658): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17756 comm="syz-executor.1" [ 3187.446154][ T26] audit: type=1400 audit(1553718696.021:659): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17771 comm="syz-executor.1" [ 3187.684854][T17789] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:36 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:36 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:36 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:36 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:36 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:36 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c328b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553d5aafe5df2f98d0093a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc2095765406004c2e9af281fa937d1b01008adbbd35e8f576ff84008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f837f5839b0b3901c315f72c8733dc6b5b33b80b7dc89cb9666da3854c88a14f7585dbe60eb4595d3c08fd892d30a204bc51f5b794d6a1905113bd4fc3c8e4d021a4a18797d3e4ef837b4802677ae7e817e11e0d8f0f50c59bb9bc71bc6ed291bac9d8a14e1ef6cdb23e901ea271e12ff7f8b0225b54a9c4a7bbee55a0b985521945de18312b73a32af01577e7b8d52e8a0ebd3b79b87cb8fb22dedc4e27d6728fdb7f053efa2242f65e2dda207e7ded953daa1287bef8c24e9f63ef5ab509393157b0c2a4b8c493bf3347817f002f0000000000000000000"], 0x46) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x400000) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0xe9) [ 3188.034770][ T26] audit: type=1400 audit(1553718696.641:660): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17802 comm="syz-executor.1" [ 3188.180542][T17807] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3188.202993][ T26] audit: type=1400 audit(1553718696.811:661): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C328B7722E30CDB22338030CAD618DF337F9967F pid=17822 comm="syz-executor.1" 20:31:36 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x220000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x80000001, 0x698, 0x19df, 0x8000000000, 0xa}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x1, 0x2, 0x2, 0x3, 0x40}, 0x14) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:36 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3188.321003][ T26] audit: type=1400 audit(1553718696.841:662): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C328B7722E30CDB22338030CAD618DF337F9967F pid=17822 comm="syz-executor.1" 20:31:37 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3188.480359][ T26] audit: type=1400 audit(1553718697.081:663): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17830 comm="syz-executor.1" 20:31:37 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(0x0, 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:37 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:37 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) keyctl$dh_compute(0x17, 0xfffffffffffffffe, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup(r1) getresuid(0x0, &(0x7f0000000480), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000180)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x14) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bcsh0\x00'}}, 0x1e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f00000002c0)) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) ioctl$NBD_CLEAR_SOCK(r4, 0xab03) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\xa6Z\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', 'leyringkeyring.(]vmnet0\x00y\x19\aU\xe5\xc2#L\xdf9M8\x1d$\xaa\xf5\x02\x82\xd3]#\x99\x19\x02[m\x11\xaa!\xf4N\x8d\xc7~L2F\xee#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:37 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(0x0, 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:37 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:38 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x7, 0x100) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f00000001c0)) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0xfffffffffffffeb2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$ax25(r2, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) [ 3189.344140][ T26] audit: type=1400 audit(1553718697.951:666): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=17980 comm="syz-executor.1" [ 3189.520020][T17985] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3189.582716][T18054] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 20:31:38 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:38 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) recvfrom$x25(r1, &(0x7f0000000100)=""/10, 0xa, 0x40000000, &(0x7f0000000140)={0x9, @null=' \x00'}, 0x12) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000500)=0xe8) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) socket$kcm(0x29, 0x5, 0x0) write$P9_RGETATTR(r2, &(0x7f00000007c0)={0xa0, 0x19, 0x2, {0x1126, {0x0, 0x4, 0x7}, 0x41, r3, r4, 0xd80, 0x5, 0x20, 0x6, 0x3, 0x3f, 0x4, 0x0, 0xfffffffeffffffff, 0x3, 0x42, 0x20, 0x9, 0xc, 0x7}}, 0xa0) r5 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) getsockopt$inet6_tcp_buf(r5, 0x6, 0xe, &(0x7f0000000240)=""/238, &(0x7f0000000340)=0xee) socket$kcm(0x29, 0x5, 0x0) uname(&(0x7f0000000040)=""/64) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r6, 0x89e4) fsync(r6) write$P9_RRENAMEAT(r6, &(0x7f0000000380)={0x7, 0x4b, 0x2}, 0x7) 20:31:38 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(0x0, 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:38 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:38 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3189.852182][T18115] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:39 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:39 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'s\x01\x00ck \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x00\x00\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xe3\xc2(\xb7r.0\xcd\xb2#8q\xc9\x19O\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92\x9f\x95\xd9U\xf6\xe7\x84\x02\x00\x00\x00\xff\x0f\x00\x00\x00\x00\x00\x00\xab\x91!q[\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000080)) 20:31:39 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:39 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:39 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) keyctl$dh_compute(0x17, 0xfffffffffffffffe, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup(r1) getresuid(0x0, &(0x7f0000000480), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000180)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x14) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bcsh0\x00'}}, 0x1e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f00000002c0)) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) ioctl$NBD_CLEAR_SOCK(r4, 0xab03) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\xa6Z\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', 'leyringkeyring.(]vmnet0\x00y\x19\aU\xe5\xc2#L\xdf9M8\x1d$\xaa\xf5\x02\x82\xd3]#\x99\x19\x02[m\x11\xaa!\xf4N\x8d\xc7~L2F\xee#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) socket$bt_bnep(0x1f, 0x3, 0x4) [ 3190.640516][T18260] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3190.659339][T18254] block nbd0: shutting down sockets 20:31:39 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:39 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:39 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = pkey_alloc(0x0, 0x3) pkey_free(r1) [ 3190.904357][T18261] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:39 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:39 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:40 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:40 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000080)) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) write$P9_RMKNOD(r1, &(0x7f00000000c0)={0x14, 0x13, 0x1, {0x4, 0x3, 0x5}}, 0x14) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r2, 0x2d, "02c194b767b4f4ac63dcb2da89c98c616a296bdb8e06fd50e2516284f60843cd6a638c408ca1fe36467245930c"}, &(0x7f0000000240)=0x35) 20:31:40 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) 20:31:40 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:40 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:40 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:40 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:40 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:40 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3192.312418][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 3192.312446][ T26] audit: type=1400 audit(1553718700.921:678): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=18623 comm="syz-executor.1" 20:31:41 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0xffffffffffffff53) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0x6, 0x100000000}) 20:31:41 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:41 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:41 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x26c400, 0x24) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) [ 3192.766069][T18698] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 3192.796511][T18710] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:41 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:41 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:41 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:41 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3192.895987][ T26] audit: type=1400 audit(1553718701.501:679): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=18825 comm="syz-executor.1" 20:31:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0x7f, @rand_addr=0x7, 0x4e20, 0x3, 'dh\x00', 0xd, 0x2, 0x6b}, {@multicast2, 0x4e20, 0x10003, 0x2, 0x100000001, 0x995}}, 0x44) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1], 0x1) [ 3193.388219][T18895] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 20:31:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:42 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x40000000, {0x1, 0xffffffffffff7fff, 0x2, 0x2, 0x80000000, 0x5}, 0x7, 0x6}, 0xe) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:42 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:42 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:42 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:42 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3193.738421][ T26] audit: type=1400 audit(1553718702.341:680): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=18977 comm="syz-executor.1" 20:31:42 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)={0xe, 0x7, 0x6, 0xfffffffffffffffb, 0x52, "28b0cd6293dd96f53bbc75d7a8319885142999b868f0c4923e7e136f725a00479412221904fbde29eb13d9eb72e42d2027a96f2806ca8d207cf1e6be8ede491584b89d6f3a5a2e0996d9863f451f1d71c9cf"}, 0x5e) [ 3193.912354][T18989] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 3193.960231][ T26] audit: type=1400 audit(1553718702.561:681): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19088 comm="syz-executor.1" 20:31:42 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) [ 3193.998009][ T26] audit: type=1400 audit(1553718702.571:682): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19088 comm="syz-executor.1" 20:31:42 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3194.219417][ T26] audit: type=1400 audit(1553718702.821:683): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19113 comm="syz-executor.1" 20:31:42 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:42 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:42 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000027c0)='/dev/adsp#\x00', 0x20, 0x80) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000002800)={{0x2, @addr=0x3}, 0x8, 0x100, 0x8001}) r2 = request_key(&(0x7f0000002700)='asymmetric\x00', &(0x7f0000002740)={'syz', 0x3}, &(0x7f0000002780)='!\x00', 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000028c0), &(0x7f0000002900)=0x4) keyctl$get_keyring_id(0x0, r2, 0x5) readv(r0, &(0x7f0000002680)=[{&(0x7f0000000000)=""/242, 0xf2}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/234, 0xea}, {&(0x7f00000025c0)=""/189, 0xbd}, {&(0x7f0000000100)=""/108, 0x6c}], 0x6) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000002980)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002840)='/proc/self/net/pfkey\x00', 0x200, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x2c2) openat$dsp(0xffffffffffffff9c, &(0x7f0000002880)='/dev/dsp\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000002940)) [ 3194.417973][ T26] audit: type=1400 audit(1553718702.861:684): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19113 comm="syz-executor.1" [ 3194.472528][ T26] audit: type=1400 audit(1553718703.081:685): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=19125 comm="syz-executor.1" [ 3194.566745][ T26] audit: type=1400 audit(1553718703.121:686): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=19125 comm="syz-executor.1" [ 3194.640541][T19122] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:43 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:43 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000040)={"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"}) 20:31:43 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3194.826010][ T26] audit: type=1400 audit(1553718703.431:687): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19146 comm="syz-executor.1" 20:31:43 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x14) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0xa47c0, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000080)={0x3, 0x4, "5936f51200299c1df348dba4aa8ca5656dc60922ea230f179391d684ed29720f", 0x9, 0x9, 0x7, 0x6, 0x8}) 20:31:43 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:43 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:43 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:43 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) socketpair(0x5, 0x80f, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}}) [ 3195.214521][T19270] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400002, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x4, 0x2, 0x1, r1}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:44 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3195.476000][T19272] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:44 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:44 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb223380304ad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06774494f1ee9e1f19faede47e61425a8ad5379dfed204dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcda4b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f877f5839b0b3901c315f72c8733dc6b5b3ae9df5fed119e7f2638f4509652b8f3dc760c93dcc0f181821b08d09422e6e53cb3921653462b090d893fe2c47ba5b939b0bb260115c9106f9579c73ee050c18617cb18843c06668a489dff804deb152db43553f1d2664a16b61"], 0x46) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000200)) [ 3195.692361][T19299] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:44 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:44 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:44 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) 20:31:44 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:44 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x301000, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)="cb4407daaf516842a0f4d95580ac7245a1852fadd5b7dfae1b70130c429c"}, 0x10) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3196.153359][T19431] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:44 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:44 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r2, 0x1ff}, 0x8) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:45 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:45 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:45 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:45 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x18000, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000080)=""/212) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:45 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 3196.712923][T19556] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:45 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:45 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:45 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:45 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:45 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack\x04\x00\x00\x006\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe$\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xb2#8\x03\f\xada\x8d\xf3\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc0\x94\xb9\xffU=\xf7\x81\xab\x91!q[\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x14f) 20:31:45 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:45 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) [ 3197.248354][T19597] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 3197.370214][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 3197.370231][ T26] audit: type=1400 audit(1553718705.971:701): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19709 comm="syz-executor.1" 20:31:46 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:46 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000080)=""/228, 0xe4}, {&(0x7f0000000180)=""/245, 0xf5}], 0x3, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:46 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3197.601567][ T26] audit: type=1400 audit(1553718706.201:702): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19750 comm="syz-executor.1" 20:31:46 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3197.768280][T19842] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:46 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x7ff, {{0x2, 0x4e20, @rand_addr=0x1}}}, 0x88) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x78) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f000001010000000100000013ec11be"], 0x14) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x10001, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000300)={0x49, 0x29, 0x2, {0x1, [{{0x0, 0x4, 0x5}, 0x100000000, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x3}, 0x299, 0x3, 0x7, './file0'}]}}, 0x49) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') 20:31:46 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:46 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:46 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:46 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3198.086142][ T26] audit: type=1400 audit(1553718706.691:703): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19859 comm="syz-executor.1" 20:31:46 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xd6\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) [ 3198.148334][T19863] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:47 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2aea1fc030e9a230514289f300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f837f5839b0b3901c315f72c8733dc6b5b3"], 0x46) [ 3198.356087][ T26] audit: type=1400 audit(1553718706.961:704): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=19984 comm="syz-executor.1" 20:31:47 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:47 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14, 0x80800) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18008}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@deltclass={0x48, 0x29, 0x8, 0x70bd2b, 0x25dfdbfc, {0x0, r1, {0xffff, 0x6}, {0xf, 0xf}, {0x1, 0xffff}}, [@tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0xc, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x2}]}}, @TCA_RATE={0x8, 0x5, {0x72d, 0x10001}}, @TCA_RATE={0x8, 0x5, {0x7f, 0x4}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000890) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80800, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x5, &(0x7f00000008c0)=[{&(0x7f00000001c0)="78049026d72e571f6c4fbd8427474d73acb3d5d1db80099881da7616f38b6d1aaafa0cfead4fed3521893cf0f37788dff8efe2998688df650a46e9afa364f0aac714d4a6e07d063427ac57f9f0443e2ed3291e23249c91d615e1783d09eaef9697c55ec804287285c6d2c56c0ae47e3beb5cda4d928bd3b5050bc210eb5be2261cec607724ceca4bd7bcb3f962dcdd02b9a4648279a2d5d978f48bdf131ad0724840ac3b7f5e3c", 0xa7, 0x3}, {&(0x7f0000000280)="442b814fddb5f9e6bdb0b9326c13e89090639088dce713db7d96ba64a2aaa739b5835a9475abf14a5630be46f0cdac50861dbc67e17d714212636031ab04b7", 0x3f, 0x4}, {&(0x7f00000002c0)="ca07c6c9929bd92f01de440f63116753caaff21778f5d8d4d1868d0b810ee10fb993dd902e543347a95b26624c538f018b9c8efa83834252c2fadda40d6896bf9f4e3a59f4b735a8ded4c891de1cca4602c12fae4c46257b54fdbc16cfe9849641819027bf0c2cfc0d8783b0bbbd22a2f6221e3eb8d2a8d501a2e9333c4140b7f04471983c1c991f1d7518a286d2fe204f405f4f72aa4c946498ac81691194a633e28b2e88dc24f1bcedcf6113a63f83ada8332744921f6ae8", 0xb9, 0x2}, {&(0x7f0000000540)="a566686f42c2646edede95b3c5d0bf754d6fe60219e4ddf9337efe12a86af530108aa0da85df4808b6e933ee8d3e1f3847f95491c05b906cf397b8abdc1b80c154edc960dd38e49539d94c5e79236d9092c2058eb5eb338733fb02ce1fcdb07d7a633e8f526e0ad53d6f75490fc221a06748410bbb2606c376be2b89c934be445709d3d74c3fe3c5c378c31aa7993e52", 0x90, 0x3}, {&(0x7f00000007c0)="595c86ac2e674fd3b1bf188a322d369950dd0ba4351b60105cc598a1fc767c9154445bfb3064918ffd23ffbaa0192fe89b606fbd942e483fee07dd7a9222780c8d96a6551091696b84a82ea669955b59eff9554373963eb875233917b2dbe0d61436fa1ca28a31c963203f7f4808bdd02954d73d87b943ae0fb918eb2f42072f6f535d1a8010a01d51012125ec0edbf5c95416a51afe09e11affdad5779739d9abe594eced92f2c098da1dd2cc864b3aa386c30a01ec8856001f90d3e0b941bcdbd47d04cead57d966765072bfc122ff1b17c35f9257fcb5c458f8faf8f3f419b10ef2f2d0dd846e", 0xe8, 0x7}], 0x0, &(0x7f0000000940)={[{@cruft='cruft'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}, {@overriderock='overriderockperm'}, {@map_normal='map=normal'}, {@map_normal='map=normal'}, {@hide='hide'}], [{@fsname={'fsname', 0x3d, '}ppp0GPL'}}]}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x2f, 0x4, 0x0, {0x8, 0xffff, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:47 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="62b71dde4f76c4df860a129dedfd90d9676a7e23937c0c7ae40cb5a402dd1be1bcec98a2383f5b7555ff6c3cc3355970ee86548243c08a7893fb20db54b8747f45671dfe7ebcd1b498ea5640623199fd327c7ade805e4ca22c11daa9d86e431a7996cfc245f2d1be6be0289fc449ad3602128f791092ac1267a17a762c89bda6ba8a482de62f9c8ff0b90a82f15f746f9d4780dd3182a914c04d0fe3c8c6c64ac832e4a99e25eefb7f", 0xa9, 0xfffffffffffffff7}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6f7573725f7861742663903c74722c757365725f78617474722c75", @ANYRESDEC=r0, @ANYBLOB="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"]) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:47 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3198.569267][ T26] audit: type=1400 audit(1553718707.171:705): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=19993 comm="syz-executor.1" [ 3198.715220][T20004] erofs: read_super, device -> /dev/loop1 [ 3198.720993][T20004] erofs: options -> nousr_xat&cr1}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r3, 0x300, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x5, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14, 0x80800) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18008}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@deltclass={0x48, 0x29, 0x8, 0x70bd2b, 0x25dfdbfc, {0x0, r1, {0xffff, 0x6}, {0xf, 0xf}, {0x1, 0xffff}}, [@tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0xc, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x2}]}}, @TCA_RATE={0x8, 0x5, {0x72d, 0x10001}}, @TCA_RATE={0x8, 0x5, {0x7f, 0x4}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000890) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80800, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x5, &(0x7f00000008c0)=[{&(0x7f00000001c0)="78049026d72e571f6c4fbd8427474d73acb3d5d1db80099881da7616f38b6d1aaafa0cfead4fed3521893cf0f37788dff8efe2998688df650a46e9afa364f0aac714d4a6e07d063427ac57f9f0443e2ed3291e23249c91d615e1783d09eaef9697c55ec804287285c6d2c56c0ae47e3beb5cda4d928bd3b5050bc210eb5be2261cec607724ceca4bd7bcb3f962dcdd02b9a4648279a2d5d978f48bdf131ad0724840ac3b7f5e3c", 0xa7, 0x3}, {&(0x7f0000000280)="442b814fddb5f9e6bdb0b9326c13e89090639088dce713db7d96ba64a2aaa739b5835a9475abf14a5630be46f0cdac50861dbc67e17d714212636031ab04b7", 0x3f, 0x4}, {&(0x7f00000002c0)="ca07c6c9929bd92f01de440f63116753caaff21778f5d8d4d1868d0b810ee10fb993dd902e543347a95b26624c538f018b9c8efa83834252c2fadda40d6896bf9f4e3a59f4b735a8ded4c891de1cca4602c12fae4c46257b54fdbc16cfe9849641819027bf0c2cfc0d8783b0bbbd22a2f6221e3eb8d2a8d501a2e9333c4140b7f04471983c1c991f1d7518a286d2fe204f405f4f72aa4c946498ac81691194a633e28b2e88dc24f1bcedcf6113a63f83ada8332744921f6ae8", 0xb9, 0x2}, {&(0x7f0000000540)="a566686f42c2646edede95b3c5d0bf754d6fe60219e4ddf9337efe12a86af530108aa0da85df4808b6e933ee8d3e1f3847f95491c05b906cf397b8abdc1b80c154edc960dd38e49539d94c5e79236d9092c2058eb5eb338733fb02ce1fcdb07d7a633e8f526e0ad53d6f75490fc221a06748410bbb2606c376be2b89c934be445709d3d74c3fe3c5c378c31aa7993e52", 0x90, 0x3}, {&(0x7f00000007c0)="595c86ac2e674fd3b1bf188a322d369950dd0ba4351b60105cc598a1fc767c9154445bfb3064918ffd23ffbaa0192fe89b606fbd942e483fee07dd7a9222780c8d96a6551091696b84a82ea669955b59eff9554373963eb875233917b2dbe0d61436fa1ca28a31c963203f7f4808bdd02954d73d87b943ae0fb918eb2f42072f6f535d1a8010a01d51012125ec0edbf5c95416a51afe09e11affdad5779739d9abe594eced92f2c098da1dd2cc864b3aa386c30a01ec8856001f90d3e0b941bcdbd47d04cead57d966765072bfc122ff1b17c35f9257fcb5c458f8faf8f3f419b10ef2f2d0dd846e", 0xe8, 0x7}], 0x0, &(0x7f0000000940)={[{@cruft='cruft'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}, {@overriderock='overriderockperm'}, {@map_normal='map=normal'}, {@map_normal='map=normal'}, {@hide='hide'}], [{@fsname={'fsname', 0x3d, '}ppp0GPL'}}]}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x2f, 0x4, 0x0, {0x8, 0xffff, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:47 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:47 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:47 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:48 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3199.363837][T20201] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:48 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3199.497726][ T26] audit: type=1400 audit(1553718708.101:707): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20252 comm="syz-executor.1" 20:31:48 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = semget$private(0x0, 0x3, 0x21) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x93e, 0xffffffff, 0x700000000, 0x101, 0xffffffff, 0xfff, 0x1, 0x9, 0x7]) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) pwritev(r2, &(0x7f0000000540)=[{&(0x7f00000000c0)="d6a1797947a07fcaa4c04d4733c3b50e19f825fb6e673253725e7d138caead4a1eb977c698ee7c4b6ea70862b00cb2cdb7523762ac9f266e14aa8f4c4a2bd0ae73681c56968bb6f161ac1e49faef96816c17979ea91302429394e318710be6b13dc848f04597b3677b", 0x69}, {&(0x7f0000000140)="dda2140e5130e34a5cf2b626c314844407884627b5023480d6165c3544dd35dedb1710b8168a8d8e07572634ae7446f1e99c0ee8e4989ef36dcb8b9dab95ce0530094d5495683ffefe6b52164b921cc4fb61fc9ed26d5db94dec24fdf0913ef97966de673d4ad49bbdf50269ba4f9782fe7c9958b11be0ed0233f4b8dc9b9a9297783a26", 0x84}, {&(0x7f0000000200)="c8ed126ff32d8e71849540c8ba038614", 0x10}, {&(0x7f0000000440)="b3bc0795df538cf57b658ddc7633e8a0c353c61c2448b0fe8befa96a5c9aa5f2fc26553563108f18d747294e15b3be40e2b307ad8399dff0fd43d154789bf2e80fded1f75e1095e3d6dfc4bc75bf66062372cc5c17421500a8c6c12831085781617a4726824caa3e3b9e6aa39da750d7e113a9ad2e479c317d873a781ada635332068a56b29a1be58adcacc9efcd75afaed22d19de1c621eadede8ac0b2423632311b410c773882515f7abcbcc98bad7b581e5c6f54c86c14e0353d4108db2471285dea20101d2e3bb8a7e53d737524ed791444818d3c671f1f061d031506d3830f76a441b35132b8f7d5eb9316b166e468c53", 0xf3}], 0x4, 0x0) write$apparmor_exec(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x46) 20:31:48 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3199.824515][ T26] audit: type=1400 audit(1553718708.421:708): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20272 comm="syz-executor.1" [ 3199.885035][T20275] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:48 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:48 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3200.110817][ T26] audit: type=1400 audit(1553718708.711:709): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20286 comm="syz-executor.1" 20:31:48 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14, 0x80800) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18008}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@deltclass={0x48, 0x29, 0x8, 0x70bd2b, 0x25dfdbfc, {0x0, r1, {0xffff, 0x6}, {0xf, 0xf}, {0x1, 0xffff}}, [@tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0xc, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x2}]}}, @TCA_RATE={0x8, 0x5, {0x72d, 0x10001}}, @TCA_RATE={0x8, 0x5, {0x7f, 0x4}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000890) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80800, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x5, &(0x7f00000008c0)=[{&(0x7f00000001c0)="78049026d72e571f6c4fbd8427474d73acb3d5d1db80099881da7616f38b6d1aaafa0cfead4fed3521893cf0f37788dff8efe2998688df650a46e9afa364f0aac714d4a6e07d063427ac57f9f0443e2ed3291e23249c91d615e1783d09eaef9697c55ec804287285c6d2c56c0ae47e3beb5cda4d928bd3b5050bc210eb5be2261cec607724ceca4bd7bcb3f962dcdd02b9a4648279a2d5d978f48bdf131ad0724840ac3b7f5e3c", 0xa7, 0x3}, {&(0x7f0000000280)="442b814fddb5f9e6bdb0b9326c13e89090639088dce713db7d96ba64a2aaa739b5835a9475abf14a5630be46f0cdac50861dbc67e17d714212636031ab04b7", 0x3f, 0x4}, {&(0x7f00000002c0)="ca07c6c9929bd92f01de440f63116753caaff21778f5d8d4d1868d0b810ee10fb993dd902e543347a95b26624c538f018b9c8efa83834252c2fadda40d6896bf9f4e3a59f4b735a8ded4c891de1cca4602c12fae4c46257b54fdbc16cfe9849641819027bf0c2cfc0d8783b0bbbd22a2f6221e3eb8d2a8d501a2e9333c4140b7f04471983c1c991f1d7518a286d2fe204f405f4f72aa4c946498ac81691194a633e28b2e88dc24f1bcedcf6113a63f83ada8332744921f6ae8", 0xb9, 0x2}, {&(0x7f0000000540)="a566686f42c2646edede95b3c5d0bf754d6fe60219e4ddf9337efe12a86af530108aa0da85df4808b6e933ee8d3e1f3847f95491c05b906cf397b8abdc1b80c154edc960dd38e49539d94c5e79236d9092c2058eb5eb338733fb02ce1fcdb07d7a633e8f526e0ad53d6f75490fc221a06748410bbb2606c376be2b89c934be445709d3d74c3fe3c5c378c31aa7993e52", 0x90, 0x3}, {&(0x7f00000007c0)="595c86ac2e674fd3b1bf188a322d369950dd0ba4351b60105cc598a1fc767c9154445bfb3064918ffd23ffbaa0192fe89b606fbd942e483fee07dd7a9222780c8d96a6551091696b84a82ea669955b59eff9554373963eb875233917b2dbe0d61436fa1ca28a31c963203f7f4808bdd02954d73d87b943ae0fb918eb2f42072f6f535d1a8010a01d51012125ec0edbf5c95416a51afe09e11affdad5779739d9abe594eced92f2c098da1dd2cc864b3aa386c30a01ec8856001f90d3e0b941bcdbd47d04cead57d966765072bfc122ff1b17c35f9257fcb5c458f8faf8f3f419b10ef2f2d0dd846e", 0xe8, 0x7}], 0x0, &(0x7f0000000940)={[{@cruft='cruft'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}, {@overriderock='overriderockperm'}, {@map_normal='map=normal'}, {@map_normal='map=normal'}, {@hide='hide'}], [{@fsname={'fsname', 0x3d, '}ppp0GPL'}}]}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x2f, 0x4, 0x0, {0x8, 0xffff, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3200.280421][ T26] audit: type=1400 audit(1553718708.841:710): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20295 comm="syz-executor.1" [ 3200.351613][T20285] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:49 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@remote, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f000001010000010000000000000000"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:49 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:49 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:49 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000700)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '/proc/thread-M?\x01\x80\x00\x00\x00\x00\x00\x00f\xee\x9b\xd0\x9f36\x1fl\x80in\xd6/am>ttr/exec\x00\x89\x18\np\x8c\xb2\xd4\xaeM\xaf\x83\x1cnz\'\xf4\xeb\xd6*\a{\xef^.\xa8\x93m\xdek\xb05\x05\xd2\"\x14t\x16\xfd\xad\x9f6\xa2\v\xf1!!j\x00\x00\xae\xe2B\xd2\xf0\x952\xc32\xc0\xcadB\x91\xb66\xc4\xbf2\xe3wSY\x04/\xa7k\x19W\xc9\xde\xd6\xb4\xce\xdd\xf3Y\x8b0\xf9\xd9\x89\xf7r\x1e]#8\x97\xe4WbSH\x90\xba\xb9,\x1a\x82\xca\x93l\xb0)\b<\xd5\xc9(\xd2\xa0\xb1\xa7n\x95\'vy\x80+\xfd=K\xef\xd0P\x92\xd1\x89S\f\xcd\xaf\x89i\x93=\x0f*8\xe0\x9c\xcbY\xba\xba\x88\x85\x8d|\x9eml\x96\x8dx\xda\xb4\xbfaB7\x88\xa25\x98\x9f\xec\xdc(\xe4\xd3w\xb9\x0eA\xf7]\x9c\f\xe9\x10\x81\xe7\xde\x80\xdd\xe7\x04l#\n\x18N\x11\x83\xc0\xb2o\xf9-K\xfd\x02\xef\x14\xf5\xb79|\x80I^\xfc\x81\xb16L\x96\x8a\x13\x99\xc4\x13\xb4\x86\x13\x81\x9d\xcb\xa4!\xef3#\xbe*\xe8\x1a\xbf?\xe2\x95gv\xec$\xf1\xb8\x17m\xf1C\x1e\xb16,z\a\xe8 P\x19\x8b\b|\xb3'}, 0xfffffffffffffcb9) mount(&(0x7f0000000180)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x1000800, 0x0) 20:31:49 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:49 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x46) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) flock(r1, 0x8) [ 3200.608659][T20384] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:49 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1d6, [@multicast1]}, 0x188) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'lo\x00', 0xf8}) [ 3200.759183][T20419] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:49 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:49 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x3, 0x1f, 0x8006, 0x4, 0x2, 0xdec0, 0x1ff, 0x7fffffff, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x10000}, 0x8) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:49 executing program 2: set_thread_area(&(0x7f0000000040)={0x3, 0xffffffffffffffff, 0x0, 0x100000000, 0x7, 0x3ff00000, 0x2, 0x1ca4, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000180)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x14) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x8800) r3 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r3, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240), 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='io.max\x00', 0x2, 0x0) 20:31:49 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:49 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:49 executing program 1: socket$inet(0x2, 0x800, 0x3ff) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'exec ', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0xe8) [ 3201.157605][T20445] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:49 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:49 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:50 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000080)="7e70875c744bdfc5e6277108d557a80577bc6cf047ee9be5f589771e54eacec15e5ed813ce7a51bfe176ab7e17e26fa46893ca83e2ea369336eb579622f369ae9bc8490add2a33e29b2346b0e1fa633ada30cd6af9c9971a7a12b165a57243123bdf2e771c4aef135e020d13be09f46d862f00e9672f6d1e563541f585ef30d8f809209dab922d0dd7d02d184e6221607f4e11baffc903fe323a8cd2e850110fa7fa680b3b1ef2f702c1ffff689a2f317fc741eac6a46e10b4c5076fd1fe7c56f694670eb1f954948c78e8e0cb95fa875b45583ed9f84f00c0e64565c533868206ee020c0c0f23", 0xe7) [ 3201.410575][T20465] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 3201.439656][T20551] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 20:31:50 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:50 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:50 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@local, @empty}, &(0x7f00000000c0)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000740)={@multicast2, @loopback, r1}, 0xc) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000280)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x80, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) 20:31:50 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3201.858367][T20594] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3201.892219][T20594] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 20:31:50 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3202.016328][T20606] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:50 executing program 2: set_thread_area(&(0x7f0000000040)={0x3, 0xffffffffffffffff, 0x0, 0x100000000, 0x7, 0x3ff00000, 0x2, 0x1ca4, 0x6, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000180)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x14) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x8800) r3 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r3, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240), 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='io.max\x00', 0x2, 0x0) 20:31:50 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:50 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0xfffffffffffffffe, 0x0) 20:31:50 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:51 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) [ 3202.429389][T20633] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3202.437249][T20633] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 [ 3202.444978][ T26] kauditd_printk_skb: 9 callbacks suppressed [ 3202.444996][ T26] audit: type=1400 audit(1553718711.051:720): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20636 comm="syz-executor.2" [ 3202.568503][T20621] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing [ 3202.613928][T20621] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop4 [ 3202.632583][ T26] audit: type=1400 audit(1553718711.241:721): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3DE28B7722E30CDB22338030CAD618DF337F9967F pid=20643 comm="syz-executor.1" 20:31:51 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:51 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "d32f3d22940d1cc98718ebc894ff248a0f1f54406b13da2c700f9a"}, 0x1f) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:51 executing program 2: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:51 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0x400}) socket$bt_bnep(0x1f, 0x3, 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) [ 3202.812193][ T26] audit: type=1400 audit(1553718711.421:722): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20753 comm="syz-executor.1" 20:31:51 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) [ 3202.913749][T20757] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:51 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3202.968672][T20757] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 [ 3203.086496][ T26] audit: type=1400 audit(1553718711.691:723): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=20768 comm="syz-executor.1" [ 3203.115499][T20766] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 20:31:51 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:51 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3203.151615][T20766] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop2 20:31:51 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x4000000000000400}) [ 3203.260831][T20778] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 3203.367608][ T26] audit: type=1400 audit(1553718711.971:724): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=20902 comm="syz-executor.1" 20:31:52 executing program 2: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3203.455335][T20864] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:52 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3203.501369][T20864] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 20:31:52 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3203.602054][ T26] audit: type=1400 audit(1553718712.201:725): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=20902 comm="syz-executor.1" 20:31:52 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x400, 0x89e, 0x3, 0xfffffdfffffffffc, 0x204}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x1ffe, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000240)={0x0, 0x0, @ioapic}) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) ioctl$sock_bt_hci(r1, 0x400448df, &(0x7f00000000c0)="e379dceb226d023bc36188ad904f1d4dff39371a11cbf1446371998ad02e4bafe62ca6d1b182b9e1767c5924eda22fc8f87a07c2129af731a504267f270de9c5a4") 20:31:52 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e0000001000000"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x202, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) [ 3203.718993][T20917] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 20:31:52 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3203.760976][T20917] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop2 20:31:52 executing program 1: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3203.952096][T21041] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3203.970263][T21041] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 20:31:52 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3204.049377][T20967] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing [ 3204.068611][T20967] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop4 20:31:52 executing program 2: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:52 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:52 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:52 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:52 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200040, 0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)={0x0, 0x29, 0x2, 0x0, 0x0, [{r1, 0x0, 0x8}, {r1, 0x0, 0x9}]}) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x12, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004040) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000240)={0x0, @rand_addr=0x6, 0x4e22, 0x2, 'ovf\x00', 0x11, 0xffffffff00000001, 0x78}, 0x2c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0xfeba}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x3f}}, 0x0, 0xb8f, 0x7, 0x9d, 0xcf2}, &(0x7f0000000480)=0x98) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000005c0)={0x8, 0x3ff, 0x4, 0x401, 0x3495, 0x7ff}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={r4, 0x100000000, 0x1, 0xfff, 0x88ab, 0x3, 0x6, 0x20, {r5, @in={{0x2, 0x4e21, @loopback}}, 0x66, 0x8, 0x2, 0x3, 0x2}}, &(0x7f0000000580)=0xb0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'vcan0\x00'}) flock(r1, 0x8) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x450, 0x0, 0x270, 0xf8, 0x0, 0x0, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x4, 0x3, [0x3, 0x35, 0x32, 0x5, 0x12, 0x36, 0x18, 0x1d, 0x2e, 0xc, 0x27, 0x3b, 0x3f, 0x7, 0x2d, 0x3f], 0x0, 0x16, 0x3}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, 0xffffffff, 0xffffffff, 'erspan0\x00', 'batadv0\x00', {0xff}, {}, 0x0, 0x3, 0x5}, 0x0, 0x118, 0x178, 0x0, {}, [@common=@inet=@hashlimit1={0x58, 'hashlimit\x00', 0x1, {'bcsf0\x00', {0x0, 0x40, 0xba, 0x2, 0x54, 0x4, 0x2, 0x8, 0x20}, 0x5}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0x3, 0x0, 0x2, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={[], 0x14}, 0xfffffffffffffffe, 0x2, [0x0, 0x3, 0x2f, 0x32, 0x3c, 0x3b, 0x38, 0x30, 0x1a, 0x2b, 0xd, 0x1f, 0x0, 0x1e, 0x22, 0x3c], 0x2, 0x100, 0xfffffffffffffe67}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x15}, @broadcast, 0xffffffff, 0xff, 'erspan0\x00', 'veth1_to_hsr\x00', {0xff}, {0xff}, 0x62, 0x2, 0x1}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x0, 0x8, 0x2, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={[], 0x13}, 0x80, 0x0, [0xd, 0xf, 0x1b, 0x14, 0x38, 0x7, 0x31, 0x30, 0x2b, 0x3c, 0x1d, 0x2e, 0x2f, 0x26, 0xf, 0x33], 0x0, 0x1, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b0) [ 3204.342757][ T26] audit: type=1400 audit(1553718712.951:726): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21093 comm="syz-executor.1" [ 3204.386167][T21067] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:53 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/exec\x00', 0x2, 0x0) [ 3204.387443][T21066] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 3204.419102][T21180] IPVS: set_ctl: invalid protocol: 0 0.0.0.6:20002 [ 3204.432818][T21113] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:53 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3204.496173][T21066] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop2 [ 3204.514085][T21113] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 [ 3204.583691][ T26] audit: type=1400 audit(1553718713.191:727): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21185 comm="syz-executor.1" 20:31:53 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x3, 0x4) 20:31:53 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xe7U\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN4l\xdb\x05\xe6\xc4j\x9e<\xe8\xd1\xbb\x83\xd5\x94\xcc\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f#\xf0\rlI\xd6\x9c/\xebW\x14O\x83\x7fX9\xcb\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x15d) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4800) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x258, 0x7, 0x7, 0x10, 0x70bd2b, 0x25dfdbfc, {0x5, 0x0, 0x1}, [@nested={0x190, 0x5c, [@generic="e75920f5df0ac8b659c36a5887c9eed5446c01052ce70b6acba1612f3eda2b548aaf6be8192d91f39bde69f80e2b702986b1007f8b8b9664f3ba0a59b8db64d47873786c2721388927fe6d8b4e781e31d076a4ffba76b0948db06a546630a42f64a97500bf5d492373402e48f4f6d21258d1da6178790f037e35273b8d09a7ef7c0db699e85a95374d3569511823f3957957fe79c52440f8312696d43d37b60834b324da36293f0204249f8042117765a42f6d6e99cdc5d648c00263a725a71e9bd2ed2f15b116517e278543b39221b3aefa77fbe9a9e571290494dc2c121a959492d236434aad9496c37081bd63552295a9e6670f5b438c76", @generic="53427d908fb756848c3adafc3a99e2d1df12ba50033a4753da248c7013e54d4d6df4a5cabd49e753b3333088600fcbb65764f1300614649af7c58827acf830ea69dbd7137a36891f0f39f7e90953789b7405463a38374f9fbaf45da2e9da6efc06031e189827f0f06a59fff651b404038be0407d9e7a796e6c83dbb3473f291e0641c268f3087aef0c7cb2512c2fc48b"]}, @generic="9aab72e3c5ca3779ecbdaff68e808bcef21c001fada300", @generic="ce8d0a9ad661b070400e65468bf6db6e6f86ab02ff06f2f91cfe57b0bcec2477b25230297f3ced8c2fb650f1a7cdb77214654175fa9193adca8febc9c26fe3f608ebac02b235cb9575ac622969f9a8def3834485c623384623a37f1f9490af677be3d8faf17ef2e8caaaa5f19b85520fc3d929c4763a5fd05c1a950ac1eacc99181f7f062e8e6dcf9a7746b9f714cd72920b15", @typed={0x8, 0x31, @uid=r3}]}, 0x258}, 0x1, 0x0, 0x0, 0x804}, 0x4000040) [ 3204.788883][T21189] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing [ 3204.840450][ T26] audit: type=1400 audit(1553718713.231:728): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21185 comm="syz-executor.1" [ 3204.860940][T21189] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop4 20:31:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db8ab24e300d5944dfad346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06774494f1ee8ad5379dfed604dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f837f5839b0b3901c315f72c8733dc6b5b3"], 0x46) [ 3204.909769][ T26] audit: type=1400 audit(1553718713.451:729): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21205 comm="syz-executor.1" 20:31:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) [ 3205.120821][T21211] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 20:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:53 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3205.182120][T21211] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 20:31:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:53 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3205.322887][T21273] IPVS: set_ctl: invalid protocol: 0 0.0.0.6:20002 20:31:54 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @dev}, &(0x7f00000000c0)=0xc) 20:31:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:31:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = dup3(r0, r0, 0x80000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000040)={0x7ff, 0xa, 0x0, [{0x65, 0xfff, 0x9215, 0x6, 0x3f, 0x3}, {0x2f, 0x1, 0x3, 0x7, 0x9, 0x200, 0x9}, {0xfff, 0x20, 0x6, 0xfffffffffffff5d1, 0x80000001, 0x3, 0x5}, {0x5, 0xd17d, 0x6, 0x1, 0x9, 0x8, 0x81}, {0x1, 0x5, 0x80d, 0x363a, 0x2, 0xa0ff, 0x9}, {0xb5c, 0x3f, 0x5, 0x8000, 0x5, 0x4c, 0x8000800}, {0x66f, 0x8, 0x7, 0x7ed6, 0x9, 0xb99, 0x6}, {0xfffffffffffffff9, 0x5, 0x4, 0x1, 0x1, 0x20, 0x5}, {0x80000001, 0x9, 0x2, 0x8, 0x3, 0x4, 0x1}, {0xfffffffffffff800, 0x9, 0x6, 0xffffffffffff3974, 0xdc19, 0x80, 0x69}]}) socket$nl_crypto(0x10, 0x3, 0x15) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:54 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3205.499269][T21349] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3205.523293][T21349] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 20:31:54 executing program 5: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:31:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = accept4$tipc(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='nr0\x00') write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) connect$caif(r2, &(0x7f0000000140)=@dgm={0x25, 0x7fffffff, 0xa5}, 0x18) 20:31:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = dup3(r0, r0, 0x80000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000040)={0x7ff, 0xa, 0x0, [{0x65, 0xfff, 0x9215, 0x6, 0x3f, 0x3}, {0x2f, 0x1, 0x3, 0x7, 0x9, 0x200, 0x9}, {0xfff, 0x20, 0x6, 0xfffffffffffff5d1, 0x80000001, 0x3, 0x5}, {0x5, 0xd17d, 0x6, 0x1, 0x9, 0x8, 0x81}, {0x1, 0x5, 0x80d, 0x363a, 0x2, 0xa0ff, 0x9}, {0xb5c, 0x3f, 0x5, 0x8000, 0x5, 0x4c, 0x8000800}, {0x66f, 0x8, 0x7, 0x7ed6, 0x9, 0xb99, 0x6}, {0xfffffffffffffff9, 0x5, 0x4, 0x1, 0x1, 0x20, 0x5}, {0x80000001, 0x9, 0x2, 0x8, 0x3, 0x4, 0x1}, {0xfffffffffffff800, 0x9, 0x6, 0xffffffffffff3974, 0xdc19, 0x80, 0x69}]}) socket$nl_crypto(0x10, 0x3, 0x15) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) read(r0, &(0x7f0000000040)=""/16, 0x10) [ 3205.807945][T21369] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f0000000080)) [ 3205.912205][T21384] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 3205.919325][T21384] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 20:31:54 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:54 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e02000027f0000010100000001000020bf1c1fbb"], 0x14) r1 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0xc9fd, 0xa00) bind$bt_rfcomm(r1, &(0x7f0000000400)={0x1f, {0x1ff, 0x58b9, 0x3c6d, 0x91, 0x9, 0x100}, 0x3ff}, 0xa) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x183, 0x4e20, 0x0, 0xa, 0x20, 0xa0, 0x6c, r3, r4}, {0x85a4, 0x2, 0x1ff, 0x2, 0x2, 0x9, 0x7fffffff, 0x1}, {0x9, 0x7, 0x7, 0x3f0}, 0x6530, 0x6e6bb7, 0x1, 0x0, 0x1, 0x2}, {{@in=@broadcast, 0x4d6, 0x3b}, 0xa, @in6=@rand_addr="d731c59c761075cfdad4434c050cbf3d", 0x0, 0x3, 0x1, 0x0, 0x100000001, 0x81, 0x700a}}, 0xe8) 20:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x7, 0x6}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0x24, "319eb0a874fdedfd4e66bb2d6411a32420b4c536332f03234fcab6db9b29c65f7fbeecaf"}, &(0x7f0000000140)=0x2c) [ 3206.308243][T21493] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:31:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x7, 0x6}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0x24, "319eb0a874fdedfd4e66bb2d6411a32420b4c536332f03234fcab6db9b29c65f7fbeecaf"}, &(0x7f0000000140)=0x2c) 20:31:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/16, 0x10) 20:31:55 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/16, 0x10) 20:31:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xfff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0xde2, 0x8de, 0x2, 0x200, 0x413d}, 0x14) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x101) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000080)="47b90f0a765c9b399c2cc3d3f74b3b2ce777241dc3be7415ffa917ad81e174400bb0fed849aec334e2f92c503e55d4ca38fa72cd125859f062540e8a7be73af43a1c21fc6778ca93d57a22f42cc82fc3c90a3e26a214868bd953193b74379c67e96985a0721ec4dc1a8288f4f8f7666dc835", &(0x7f00000007c0)="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", 0x2}, 0x20) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) write$apparmor_exec(r3, &(0x7f0000000140)={'stack ', '\x00'}, 0x7) 20:31:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f0000000080)) 20:31:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/16, 0x10) 20:31:55 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x100) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x90002, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000100)={0x0, 0xd47}, 0x2) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000240)={0x6, 0x6, 0x0, [{0x4, 0x7, 0x1f, 0x81, 0x79, 0x9, 0x8001}, {0x3ff, 0x5, 0x10001, 0x8000, 0xfffffffffffffff8, 0xa74, 0x2e13}, {0x5, 0x8000, 0x8, 0x6, 0x3, 0x7, 0x3ff}, {0x0, 0x1, 0x8b2, 0x80000000, 0x800, 0x8, 0x80000000}, {0x7, 0x1000, 0x1, 0x7082, 0x36b, 0x9, 0x5}, {0x5, 0x3d99aba1, 0x7, 0x1, 0x9, 0x1, 0x196b}]}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e00000027f0000010100000001000000ff3354e0000001"], 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000001c0)={0x80000001, 0x9, 0xff}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) write(r0, &(0x7f0000000040)="6f0a6641bbb508c6b7a3bdf486f827c9a1b02d", 0x13) 20:31:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20002, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0x1, 0x3, 0x4, 0x0, 0x1000}, 0x7ff, 0x4}) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:56 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3207.477717][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 3207.477735][ T26] audit: type=1400 audit(1553718716.081:747): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21564 comm="syz-executor.2" 20:31:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) 20:31:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x46) 20:31:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) read(r0, &(0x7f0000000040)=""/16, 0x10) [ 3207.656737][ T26] audit: type=1400 audit(1553718716.121:748): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21561 comm="syz-executor.5" [ 3207.703723][T21565] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 3207.747526][ T26] audit: type=1400 audit(1553718716.341:749): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21582 comm="syz-executor.2" 20:31:56 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) 20:31:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/sequencer\x00', 0x840, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000040)=ANY=[@ANYBLOB="deffffff1500040026bd7000fcdbdf2511000000d490c6eff1310cbb097f66a548be8c918ea46fad41b3fb382e69ca7dabae195847990e1bcb6f29c1cb8a53fecdf19aaaad2261c1b536b22f0452ba74e6cb79dd8b12eb3a7ec1327e06858b2e3b1fa8dfa4a727ebf5b325225229cce0dd3fec69922e5a695f328f123664496638ebf960582a6b860a554a44da8f534c879e305e32ede9c07f13d3d070861f0070646b442c5ff6875c819bd5f9266f41f08f8708000900ac14142600089abec9e6c1dbea3ce95e34c25f56a2ddefc764b9d0a883bd49"], 0xbc}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) 20:31:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x81}, &(0x7f0000000100)=0x8) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:56 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3207.939111][ T26] audit: type=1400 audit(1553718716.341:750): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21581 comm="syz-executor.5" [ 3208.039928][ T26] audit: type=1400 audit(1553718716.571:751): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=21597 comm="syz-executor.5" 20:31:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000e00000010000000000000600000000009664eb9a3165e0b94bcc6ca7d3505f3d909cfed2437122fb8ff2b34786b8c6ebed3584e3c610c6138b2c3dd29949d359e9fcfb0b9f3e0c7e939ba5ceea2845c92830c11154e0b9a1c1c50eb902fc39047be0a538078ae2d3e829d89b39c14c90862c1e6caf623fbdbbcd8f"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={r3, 0x9, 0x6, [0x9, 0x1, 0x100, 0x5, 0xcdd, 0x3]}, 0x14) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x7f3f, 0x7672775b, 0x2, @discrete={0x1, 0x6}}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000300)=0x10000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0x5, 0x0, [], {0x0, @reserved}}) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000200)=0x78) 20:31:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/sequencer\x00', 0x840, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000040)=ANY=[@ANYBLOB="deffffff1500040026bd7000fcdbdf2511000000d490c6eff1310cbb097f66a548be8c918ea46fad41b3fb382e69ca7dabae195847990e1bcb6f29c1cb8a53fecdf19aaaad2261c1b536b22f0452ba74e6cb79dd8b12eb3a7ec1327e06858b2e3b1fa8dfa4a727ebf5b325225229cce0dd3fec69922e5a695f328f123664496638ebf960582a6b860a554a44da8f534c879e305e32ede9c07f13d3d070861f0070646b442c5ff6875c819bd5f9266f41f08f8708000900ac14142600089abec9e6c1dbea3ce95e34c25f56a2ddefc764b9d0a883bd49"], 0xbc}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) 20:31:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x81}, &(0x7f0000000100)=0x8) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:57 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3208.490909][ T26] audit: type=1400 audit(1553718717.091:752): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC9924E9F95D981F1FD783C7D0C8F58E5DAE2AACD55F6E784EF9247A8C194B9FF553DF781AB9121715B3D3A pid=21722 comm="syz-executor.5" 20:31:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) read(r0, &(0x7f0000000040)=""/16, 0x10) 20:31:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000080)=""/242, 0x2000, 0x800, 0x2}, 0x18) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x81}, &(0x7f0000000100)=0x8) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3208.635880][ T26] audit: type=1400 audit(1553718717.221:753): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21721 comm="syz-executor.2" 20:31:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={r3, 0x9, 0x6, [0x9, 0x1, 0x100, 0x5, 0xcdd, 0x3]}, 0x14) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x7f3f, 0x7672775b, 0x2, @discrete={0x1, 0x6}}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000300)=0x10000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0x5, 0x0, [], {0x0, @reserved}}) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000200)=0x78) 20:31:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) 20:31:57 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3208.870186][ T26] audit: type=1400 audit(1553718717.241:754): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21725 comm="syz-executor.1" [ 3209.051575][ T26] audit: type=1400 audit(1553718717.351:755): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21739 comm="syz-executor.5" [ 3209.090900][ T26] audit: type=1400 audit(1553718717.471:756): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=21746 comm="syz-executor.2" 20:31:58 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f000001010004000000000001"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) getsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000100), &(0x7f0000000180)=0x4) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000380)={@dev, 0x0}, &(0x7f00000003c0)=0x14) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f00000000c0)) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000400)={@empty, @loopback, r3}, 0xc) ioctl$RTC_AIE_OFF(r2, 0x7002) 20:31:58 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/16, 0x10) 20:31:58 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec7362"], 0x1) 20:31:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:58 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:58 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec7362"], 0x1) 20:31:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x2, 0x6, 0x7fff, 0x0}, &(0x7f00000000c0)=0x10) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000100)=0x80000000) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x2, 0x5}, 0xc) openat$udambuf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/udmabuf\x00', 0x2) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x200, 0x101) 20:31:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x288000, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000340)=0x100000000) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000400)) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000300)={0x80000000}) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000380)={0x10001, 0x3, 0xc000000000000000, 0x0, 0xc8}) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f00000003c0)=0x5000) 20:31:58 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/16, 0x10) 20:31:58 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, 0x0, 0x0) 20:31:58 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:58 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, 0x0, 0x0) 20:31:58 executing program 0: r0 = socket$inet(0x2, 0x5, 0xdb) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@loopback, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00', 0x14fd}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fbc4040063236f247e02ba2eb98e2516dc88aba9b0e5f826f7723f6a807df552036639a2f9cd5134b83725d788dbf9fc1fce108404b96ccd3ab29040d062f4bf784cebd182b3e03362e869fb9dc8e566f259ec5b559251ae64a7580cf12fd25a0ab92a6f743e24da6735b0a7795eea4e956204efe201c1d0c4e2d073ae2da2dcafb44bb270a49d6a0c17ff18188751af87eba2df3b6e84fa5bed3e9eea0d278bbf9f7e0fc9e392c6cb367175c7216943e5a2b5762d768c98f4d8d3f5"], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) 20:31:58 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/16, 0x10) 20:31:58 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x572, 0x8c00) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040)={0x8, 0x1000, 0xffffffffffffffff, 0x6, 0x3ff, 0x0, 0x800, 0x0, 0x8, 0x4b}, 0x10) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x2, 0x6, 0x7fff, 0x0}, &(0x7f00000000c0)=0x10) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000100)=0x80000000) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x2, 0x5}, 0xc) openat$udambuf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/udmabuf\x00', 0x2) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x200, 0x101) 20:31:58 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, 0x0, 0x0) 20:31:58 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', 0x0, 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:58 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:31:58 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:59 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:59 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x4003, 0x28) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0xdbd, 0x1, 0xfffffffffffffffb, 0x96, 0x7}, 0xc) 20:31:59 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:59 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="90c696d8a3605ddae9037e1a953c03ad11dbd05320126366343991604b2fd79e4d7dca1dc8ca6dc9cfbb4e2fae90a3237250ad68740e40386eb42429e3dcddc62ce6957f18be0c321de2aa6a5f93f0b96cb2a7f0fd721e07b6a6010f4d5c9f414c222c469a645550e7530a6b081aaea028ee7f6e852012b7c5491aec69a0ab552603b22cf3b0c3e5b827287476d7d4af28ce8c6e796a99f5eeb71397c4bd7a9fc0813e1053", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r0, @ANYPTR64, @ANYPTR, @ANYRES16=r0, @ANYPTR64, @ANYRESDEC=r0], @ANYRES32=r0, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB="f76946a1077d8e9137674c1f48ecc228c9f806b96ff2260a4572f2ee1dbd459666014edadf1f1ff56303100786dd09b916bb7ab18cb4ed28ab2affe1c752e958f19b564b81db599656b75af377127859b3fa4dbfdd57e84e8553c97e837cbc86d8ae855165ec8f7a8022d90af26b12e258bd1eb4ad7a73ae82088082b8def9b92f04b8699ce2ee2a108efa052964516dc42df2d04dceea7eb71ce4c9b0c10bc1d2101fc84caefe2c4a731c8b104d3006fa8627", @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES16=r0, @ANYBLOB="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"]]], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x712, 0x48) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000000)={0x2e, 0x653, 0x4, 0x9, 0x10, 0x2, 0x1f, 0x81, 0x5, 0x10001, 0xfffffffffffff8e1, 0x4}) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) bind$tipc(r2, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x2, {{0x42, 0x4}, 0x4}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'\xf8\x8a\xea\xce\x19\xa4\xb0W5\xfct\xdd\xc3\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7%.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:59 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) 20:31:59 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) 20:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) ftruncate(r0, 0xffff) 20:31:59 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) [ 3210.830498][T21878] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:31:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:59 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x3, 0xc, 0x7}) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:59 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x4003, 0x28) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0xdbd, 0x1, 0xfffffffffffffffb, 0x96, 0x7}, 0xc) 20:31:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffff01, 0x2000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x6, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000000, 0x402240) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x8001) 20:31:59 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:31:59 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x81) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:31:59 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:00 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f00000000c0)={0x0, 0x0, 0x3, [], &(0x7f0000000080)=0x1ff}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000100)=0x100000000) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:00 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:00 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) 20:32:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x7, @multicast1}, @in6={0xa, 0x4e20, 0x8, @empty, 0x1}, @in6={0xa, 0x4e21, 0x1d, @dev={0xfe, 0x80, [], 0x25}, 0x8}], 0x48) 20:32:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d794093, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000080)={0x9, 0x7ff, 0x8, 0x1200000000000}) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:32:00 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x4003, 0x28) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0xdbd, 0x1, 0xfffffffffffffffb, 0x96, 0x7}, 0xc) 20:32:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0xe3, &(0x7f0000000040)='=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3', 0xffffffffffffffff}, 0x30) fcntl$setown(r0, 0x8, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:00 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) 20:32:00 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) 20:32:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x78000, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x3) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:00 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'raw\x00'}, &(0x7f0000000040)=0x54) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:01 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:01 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) 20:32:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0xe3, &(0x7f0000000040)='=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3', 0xffffffffffffffff}, 0x30) fcntl$setown(r0, 0x8, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:01 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, 0x0, 0x0, 0x0) 20:32:01 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) [ 3212.589009][ T26] kauditd_printk_skb: 25 callbacks suppressed [ 3212.589024][ T26] audit: type=1400 audit(1553718721.191:782): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22016 comm="syz-executor.2" 20:32:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) [ 3212.671339][ T26] audit: type=1400 audit(1553718721.241:783): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22015 comm="syz-executor.1" [ 3212.744552][ T26] audit: type=1400 audit(1553718721.331:784): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22022 comm="syz-executor.4" [ 3212.792231][T22025] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 3212.878323][ T26] audit: type=1400 audit(1553718721.401:785): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22028 comm="syz-executor.2" [ 3212.973936][ T26] audit: type=1400 audit(1553718721.561:786): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22034 comm="syz-executor.1" 20:32:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x39a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:01 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) 20:32:01 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:01 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast1, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@empty, @multicast1, @multicast1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2, @rand_addr=0x3, 0x1, 0x379}, 0xffffffffffffff45) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x204800, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000100)={0x6, {0x1f, 0x8, 0x4, 0x5}, {0x4, 0xff, 0x2, 0x100}, {0x7fff, 0x1}}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="150f00000000000002004e2400000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000002004e21ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000417a8db57407b642000000000000000000000000000000000000000000000002004e23ac1e0101000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x190) 20:32:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) [ 3213.268815][ T26] audit: type=1400 audit(1553718721.871:787): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22047 comm="syz-executor.4" 20:32:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x39a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3213.360908][ T26] audit: type=1400 audit(1553718721.911:788): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22049 comm="syz-executor.2" [ 3213.388066][ T26] audit: type=1400 audit(1553718721.951:789): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22046 comm="syz-executor.1" 20:32:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) [ 3213.411423][ T26] audit: type=1400 audit(1553718721.981:790): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22057 comm="syz-executor.5" 20:32:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0xfffffffffffffff7, 0x5}, 0x2) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3213.500956][T22059] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:32:02 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) [ 3213.589605][ T26] audit: type=1400 audit(1553718722.191:791): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22067 comm="syz-executor.4" 20:32:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) fadvise64(r0, 0x0, 0x1ff, 0x3) 20:32:02 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0xfffffffffffffff7, 0x5}, 0x2) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:02 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x109001) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x4, 0xffffffffffff1ed0, 0x3, 0x8, 0xab, 0x5, 0x9}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0xfffffffffffffff7, 0x5}, 0x2) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x420001, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@setneightbl={0x7c, 0x43, 0x200, 0x70bd2d, 0x25dfdbff, {0xf}, [@NDTA_THRESH1={0x8, 0x2, 0xcc7}, @NDTA_THRESH3={0x8, 0x4, 0x9}, @NDTA_THRESH2={0x8}, @NDTA_PARMS={0x38, 0x6, [@NDTPA_RETRANS_TIME={0xc, 0x5, 0x7}, @NDTPA_APP_PROBES={0x8, 0x9, 0xffffffffffff0001}, @NDTPA_ANYCAST_DELAY={0xc}, @NDTPA_RETRANS_TIME={0xc, 0x5, 0xffffffff00000001}, @NDTPA_PROXY_QLEN={0x8, 0xe, 0x5}]}, @NDTA_THRESH2={0x8, 0x3, 0x3c5}, @NDTA_THRESH1={0x8, 0x2, 0xda7}, @NDTA_THRESH3={0x8, 0x4, 0x4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) r2 = semget(0x1, 0x4, 0x4) semctl$GETVAL(r2, 0x7, 0xc, &(0x7f00000007c0)=""/4096) 20:32:02 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x0, &(0x7f0000000080), 0x0, 0x0) 20:32:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fdf891aefff16e27c127365f1695efdfb6783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db00b24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f83"], 0x46) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 20:32:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x9, &(0x7f0000000040)=""/99, 0x63) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x90000000) inotify_rm_watch(r1, r2) 20:32:03 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, 0x0, 0x0, 0x6013, 0x2}}}, 0x78) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000180)=0xe8) getgroups(0x2, &(0x7f00000001c0)=[0x0, 0xffffffffffffffff]) write$FUSE_ATTR(r0, &(0x7f0000000200)={0x78, 0x0, 0x3, {0x1, 0x7fff, 0x0, {0x1, 0x81, 0x0, 0x5, 0x2, 0x0, 0x6, 0x7fff, 0x5, 0xa0000000, 0x8001, r1, r2, 0x9, 0xffffffffffffff80}}}, 0x78) r3 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f00000000c0)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r5, &(0x7f0000000b40)=ANY=[@ANYBLOB="068e4f241b854a3eae9956440f71b4a2260b477fa8de4b7065012ed6a9a61fd14bdc75c3d7275fd64881a8abc711d1c3c7dba5fedeb9963212427f"], 0x3b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r5, &(0x7f0000000380), 0xb9) r6 = fanotify_init(0x0, 0x0) fanotify_mark(r6, 0x11, 0x2, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x8db) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r7, &(0x7f0000000040), 0x3b) listen(r7, 0xfffffffffffffffe) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in=@broadcast}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) geteuid() getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)) geteuid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@initdev, @in6}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @initdev}, @in6=@ipv4={[], [], @dev}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getegid() lstat(&(0x7f0000000780)='./bus\x00', &(0x7f0000000980)) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000880)={0x0, @reserved}) getgid() stat(&(0x7f00000007c0)='./bus\x00', &(0x7f0000000a00)) 20:32:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3214.524181][T22152] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:32:03 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) 20:32:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="0be353b5f607b0c463edaf4f51998454fd", 0x11, 0xfffffffffffffffb) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000100)=0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rfcomm\x00') ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000080)=0x2) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:03 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x100000000, 0x400000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2400220}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r2, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0x8800}, 0x40) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:03 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, 0x0, 0x6013, 0x2}}}, 0x78) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:03 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) 20:32:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000180)=0xe8) getgroups(0x2, &(0x7f00000001c0)=[0x0, 0xffffffffffffffff]) write$FUSE_ATTR(r0, &(0x7f0000000200)={0x78, 0x0, 0x3, {0x1, 0x7fff, 0x0, {0x1, 0x81, 0x0, 0x5, 0x2, 0x0, 0x6, 0x7fff, 0x5, 0xa0000000, 0x8001, r1, r2, 0x9, 0xffffffffffffff80}}}, 0x78) r3 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f00000000c0)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r5, &(0x7f0000000b40)=ANY=[@ANYBLOB="068e4f241b854a3eae9956440f71b4a2260b477fa8de4b7065012ed6a9a61fd14bdc75c3d7275fd64881a8abc711d1c3c7dba5fedeb9963212427f"], 0x3b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r5, &(0x7f0000000380), 0xb9) r6 = fanotify_init(0x0, 0x0) fanotify_mark(r6, 0x11, 0x2, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x8db) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r7, &(0x7f0000000040), 0x3b) listen(r7, 0xfffffffffffffffe) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in=@broadcast}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) geteuid() getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)) geteuid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@initdev, @in6}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @initdev}, @in6=@ipv4={[], [], @dev}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getegid() lstat(&(0x7f0000000780)='./bus\x00', &(0x7f0000000980)) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000880)={0x0, @reserved}) getgid() stat(&(0x7f00000007c0)='./bus\x00', &(0x7f0000000a00)) 20:32:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/7, 0x7}], 0x2, &(0x7f0000000140)=""/244, 0xf4}, 0xfffffffffffffc00}, {{&(0x7f0000000240)=@caif=@util, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000480)=""/93, 0x5d}], 0x5}, 0xd5}], 0x2, 0x61, &(0x7f00000027c0)={r1, r2+10000000}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:03 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getegid() r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) 20:32:03 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, 0x0, 0x6013, 0x2}}}, 0x78) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/7, 0x7}], 0x2, &(0x7f0000000140)=""/244, 0xf4}, 0xfffffffffffffc00}, {{&(0x7f0000000240)=@caif=@util, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000480)=""/93, 0x5d}], 0x5}, 0xd5}], 0x2, 0x61, &(0x7f00000027c0)={r1, r2+10000000}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3215.300189][T22381] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:32:04 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) 20:32:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x52, 0x200002) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfffffffffffffffa, 0x2) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x46) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000340)={0x0, 0x3, 0xeb93, &(0x7f0000000300)=0x5}) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000080)={0x7, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000380)={{0xde, 0x401}, 0x0, 0x4, 0x1000, {0x1, 0x5}, 0x401, 0x5}) 20:32:04 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getegid() r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) [ 3215.730403][T22404] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:32:04 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8001, 0x210200) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$caif_seqpacket(0x25, 0x5, 0x4) connect$caif(r2, &(0x7f0000000080), 0x18) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="8b9f64de0100000008a9595fde8424abacf4f7a1d95ca3314dec47563dd711000001ed2d01e857973456dd9b8ad02f45c76f90"], 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x121001, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0)=0xb8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffff, 0x9dda, 0x1, 0x1f000, 0x1, 0x2, 0x3e, 0x4, 0x24c, 0x40, 0x2e6, 0x1800000000000000, 0xfff, 0x38, 0x2, 0xaa4, 0x4, 0xfff}, [{0x60000002, 0xc78, 0xa164, 0xa34, 0x0, 0x0, 0xca, 0x3}], "685ee90a0318a435f63365d231641200d27f8d61c4c2264ea4c615d82320d4479c9499eb4defb3c8ab2eb77ae770efb30b9c05c70a1541e40bee6ae795c88f1e49c06ec3f7e65f5233c688f9a6", [[], [], [], [], [], [], []]}, 0x7c5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:04 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getegid() r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) readlinkat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/174, 0xae) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000200)) write$apparmor_exec(r0, &(0x7f0000000040)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x158) 20:32:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x52, 0x200002) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfffffffffffffffa, 0x2) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x46) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000340)={0x0, 0x3, 0xeb93, &(0x7f0000000300)=0x5}) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000080)={0x7, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000380)={{0xde, 0x401}, 0x0, 0x4, 0x1000, {0x1, 0x5}, 0x401, 0x5}) 20:32:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3b00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf04f4cf24589a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f837f5839b0b3901c315f72c8733dc6b5b37aba705e1f9342a72d68e62b4a0090ed9373bc9676ef8de658954b1df96d58536e6732f161f43ece81424d94ba52fe6d3f30afe0f1988352541a77c4c48f46f1a30cfd1b00980f83cb2ffb1bdfae5eb78b474f616a068918fe331ff49471b6a696b9"], 0x46) 20:32:04 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) 20:32:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mq_open(&(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x0, 0x44, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x3, 0x1, 0x4, 0x3, 0x4}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000180)) fstatfs(r0, &(0x7f0000000040)=""/87) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158) 20:32:04 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:04 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:04 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getegid() r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:04 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) 20:32:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mq_open(&(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x0, 0x44, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x3, 0x1, 0x4, 0x3, 0x4}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000180)) fstatfs(r0, &(0x7f0000000040)=""/87) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0244c083cd7be4441d3bde8695f649bad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd783c7d0c8f59e5dae2aacd55f6e784ef9247a8c194b9ff553df781ab9121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a23f713289f300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f36da805f5f1e0d23b6e3d245fc76153e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9ba4d79a9e877734d42aa63a9d670026ea166ae325820354f616deb57144f837f5839b0b3901c315f72c8733dc6b5b3"], 0x158) [ 3216.652567][T22463] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:32:05 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b200e81b736d76ecc83641ece26c35a80a309b1792c753e23fe1a0247d101000000000000008695f649aad24ae3c228b7722e30cdb22338030cad618df337f9967fce8b36eb7f1dc9924e9f95d981f1fd78477d0c8f58e5dae2aacd55f6e784ef9247a8c194b9ff553df781abd55e88b66913a06cd6b0be5dfdd39121715b3d3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289f06774494f1ee8ad5379dfed2d594cc20957654bd0d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f328607b898cbefad7c7e6f3f4cd05f553e613ae187222e4d5f2352378cf0443fcd24b9a4c42931dc0bc58c3bf53ca2b8308080f34d84557f9d64d79a9e877734d42aa63a9d670026ea166ae325820354f61000057144f837f5839b0b3901c315f72c8733dc6b5b392442020566b63d295e9073ebc7996a3ecfaef066d44679e119840df5d67fe9184db2ebfbb3b10d4783b6196561ec680f02a8470b500b3a02645759d61c6bbd576e6f19f71b0800a642a3717c7904e345e9baab1a24a6d9a26a6c06323780867337c0e53d4b79193"], 0x46) 20:32:05 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:05 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x20000) write$P9_RLOCK(r1, &(0x7f0000000080)={0x8, 0x35, 0x2, 0x3}, 0x8) 20:32:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f00000000c0)=0x40) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:05 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)}], 0x0, 0x0) 20:32:05 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8001, 0x210200) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$caif_seqpacket(0x25, 0x5, 0x4) connect$caif(r2, &(0x7f0000000080), 0x18) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="8b9f64de0100000008a9595fde8424abacf4f7a1d95ca3314dec47563dd711000001ed2d01e857973456dd9b8ad02f45c76f90"], 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x121001, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0)=0xb8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffff, 0x9dda, 0x1, 0x1f000, 0x1, 0x2, 0x3e, 0x4, 0x24c, 0x40, 0x2e6, 0x1800000000000000, 0xfff, 0x38, 0x2, 0xaa4, 0x4, 0xfff}, [{0x60000002, 0xc78, 0xa164, 0xa34, 0x0, 0x0, 0xca, 0x3}], "685ee90a0318a435f63365d231641200d27f8d61c4c2264ea4c615d82320d4479c9499eb4defb3c8ab2eb77ae770efb30b9c05c70a1541e40bee6ae795c88f1e49c06ec3f7e65f5233c688f9a6", [[], [], [], [], [], [], []]}, 0x7c5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:05 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8001, 0x210200) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$caif_seqpacket(0x25, 0x5, 0x4) connect$caif(r2, &(0x7f0000000080), 0x18) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="8b9f64de0100000008a9595fde8424abacf4f7a1d95ca3314dec47563dd711000001ed2d01e857973456dd9b8ad02f45c76f90"], 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x121001, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0)=0xb8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffff, 0x9dda, 0x1, 0x1f000, 0x1, 0x2, 0x3e, 0x4, 0x24c, 0x40, 0x2e6, 0x1800000000000000, 0xfff, 0x38, 0x2, 0xaa4, 0x4, 0xfff}, [{0x60000002, 0xc78, 0xa164, 0xa34, 0x0, 0x0, 0xca, 0x3}], "685ee90a0318a435f63365d231641200d27f8d61c4c2264ea4c615d82320d4479c9499eb4defb3c8ab2eb77ae770efb30b9c05c70a1541e40bee6ae795c88f1e49c06ec3f7e65f5233c688f9a6", [[], [], [], [], [], [], []]}, 0x7c5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:05 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x4, 0x7136, 0x6}, 0xa) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) 20:32:06 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) 20:32:06 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000440)='-bdev)\\\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x4, 0x9, 0x0, {0x2, 0xfffffffffffff801, 0xef, 0xffffffff, 0x61, 0xfffffffffffffff7, 0x1, 0x8001, 0x1, 0x2, 0x1ff, r2, r3, 0x6013, 0x2}}}, 0x78) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x46) 20:32:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) [ 3217.722575][ T26] kauditd_printk_skb: 34 callbacks suppressed [ 3217.722591][ T26] audit: type=1400 audit(1553718726.321:826): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22525 comm="syz-executor.2" 20:32:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000180)={0x0, 0x401, 0xfffffffffffffffe, 0x10001}) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000140)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000080)=0x1) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f00000000c0)={0x0, 0x2}) 20:32:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) [ 3217.827542][ T26] audit: type=1400 audit(1553718726.371:827): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0247D101 pid=22518 comm="syz-executor.1" 20:32:06 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000280)={0xfffffffffffffffd, 0x100000000, 0x80, 0xff, 0x9, 0x8}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000002c0), &(0x7f0000000300)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$tipc(r0, &(0x7f0000000340)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x1}}, 0x10) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x46) [ 3217.956478][ T26] audit: type=1400 audit(1553718726.501:828): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967FCE8B36EB7F1DC992 pid=22536 comm="syz-executor.1" [ 3218.011510][ T26] audit: type=1400 audit(1553718726.511:829): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22531 comm="syz-executor.2" [ 3218.081029][ T26] audit: type=1400 audit(1553718726.681:830): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22542 comm="syz-executor.1" 20:32:07 executing program 0: r0 = socket$inet(0x2, 0x2, 0xaa) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = dup2(r0, r0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @loopback}, &(0x7f00000000c0)=0xc) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000180)=ANY=[@ANYBLOB="0400000000000000000000009d000000020000009f000000f9ffffff01000000ff0f00000000000000000000000000001901008000fcffff04000000ff0100000000000006000000080000000000000087a388f8d917d000000000000000000100000007000000060000000600000004000000000800002ef0000000000000000000000000acba0b264b192c7d000002040000000000000800"]) connect$can_bcm(r1, &(0x7f0000000100)={0x1d, r2}, 0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f000001010000000100000001"], 0x14) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x40c0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack \x0e\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b#\x02\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) 20:32:07 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:07 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) 20:32:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000640)={'stack =\x81\xb76\xd7n\xcc\x83d\x1e\xce&\xc3Z\x80\xa3\t\xb1y,u>#\xfe\x1a\x02D\xc0\x83\xcd{\xe4D\x1d;\xde\x86\x95\xf6I\xaa\xd2J\xe3\xc2(\xb7r.0\xcd\xb2#8\x03\f\xada\x8d\xf37\xf9\x96\x7f\xce\x8b6\xeb\x7f\x1d\xc9\x92N\x9f\x95\xd9\x81\xf1\xfdx<}\f\x8fX\xe5\xda\xe2\xaa\xcdU\xf6\xe7\x84\xef\x92G\xa8\xc1\x94\xb9\xffU=\xf7\x81\xab\x91!q[', '=:\x00\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12su\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9f0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x95vT\xbd\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x00\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3(`{\x89\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x83\b\b\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0x46) [ 3218.488169][ T26] audit: type=1400 audit(1553718727.091:831): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22551 comm="syz-executor.1" 20:32:07 executing program 1 (fault-call:3 fault-nth:0): shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:07 executing program 4 (fault-call:12 fault-nth:0): ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:07 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3218.710888][ T26] audit: type=1400 audit(1553718727.091:832): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=0E81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22549 comm="syz-executor.2" [ 3218.732629][T22580] FAULT_INJECTION: forcing a failure. [ 3218.732629][T22580] name failslab, interval 1, probability 0, space 0, times 0 20:32:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) [ 3218.762625][T22582] FAULT_INJECTION: forcing a failure. [ 3218.762625][T22582] name failslab, interval 1, probability 0, space 0, times 0 [ 3218.775165][ T26] audit: type=1400 audit(1553718727.191:833): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3D81B736D76ECC83641ECE26C35A80A309B1792C753E23FE1A0244C083CD7BE4441D3BDE8695F649AAD24AE3C228B7722E30CDB22338030CAD618DF337F9967F pid=22559 comm="syz-executor.4" [ 3218.813442][T22580] CPU: 1 PID: 22580 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3218.822602][T22580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3218.832681][T22580] Call Trace: [ 3218.836094][T22580] dump_stack+0x172/0x1f0 [ 3218.840530][T22580] should_fail.cold+0xa/0x15 [ 3218.845161][T22580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3218.851081][T22580] ? ___might_sleep+0x163/0x280 [ 3218.856028][T22580] __should_failslab+0x121/0x190 [ 3218.861056][T22580] should_failslab+0x9/0x14 [ 3218.865641][T22580] __kmalloc+0x2dc/0x740 [ 3218.869936][T22580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3218.876239][T22580] ? fput_many+0x12c/0x1a0 [ 3218.880675][T22580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3218.886931][T22580] ? strnlen_user+0x1f0/0x280 [ 3218.891630][T22580] ? __x64_sys_memfd_create+0x13c/0x470 [ 3218.897199][T22580] __x64_sys_memfd_create+0x13c/0x470 [ 3218.902599][T22580] ? memfd_fcntl+0x1550/0x1550 [ 3218.907432][T22580] ? do_syscall_64+0x26/0x610 [ 3218.912186][T22580] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3218.917558][T22580] ? trace_hardirqs_on+0x67/0x230 [ 3218.922621][T22580] do_syscall_64+0x103/0x610 [ 3218.927240][T22580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3218.933157][T22580] RIP: 0033:0x458209 [ 3218.937071][T22580] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3218.956689][T22580] RSP: 002b:00007f1425f41a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3218.965131][T22580] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3218.973119][T22580] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3218.981111][T22580] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3218.989121][T22580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1425f426d4 [ 3218.997120][T22580] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000005 [ 3219.006284][T22582] CPU: 1 PID: 22582 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3219.008710][T22585] FAULT_INJECTION: forcing a failure. [ 3219.008710][T22585] name failslab, interval 1, probability 0, space 0, times 0 [ 3219.015438][T22582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3219.015447][T22582] Call Trace: [ 3219.015481][T22582] dump_stack+0x172/0x1f0 [ 3219.015503][T22582] should_fail.cold+0xa/0x15 [ 3219.015522][T22582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3219.015543][T22582] ? ___might_sleep+0x163/0x280 [ 3219.015564][T22582] __should_failslab+0x121/0x190 [ 3219.015591][T22582] should_failslab+0x9/0x14 [ 3219.070743][T22582] __kmalloc+0x2dc/0x740 [ 3219.075025][T22582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3219.081295][T22582] ? fput_many+0x12c/0x1a0 [ 3219.085745][T22582] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3219.092018][T22582] ? strnlen_user+0x1f0/0x280 [ 3219.096724][T22582] ? __x64_sys_memfd_create+0x13c/0x470 [ 3219.102304][T22582] __x64_sys_memfd_create+0x13c/0x470 [ 3219.107705][T22582] ? memfd_fcntl+0x1550/0x1550 [ 3219.112489][T22582] ? do_syscall_64+0x26/0x610 [ 3219.117206][T22582] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3219.122517][T22582] ? trace_hardirqs_on+0x67/0x230 [ 3219.127568][T22582] do_syscall_64+0x103/0x610 [ 3219.132197][T22582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3219.138108][T22582] RIP: 0033:0x458209 [ 3219.142022][T22582] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3219.161732][T22582] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3219.170171][T22582] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458209 [ 3219.178164][T22582] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3219.186158][T22582] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3219.194181][T22582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0a9526d4 [ 3219.194190][T22582] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3219.196609][T22585] CPU: 1 PID: 22585 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3219.219914][T22585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3219.229990][T22585] Call Trace: [ 3219.233317][T22585] dump_stack+0x172/0x1f0 [ 3219.237681][T22585] should_fail.cold+0xa/0x15 [ 3219.242397][T22585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3219.248278][T22585] ? ___might_sleep+0x163/0x280 [ 3219.253176][T22585] __should_failslab+0x121/0x190 [ 3219.258270][T22585] should_failslab+0x9/0x14 [ 3219.262802][T22585] __kmalloc+0x2dc/0x740 [ 3219.267073][T22585] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3219.273340][T22585] ? fput_many+0x12c/0x1a0 [ 3219.277795][T22585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3219.284078][T22585] ? strnlen_user+0x1f0/0x280 [ 3219.288795][T22585] ? __x64_sys_memfd_create+0x13c/0x470 [ 3219.294375][T22585] __x64_sys_memfd_create+0x13c/0x470 [ 3219.299777][T22585] ? memfd_fcntl+0x1550/0x1550 [ 3219.304576][T22585] ? do_syscall_64+0x26/0x610 [ 3219.309281][T22585] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3219.314593][T22585] ? trace_hardirqs_on+0x67/0x230 [ 3219.319658][T22585] do_syscall_64+0x103/0x610 [ 3219.324315][T22585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3219.330225][T22585] RIP: 0033:0x458209 [ 3219.334144][T22585] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3219.353766][T22585] RSP: 002b:00007fb74f428a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 20:32:08 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3219.362207][T22585] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3219.370209][T22585] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3219.378203][T22585] RBP: 000000000073c0e0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3219.386195][T22585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb74f4296d4 [ 3219.394186][T22585] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 000000000000000c 20:32:08 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb8", 0x5}], 0x0, 0x0) [ 3219.513525][T22599] FAULT_INJECTION: forcing a failure. [ 3219.513525][T22599] name failslab, interval 1, probability 0, space 0, times 0 [ 3219.588842][T22599] CPU: 1 PID: 22599 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3219.598007][T22599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3219.608073][T22599] Call Trace: [ 3219.611439][T22599] dump_stack+0x172/0x1f0 [ 3219.615773][T22599] should_fail.cold+0xa/0x15 [ 3219.620365][T22599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3219.626174][T22599] ? ___might_sleep+0x163/0x280 [ 3219.631027][T22599] __should_failslab+0x121/0x190 [ 3219.636025][T22599] ? shmem_destroy_callback+0xc0/0xc0 [ 3219.641414][T22599] should_failslab+0x9/0x14 [ 3219.645920][T22599] kmem_cache_alloc+0x2b2/0x6f0 [ 3219.650860][T22599] ? __alloc_fd+0x430/0x530 [ 3219.655404][T22599] ? shmem_destroy_callback+0xc0/0xc0 [ 3219.660797][T22599] shmem_alloc_inode+0x1c/0x50 [ 3219.665725][T22599] alloc_inode+0x66/0x190 [ 3219.670092][T22599] new_inode_pseudo+0x19/0xf0 [ 3219.674778][T22599] new_inode+0x1f/0x40 [ 3219.678861][T22599] shmem_get_inode+0x84/0x780 [ 3219.683547][T22599] __shmem_file_setup.part.0+0x7e/0x2b0 [ 3219.689091][T22599] shmem_file_setup+0x66/0x90 [ 3219.693763][T22599] __x64_sys_memfd_create+0x2a2/0x470 [ 3219.699150][T22599] ? memfd_fcntl+0x1550/0x1550 [ 3219.703921][T22599] ? do_syscall_64+0x26/0x610 [ 3219.708623][T22599] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3219.713906][T22599] ? trace_hardirqs_on+0x67/0x230 [ 3219.718932][T22599] do_syscall_64+0x103/0x610 [ 3219.723524][T22599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3219.729417][T22599] RIP: 0033:0x458209 [ 3219.733326][T22599] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3219.753012][T22599] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3219.761436][T22599] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458209 [ 3219.769460][T22599] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3219.777464][T22599] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3219.785445][T22599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0a9526d4 [ 3219.793460][T22599] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 20:32:08 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x8000000023, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:08 executing program 1 (fault-call:3 fault-nth:1): shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x223) 20:32:08 executing program 4 (fault-call:12 fault-nth:1): ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:08 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3220.018381][T22622] FAULT_INJECTION: forcing a failure. [ 3220.018381][T22622] name failslab, interval 1, probability 0, space 0, times 0 [ 3220.021644][T22617] FAULT_INJECTION: forcing a failure. [ 3220.021644][T22617] name failslab, interval 1, probability 0, space 0, times 0 [ 3220.072865][T22626] FAULT_INJECTION: forcing a failure. [ 3220.072865][T22626] name failslab, interval 1, probability 0, space 0, times 0 [ 3220.098476][T22617] CPU: 1 PID: 22617 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3220.107646][T22617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3220.117743][T22617] Call Trace: [ 3220.121086][T22617] dump_stack+0x172/0x1f0 [ 3220.125446][T22617] should_fail.cold+0xa/0x15 [ 3220.130056][T22617] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3220.135881][T22617] ? ___might_sleep+0x163/0x280 [ 3220.140763][T22617] __should_failslab+0x121/0x190 [ 3220.145718][T22617] ? shmem_destroy_callback+0xc0/0xc0 [ 3220.151108][T22617] should_failslab+0x9/0x14 [ 3220.155654][T22617] kmem_cache_alloc+0x2b2/0x6f0 [ 3220.160623][T22617] ? __alloc_fd+0x430/0x530 [ 3220.165152][T22617] ? shmem_destroy_callback+0xc0/0xc0 [ 3220.170547][T22617] shmem_alloc_inode+0x1c/0x50 [ 3220.175844][T22617] alloc_inode+0x66/0x190 [ 3220.180197][T22617] new_inode_pseudo+0x19/0xf0 [ 3220.184889][T22617] new_inode+0x1f/0x40 [ 3220.188968][T22617] shmem_get_inode+0x84/0x780 [ 3220.193661][T22617] __shmem_file_setup.part.0+0x7e/0x2b0 [ 3220.199215][T22617] shmem_file_setup+0x66/0x90 [ 3220.203936][T22617] __x64_sys_memfd_create+0x2a2/0x470 [ 3220.209338][T22617] ? memfd_fcntl+0x1550/0x1550 [ 3220.214113][T22617] ? do_syscall_64+0x26/0x610 [ 3220.218800][T22617] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3220.224104][T22617] ? trace_hardirqs_on+0x67/0x230 [ 3220.229148][T22617] do_syscall_64+0x103/0x610 [ 3220.233769][T22617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3220.239679][T22617] RIP: 0033:0x458209 [ 3220.243584][T22617] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3220.263203][T22617] RSP: 002b:00007f1425f41a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 20:32:08 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) [ 3220.271639][T22617] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3220.279717][T22617] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3220.289239][T22617] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3220.297317][T22617] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1425f426d4 [ 3220.305389][T22617] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000005 [ 3220.314856][T22626] CPU: 1 PID: 22626 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3220.323995][T22626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3220.334070][T22626] Call Trace: [ 3220.337384][T22626] dump_stack+0x172/0x1f0 [ 3220.341749][T22626] should_fail.cold+0xa/0x15 [ 3220.346367][T22626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3220.346390][T22626] ? ___might_sleep+0x163/0x280 [ 3220.346409][T22626] __should_failslab+0x121/0x190 [ 3220.346432][T22626] ? shmem_destroy_callback+0xc0/0xc0 [ 3220.346449][T22626] should_failslab+0x9/0x14 [ 3220.346466][T22626] kmem_cache_alloc+0x2b2/0x6f0 [ 3220.346483][T22626] ? __alloc_fd+0x430/0x530 [ 3220.346505][T22626] ? shmem_destroy_callback+0xc0/0xc0 [ 3220.386702][T22626] shmem_alloc_inode+0x1c/0x50 [ 3220.391480][T22626] alloc_inode+0x66/0x190 [ 3220.391498][T22626] new_inode_pseudo+0x19/0xf0 [ 3220.391513][T22626] new_inode+0x1f/0x40 [ 3220.391528][T22626] shmem_get_inode+0x84/0x780 [ 3220.391550][T22626] __shmem_file_setup.part.0+0x7e/0x2b0 [ 3220.391570][T22626] shmem_file_setup+0x66/0x90 [ 3220.391589][T22626] __x64_sys_memfd_create+0x2a2/0x470 [ 3220.391619][T22626] ? memfd_fcntl+0x1550/0x1550 [ 3220.429698][T22626] ? do_syscall_64+0x26/0x610 [ 3220.434434][T22626] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3220.439751][T22626] ? trace_hardirqs_on+0x67/0x230 [ 3220.444889][T22626] do_syscall_64+0x103/0x610 [ 3220.449520][T22626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3220.455434][T22626] RIP: 0033:0x458209 [ 3220.459345][T22626] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3220.479489][T22626] RSP: 002b:00007fb74f46aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3220.487920][T22626] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3220.495911][T22626] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3220.503903][T22626] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3220.511890][T22626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb74f46b6d4 [ 3220.519880][T22626] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000007 [ 3220.527902][T22622] CPU: 0 PID: 22622 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3220.537040][T22622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3220.547112][T22622] Call Trace: [ 3220.550422][T22622] dump_stack+0x172/0x1f0 [ 3220.554775][T22622] should_fail.cold+0xa/0x15 [ 3220.559397][T22622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3220.565240][T22622] ? ___might_sleep+0x163/0x280 [ 3220.570120][T22622] __should_failslab+0x121/0x190 [ 3220.575080][T22622] should_failslab+0x9/0x14 [ 3220.579608][T22622] kmem_cache_alloc+0x2b2/0x6f0 [ 3220.584471][T22622] ? current_time+0x6b/0x140 [ 3220.589149][T22622] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3220.594981][T22622] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3220.600276][T22622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3220.600293][T22622] ? timespec64_trunc+0xf0/0x180 [ 3220.600313][T22622] __d_alloc+0x2e/0x8c0 [ 3220.615707][T22622] d_alloc_pseudo+0x1e/0x30 [ 3220.620219][T22622] alloc_file_pseudo+0xe2/0x280 [ 3220.625079][T22622] ? alloc_file+0x4d0/0x4d0 [ 3220.629589][T22622] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3220.635853][T22622] __shmem_file_setup.part.0+0x108/0x2b0 [ 3220.641521][T22622] shmem_file_setup+0x66/0x90 [ 3220.646247][T22622] __x64_sys_memfd_create+0x2a2/0x470 [ 3220.651656][T22622] ? memfd_fcntl+0x1550/0x1550 [ 3220.656446][T22622] ? do_syscall_64+0x26/0x610 [ 3220.661157][T22622] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3220.666463][T22622] ? trace_hardirqs_on+0x67/0x230 [ 3220.671509][T22622] do_syscall_64+0x103/0x610 [ 3220.676146][T22622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3220.682048][T22622] RIP: 0033:0x458209 [ 3220.685968][T22622] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3220.705586][T22622] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3220.714012][T22622] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458209 20:32:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x2302) 20:32:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x23020000) [ 3220.721995][T22622] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3220.729975][T22622] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3220.737962][T22622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0a9526d4 [ 3220.745951][T22622] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 20:32:09 executing program 1 (fault-call:3 fault-nth:2): shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x7ffffffff000) 20:32:09 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:09 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) [ 3220.992841][T22651] FAULT_INJECTION: forcing a failure. [ 3220.992841][T22651] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.008907][T22659] FAULT_INJECTION: forcing a failure. [ 3221.008907][T22659] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.068226][T22651] CPU: 0 PID: 22651 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3221.077482][T22651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.087555][T22651] Call Trace: [ 3221.090877][T22651] dump_stack+0x172/0x1f0 [ 3221.095229][T22651] should_fail.cold+0xa/0x15 [ 3221.095253][T22651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3221.095280][T22651] ? ___might_sleep+0x163/0x280 [ 3221.105676][T22651] __should_failslab+0x121/0x190 [ 3221.105695][T22651] should_failslab+0x9/0x14 [ 3221.105711][T22651] kmem_cache_alloc+0x2b2/0x6f0 [ 3221.105724][T22651] ? current_time+0x6b/0x140 [ 3221.105738][T22651] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3221.105752][T22651] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3221.105766][T22651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3221.105786][T22651] ? timespec64_trunc+0xf0/0x180 [ 3221.151704][T22651] __d_alloc+0x2e/0x8c0 [ 3221.155870][T22651] d_alloc_pseudo+0x1e/0x30 [ 3221.160393][T22651] alloc_file_pseudo+0xe2/0x280 [ 3221.165259][T22651] ? alloc_file+0x4d0/0x4d0 [ 3221.169774][T22651] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3221.176496][T22651] __shmem_file_setup.part.0+0x108/0x2b0 [ 3221.182241][T22651] shmem_file_setup+0x66/0x90 [ 3221.186949][T22651] __x64_sys_memfd_create+0x2a2/0x470 [ 3221.192337][T22651] ? memfd_fcntl+0x1550/0x1550 [ 3221.197124][T22651] ? do_syscall_64+0x26/0x610 [ 3221.201913][T22651] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3221.207218][T22651] ? trace_hardirqs_on+0x67/0x230 [ 3221.212259][T22651] do_syscall_64+0x103/0x610 [ 3221.216877][T22651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3221.222793][T22651] RIP: 0033:0x458209 [ 3221.226714][T22651] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3221.246360][T22651] RSP: 002b:00007f1425f41a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3221.254799][T22651] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 20:32:09 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x224142, 0x38) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:09 executing program 4 (fault-call:12 fault-nth:2): ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0xf0ffffff7f0000) [ 3221.262797][T22651] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3221.270782][T22651] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3221.279034][T22651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1425f426d4 [ 3221.287024][T22651] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000005 [ 3221.296284][T22659] CPU: 1 PID: 22659 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3221.305416][T22659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.315496][T22659] Call Trace: 20:32:09 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x2302000000000000) [ 3221.318815][T22659] dump_stack+0x172/0x1f0 [ 3221.323175][T22659] should_fail.cold+0xa/0x15 [ 3221.327791][T22659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3221.333643][T22659] ? ___might_sleep+0x163/0x280 [ 3221.338530][T22659] __should_failslab+0x121/0x190 [ 3221.343494][T22659] should_failslab+0x9/0x14 [ 3221.348039][T22659] kmem_cache_alloc+0x2b2/0x6f0 [ 3221.352899][T22659] ? current_time+0x6b/0x140 [ 3221.357505][T22659] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3221.363318][T22659] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3221.368615][T22659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3221.374859][T22659] ? timespec64_trunc+0xf0/0x180 [ 3221.379800][T22659] __d_alloc+0x2e/0x8c0 [ 3221.383961][T22659] d_alloc_pseudo+0x1e/0x30 [ 3221.388481][T22659] alloc_file_pseudo+0xe2/0x280 [ 3221.393347][T22659] ? alloc_file+0x4d0/0x4d0 [ 3221.397868][T22659] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3221.404147][T22659] __shmem_file_setup.part.0+0x108/0x2b0 [ 3221.409797][T22659] shmem_file_setup+0x66/0x90 [ 3221.414594][T22659] __x64_sys_memfd_create+0x2a2/0x470 [ 3221.419983][T22659] ? memfd_fcntl+0x1550/0x1550 [ 3221.424741][T22659] ? do_syscall_64+0x26/0x610 [ 3221.429412][T22659] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3221.434708][T22659] ? trace_hardirqs_on+0x67/0x230 [ 3221.439737][T22659] do_syscall_64+0x103/0x610 [ 3221.444334][T22659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3221.450224][T22659] RIP: 0033:0x458209 [ 3221.454153][T22659] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3221.459917][T22675] FAULT_INJECTION: forcing a failure. [ 3221.459917][T22675] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.476026][T22659] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3221.476042][T22659] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458209 [ 3221.476049][T22659] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd167 20:32:10 executing program 2 (fault-call:2 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3221.476056][T22659] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3221.476063][T22659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0a9526d4 [ 3221.476070][T22659] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3221.537861][T22675] CPU: 0 PID: 22675 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3221.546981][T22675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.557039][T22675] Call Trace: [ 3221.560320][T22675] dump_stack+0x172/0x1f0 [ 3221.564635][T22675] should_fail.cold+0xa/0x15 [ 3221.569207][T22675] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3221.575048][T22675] ? ___might_sleep+0x163/0x280 [ 3221.579892][T22675] __should_failslab+0x121/0x190 [ 3221.584815][T22675] should_failslab+0x9/0x14 [ 3221.589300][T22675] kmem_cache_alloc+0x2b2/0x6f0 [ 3221.594135][T22675] ? current_time+0x6b/0x140 [ 3221.598714][T22675] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3221.604524][T22675] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3221.609791][T22675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3221.616023][T22675] ? timespec64_trunc+0xf0/0x180 [ 3221.620955][T22675] __d_alloc+0x2e/0x8c0 [ 3221.625096][T22675] d_alloc_pseudo+0x1e/0x30 [ 3221.629580][T22675] alloc_file_pseudo+0xe2/0x280 [ 3221.634439][T22675] ? alloc_file+0x4d0/0x4d0 [ 3221.638936][T22675] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3221.645171][T22675] __shmem_file_setup.part.0+0x108/0x2b0 [ 3221.650791][T22675] shmem_file_setup+0x66/0x90 [ 3221.655459][T22675] __x64_sys_memfd_create+0x2a2/0x470 [ 3221.660830][T22675] ? memfd_fcntl+0x1550/0x1550 [ 3221.665584][T22675] ? do_syscall_64+0x26/0x610 [ 3221.670268][T22675] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3221.675546][T22675] ? trace_hardirqs_on+0x67/0x230 [ 3221.680567][T22675] do_syscall_64+0x103/0x610 [ 3221.685169][T22675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3221.691067][T22675] RIP: 0033:0x458209 [ 3221.694977][T22675] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3221.714573][T22675] RSP: 002b:00007fb74f428a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3221.722987][T22675] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3221.730958][T22675] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3221.738959][T22675] RBP: 000000000073c0e0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3221.746932][T22675] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb74f4296d4 [ 3221.754895][T22675] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 000000000000000c 20:32:10 executing program 1 (fault-call:3 fault-nth:3): shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:10 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0xc001, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xffffffff, 0x2, 0xffffffff, 0x7ff, 0x5, 0x9, 0x800, 0x3, 0x3ff, 0x100000000000}) pipe2(&(0x7f0000000040), 0x80000) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) read(r0, 0x0, 0x26c) [ 3221.919993][T22686] FAULT_INJECTION: forcing a failure. [ 3221.919993][T22686] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.935525][T22692] FAULT_INJECTION: forcing a failure. [ 3221.935525][T22692] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.948740][T22686] CPU: 1 PID: 22686 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3221.957878][T22686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.967957][T22686] Call Trace: [ 3221.971275][T22686] dump_stack+0x172/0x1f0 [ 3221.975632][T22686] should_fail.cold+0xa/0x15 [ 3221.980251][T22686] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3221.986084][T22686] ? ___might_sleep+0x163/0x280 [ 3221.990962][T22686] __should_failslab+0x121/0x190 [ 3221.995929][T22686] should_failslab+0x9/0x14 [ 3222.000467][T22686] kmem_cache_alloc+0x2b2/0x6f0 [ 3222.005432][T22686] ? rcu_read_lock_sched_held+0x110/0x130 [ 3222.011179][T22686] ? kmem_cache_alloc+0x32e/0x6f0 [ 3222.016316][T22686] security_file_alloc+0x39/0x170 [ 3222.021374][T22686] __alloc_file+0xac/0x300 [ 3222.025819][T22686] alloc_empty_file+0x72/0x170 [ 3222.030619][T22686] alloc_file+0x5e/0x4d0 [ 3222.034886][T22686] alloc_file_pseudo+0x189/0x280 [ 3222.039844][T22686] ? alloc_file+0x4d0/0x4d0 [ 3222.044365][T22686] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3222.050635][T22686] __shmem_file_setup.part.0+0x108/0x2b0 [ 3222.056299][T22686] shmem_file_setup+0x66/0x90 [ 3222.060998][T22686] __x64_sys_memfd_create+0x2a2/0x470 [ 3222.066393][T22686] ? memfd_fcntl+0x1550/0x1550 [ 3222.071183][T22686] ? do_syscall_64+0x26/0x610 [ 3222.075896][T22686] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3222.081203][T22686] ? trace_hardirqs_on+0x67/0x230 [ 3222.086367][T22686] do_syscall_64+0x103/0x610 [ 3222.090993][T22686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.096917][T22686] RIP: 0033:0x458209 [ 3222.100847][T22686] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:32:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 3222.120584][T22686] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3222.129047][T22686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458209 [ 3222.137063][T22686] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3222.145082][T22686] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3222.153081][T22686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0a9526d4 [ 3222.161080][T22686] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3222.176207][T22692] CPU: 1 PID: 22692 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3222.185457][T22692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3222.195531][T22692] Call Trace: [ 3222.198853][T22692] dump_stack+0x172/0x1f0 [ 3222.203213][T22692] should_fail.cold+0xa/0x15 [ 3222.207834][T22692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3222.213676][T22692] ? ___might_sleep+0x163/0x280 [ 3222.218564][T22692] __should_failslab+0x121/0x190 20:32:10 executing program 2 (fault-call:2 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3222.223615][T22692] should_failslab+0x9/0x14 [ 3222.228166][T22692] kmem_cache_alloc+0x2b2/0x6f0 [ 3222.233049][T22692] __alloc_file+0x27/0x300 [ 3222.237486][T22692] alloc_empty_file+0x72/0x170 [ 3222.242267][T22692] alloc_file+0x5e/0x4d0 [ 3222.246553][T22692] alloc_file_pseudo+0x189/0x280 [ 3222.251498][T22692] ? alloc_file+0x4d0/0x4d0 [ 3222.256002][T22692] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3222.262346][T22692] __shmem_file_setup.part.0+0x108/0x2b0 [ 3222.268007][T22692] shmem_file_setup+0x66/0x90 [ 3222.272717][T22692] __x64_sys_memfd_create+0x2a2/0x470 [ 3222.278104][T22692] ? memfd_fcntl+0x1550/0x1550 [ 3222.282914][T22692] ? do_syscall_64+0x26/0x610 [ 3222.287590][T22692] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3222.292889][T22692] ? trace_hardirqs_on+0x67/0x230 [ 3222.297925][T22692] do_syscall_64+0x103/0x610 [ 3222.302516][T22692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.308452][T22692] RIP: 0033:0x458209 [ 3222.312346][T22692] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3222.331994][T22692] RSP: 002b:00007f1425f41a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3222.340465][T22692] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3222.348481][T22692] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3222.356483][T22692] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3222.364503][T22692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1425f426d4 [ 3222.372494][T22692] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000005 20:32:11 executing program 4 (fault-call:12 fault-nth:3): ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:11 executing program 1 (fault-call:3 fault-nth:4): shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:11 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c0000", 0x8}], 0x0, 0x0) [ 3222.489101][T22702] FAULT_INJECTION: forcing a failure. [ 3222.489101][T22702] name failslab, interval 1, probability 0, space 0, times 0 20:32:11 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40800, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @dev}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000180)={@rand_addr="6e410e44175fa5b5234a77b7efe7f719", 0x29, r1}) [ 3222.539161][T22702] CPU: 1 PID: 22702 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3222.548335][T22702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3222.558414][T22702] Call Trace: [ 3222.561734][T22702] dump_stack+0x172/0x1f0 [ 3222.566132][T22702] should_fail.cold+0xa/0x15 [ 3222.570741][T22702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3222.576569][T22702] ? ___might_sleep+0x163/0x280 [ 3222.581443][T22702] __should_failslab+0x121/0x190 [ 3222.586401][T22702] should_failslab+0x9/0x14 [ 3222.590932][T22702] kmem_cache_alloc+0x2b2/0x6f0 [ 3222.595814][T22702] ? rcu_read_lock_sched_held+0x110/0x130 [ 3222.601566][T22702] ? kmem_cache_alloc+0x32e/0x6f0 [ 3222.606620][T22702] security_file_alloc+0x39/0x170 [ 3222.611672][T22702] __alloc_file+0xac/0x300 [ 3222.616111][T22702] alloc_empty_file+0x72/0x170 [ 3222.620899][T22702] alloc_file+0x5e/0x4d0 [ 3222.625161][T22702] alloc_file_pseudo+0x189/0x280 [ 3222.630114][T22702] ? alloc_file+0x4d0/0x4d0 [ 3222.634633][T22702] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3222.640893][T22702] __shmem_file_setup.part.0+0x108/0x2b0 [ 3222.646549][T22702] shmem_file_setup+0x66/0x90 [ 3222.651248][T22702] __x64_sys_memfd_create+0x2a2/0x470 [ 3222.656649][T22702] ? memfd_fcntl+0x1550/0x1550 [ 3222.661441][T22702] ? do_syscall_64+0x26/0x610 [ 3222.666137][T22702] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3222.671451][T22702] ? trace_hardirqs_on+0x67/0x230 [ 3222.676505][T22702] do_syscall_64+0x103/0x610 [ 3222.681108][T22702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.686987][T22702] RIP: 0033:0x458209 [ 3222.690868][T22702] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3222.701157][T22715] FAULT_INJECTION: forcing a failure. [ 3222.701157][T22715] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.710469][T22702] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3222.710485][T22702] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458209 20:32:11 executing program 2 (fault-call:2 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3222.710492][T22702] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3222.710501][T22702] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3222.710508][T22702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0a9526d4 [ 3222.710515][T22702] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3222.736415][T22715] CPU: 0 PID: 22715 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3222.763576][T22715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3222.763583][T22715] Call Trace: [ 3222.763607][T22715] dump_stack+0x172/0x1f0 [ 3222.763627][T22715] should_fail.cold+0xa/0x15 [ 3222.763646][T22715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3222.763668][T22715] ? ___might_sleep+0x163/0x280 [ 3222.763687][T22715] __should_failslab+0x121/0x190 [ 3222.763711][T22715] should_failslab+0x9/0x14 [ 3222.798439][T22715] kmem_cache_alloc+0x2b2/0x6f0 [ 3222.798476][T22715] __alloc_file+0x27/0x300 [ 3222.798495][T22715] alloc_empty_file+0x72/0x170 [ 3222.798518][T22715] alloc_file+0x5e/0x4d0 [ 3222.808914][T22715] alloc_file_pseudo+0x189/0x280 [ 3222.808941][T22715] ? alloc_file+0x4d0/0x4d0 [ 3222.808961][T22715] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3222.808993][T22715] __shmem_file_setup.part.0+0x108/0x2b0 [ 3222.852155][T22719] FAULT_INJECTION: forcing a failure. [ 3222.852155][T22719] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.857164][T22715] shmem_file_setup+0x66/0x90 [ 3222.857185][T22715] __x64_sys_memfd_create+0x2a2/0x470 [ 3222.857201][T22715] ? memfd_fcntl+0x1550/0x1550 [ 3222.857218][T22715] ? do_syscall_64+0x26/0x610 [ 3222.857241][T22715] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3222.900152][T22715] ? trace_hardirqs_on+0x67/0x230 [ 3222.905197][T22715] do_syscall_64+0x103/0x610 [ 3222.909807][T22715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.915705][T22715] RIP: 0033:0x458209 [ 3222.919603][T22715] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3222.939220][T22715] RSP: 002b:00007fb74f428a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3222.947640][T22715] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3222.955614][T22715] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3222.963594][T22715] RBP: 000000000073c0e0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3222.971576][T22715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb74f4296d4 [ 3222.979557][T22715] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 000000000000000c [ 3222.987566][T22719] CPU: 1 PID: 22719 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3222.996703][T22719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.006773][T22719] Call Trace: [ 3223.010081][T22719] dump_stack+0x172/0x1f0 [ 3223.014439][T22719] should_fail.cold+0xa/0x15 [ 3223.019048][T22719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3223.024869][T22719] ? ___might_sleep+0x163/0x280 [ 3223.029741][T22719] __should_failslab+0x121/0x190 [ 3223.034697][T22719] should_failslab+0x9/0x14 [ 3223.039216][T22719] kmem_cache_alloc+0x2b2/0x6f0 [ 3223.044085][T22719] ? notify_change+0x6d5/0xfb0 [ 3223.048955][T22719] ? do_sys_ftruncate+0x41e/0x550 [ 3223.054076][T22719] getname_flags+0xd6/0x5b0 [ 3223.058616][T22719] getname+0x1a/0x20 [ 3223.062533][T22719] do_sys_open+0x2c9/0x5d0 [ 3223.066965][T22719] ? filp_open+0x80/0x80 [ 3223.071224][T22719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3223.077492][T22719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3223.082976][T22719] ? do_syscall_64+0x26/0x610 [ 3223.087682][T22719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.093770][T22719] ? do_syscall_64+0x26/0x610 [ 3223.098480][T22719] __x64_sys_open+0x7e/0xc0 [ 3223.103013][T22719] do_syscall_64+0x103/0x610 [ 3223.107636][T22719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.113539][T22719] RIP: 0033:0x4121a1 [ 3223.117457][T22719] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3223.137082][T22719] RSP: 002b:00007fec0a951a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3223.137099][T22719] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004121a1 [ 3223.137106][T22719] RDX: 00007fec0a951b0a RSI: 0000000000000002 RDI: 00007fec0a951b00 [ 3223.137112][T22719] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 3223.137119][T22719] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3223.137126][T22719] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3223.154637][T22723] FAULT_INJECTION: forcing a failure. [ 3223.154637][T22723] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.190249][T22723] CPU: 1 PID: 22723 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3223.208400][T22723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.218470][T22723] Call Trace: [ 3223.221787][T22723] dump_stack+0x172/0x1f0 [ 3223.226129][T22723] should_fail.cold+0xa/0x15 [ 3223.230742][T22723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3223.236661][T22723] ? ___might_sleep+0x163/0x280 [ 3223.236680][T22723] __should_failslab+0x121/0x190 [ 3223.236705][T22723] should_failslab+0x9/0x14 [ 3223.250989][T22723] kmem_cache_alloc+0x2b2/0x6f0 [ 3223.255860][T22723] __alloc_file+0x27/0x300 [ 3223.260301][T22723] alloc_empty_file+0x72/0x170 [ 3223.265101][T22723] alloc_file+0x5e/0x4d0 [ 3223.269380][T22723] alloc_file_pseudo+0x189/0x280 [ 3223.274384][T22723] ? alloc_file+0x4d0/0x4d0 [ 3223.278918][T22723] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3223.285191][T22723] __shmem_file_setup.part.0+0x108/0x2b0 20:32:11 executing program 2 (fault-call:2 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3223.290855][T22723] shmem_file_setup+0x66/0x90 [ 3223.295559][T22723] __x64_sys_memfd_create+0x2a2/0x470 [ 3223.300947][T22723] ? memfd_fcntl+0x1550/0x1550 [ 3223.305728][T22723] ? do_syscall_64+0x26/0x610 [ 3223.310420][T22723] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3223.315731][T22723] ? trace_hardirqs_on+0x67/0x230 [ 3223.320776][T22723] do_syscall_64+0x103/0x610 [ 3223.325391][T22723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.331312][T22723] RIP: 0033:0x458209 20:32:11 executing program 5: r0 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/184, &(0x7f0000000040)=0xb8) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r1, 0x0, 0x0) [ 3223.335263][T22723] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3223.354899][T22723] RSP: 002b:00007f1425f41a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3223.363331][T22723] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3223.371409][T22723] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3223.371436][T22723] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3223.371443][T22723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1425f426d4 [ 3223.371450][T22723] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000005 20:32:12 executing program 1 (fault-call:3 fault-nth:5): shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:12 executing program 4 (fault-call:12 fault-nth:4): ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3223.490914][T22734] FAULT_INJECTION: forcing a failure. [ 3223.490914][T22734] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.552019][T22734] CPU: 0 PID: 22734 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3223.561195][T22734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.571268][T22734] Call Trace: [ 3223.574590][T22734] dump_stack+0x172/0x1f0 [ 3223.578957][T22734] should_fail.cold+0xa/0x15 [ 3223.583556][T22734] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3223.589374][T22734] ? ___might_sleep+0x163/0x280 [ 3223.594257][T22734] __should_failslab+0x121/0x190 [ 3223.599208][T22734] should_failslab+0x9/0x14 [ 3223.603730][T22734] kmem_cache_alloc+0x2b2/0x6f0 [ 3223.608681][T22734] ? rcu_read_lock_sched_held+0x110/0x130 [ 3223.614421][T22734] ? kmem_cache_alloc+0x32e/0x6f0 [ 3223.619472][T22734] security_file_alloc+0x39/0x170 [ 3223.624517][T22734] __alloc_file+0xac/0x300 [ 3223.628951][T22734] alloc_empty_file+0x72/0x170 [ 3223.633732][T22734] path_openat+0xef/0x46e0 [ 3223.638162][T22734] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3223.644002][T22734] ? kasan_slab_alloc+0xf/0x20 [ 3223.648783][T22734] ? kmem_cache_alloc+0x11a/0x6f0 [ 3223.653813][T22734] ? getname_flags+0xd6/0x5b0 [ 3223.658489][T22734] ? getname+0x1a/0x20 [ 3223.662566][T22734] ? do_sys_open+0x2c9/0x5d0 [ 3223.667174][T22734] ? __x64_sys_open+0x7e/0xc0 [ 3223.671854][T22734] ? do_syscall_64+0x103/0x610 [ 3223.676639][T22734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.682718][T22734] ? __lock_acquire+0x548/0x3fb0 [ 3223.683108][T22741] FAULT_INJECTION: forcing a failure. [ 3223.683108][T22741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3223.687668][T22734] ? __lock_acquire+0x548/0x3fb0 [ 3223.687684][T22734] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3223.687710][T22734] ? __alloc_fd+0x430/0x530 [ 3223.687728][T22734] do_filp_open+0x1a1/0x280 [ 3223.720633][T22734] ? may_open_dev+0x100/0x100 [ 3223.725330][T22734] ? lock_downgrade+0x880/0x880 [ 3223.730203][T22734] ? kasan_check_read+0x11/0x20 [ 3223.735079][T22734] ? do_raw_spin_unlock+0x57/0x270 [ 3223.740206][T22734] ? _raw_spin_unlock+0x2d/0x50 [ 3223.745072][T22734] ? __alloc_fd+0x430/0x530 [ 3223.749597][T22734] do_sys_open+0x3fe/0x5d0 [ 3223.754125][T22734] ? filp_open+0x80/0x80 [ 3223.758379][T22734] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3223.764646][T22734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3223.770124][T22734] ? do_syscall_64+0x26/0x610 [ 3223.774823][T22734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.780912][T22734] ? do_syscall_64+0x26/0x610 [ 3223.785630][T22734] __x64_sys_open+0x7e/0xc0 [ 3223.790154][T22734] do_syscall_64+0x103/0x610 [ 3223.794767][T22734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.800698][T22734] RIP: 0033:0x4121a1 [ 3223.804618][T22734] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3223.824237][T22734] RSP: 002b:00007fec0a951a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3223.832658][T22734] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004121a1 [ 3223.840816][T22734] RDX: 00007fec0a951b0a RSI: 0000000000000002 RDI: 00007fec0a951b00 20:32:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) [ 3223.848803][T22734] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 3223.856779][T22734] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3223.864763][T22734] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3223.872777][T22741] CPU: 1 PID: 22741 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3223.881903][T22741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.891974][T22741] Call Trace: [ 3223.895286][T22741] dump_stack+0x172/0x1f0 [ 3223.899649][T22741] should_fail.cold+0xa/0x15 [ 3223.904446][T22741] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3223.910361][T22741] ? ___might_sleep+0x163/0x280 [ 3223.915322][T22741] should_fail_alloc_page+0x50/0x60 [ 3223.920552][T22741] __alloc_pages_nodemask+0x1a1/0x7e0 [ 3223.925948][T22741] ? __alloc_pages_slowpath+0x2900/0x2900 [ 3223.931695][T22741] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3223.937947][T22741] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3223.937970][T22741] alloc_pages_vma+0xdd/0x540 [ 3223.937990][T22741] shmem_alloc_page+0xc0/0x180 [ 3223.938011][T22741] ? shmem_swapin+0x1a0/0x1a0 [ 3223.958335][T22741] ? lock_downgrade+0x880/0x880 [ 3223.963202][T22741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3223.969480][T22741] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3223.975216][T22741] ? __vm_enough_memory+0x320/0x5a0 [ 3223.980454][T22741] shmem_alloc_and_acct_page+0x165/0x970 [ 3223.986117][T22741] shmem_getpage_gfp+0x43b/0x2500 [ 3223.991177][T22741] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 3223.997363][T22741] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3224.003216][T22741] ? current_time+0x6b/0x140 [ 3224.007824][T22741] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3224.013649][T22741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3224.020009][T22741] ? iov_iter_fault_in_readable+0x22c/0x450 [ 3224.025933][T22741] shmem_write_begin+0x105/0x1e0 [ 3224.026030][T22741] generic_perform_write+0x231/0x530 [ 3224.026058][T22741] ? page_endio+0x780/0x780 [ 3224.026073][T22741] ? current_time+0x140/0x140 [ 3224.026091][T22741] ? lock_acquire+0x16f/0x3f0 [ 3224.026110][T22741] __generic_file_write_iter+0x25e/0x630 [ 3224.026126][T22741] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3224.026147][T22741] generic_file_write_iter+0x360/0x610 [ 3224.026167][T22741] ? __generic_file_write_iter+0x630/0x630 [ 3224.026234][T22741] ? aa_path_link+0x460/0x460 [ 3224.026252][T22741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3224.026268][T22741] ? iov_iter_init+0xee/0x220 [ 3224.026288][T22741] new_sync_write+0x4c7/0x760 [ 3224.026305][T22741] ? default_llseek+0x2e0/0x2e0 [ 3224.026318][T22741] ? lock_downgrade+0x880/0x880 [ 3224.026357][T22741] __vfs_write+0xe4/0x110 [ 3224.026377][T22741] vfs_write+0x20c/0x580 [ 3224.026396][T22741] ksys_pwrite64+0x183/0x1c0 [ 3224.026436][T22741] ? __ia32_sys_pread64+0xf0/0xf0 [ 3224.061823][T22741] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3224.061840][T22741] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3224.061857][T22741] ? do_syscall_64+0x26/0x610 [ 3224.061879][T22741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3224.061891][T22741] ? do_syscall_64+0x26/0x610 [ 3224.061911][T22741] __x64_sys_pwrite64+0x97/0xf0 [ 3224.061929][T22741] do_syscall_64+0x103/0x610 [ 3224.061949][T22741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3224.061961][T22741] RIP: 0033:0x412207 [ 3224.061977][T22741] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3224.061985][T22741] RSP: 002b:00007f1425f41a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3224.061999][T22741] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000412207 [ 3224.062015][T22741] RDX: 000000000000000a RSI: 0000000020000140 RDI: 0000000000000006 [ 3224.166153][T22754] FAULT_INJECTION: forcing a failure. [ 3224.166153][T22754] name failslab, interval 1, probability 0, space 0, times 0 [ 3224.166836][T22741] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3224.166845][T22741] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 3224.166854][T22741] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000005 20:32:12 executing program 0: syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:12 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socket$inet(0x2, 0x800, 0x0) 20:32:12 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) 20:32:12 executing program 2 (fault-call:2 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3224.250413][T22754] CPU: 0 PID: 22754 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3224.259547][T22754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3224.269614][T22754] Call Trace: [ 3224.272948][T22754] dump_stack+0x172/0x1f0 [ 3224.277309][T22754] should_fail.cold+0xa/0x15 [ 3224.282588][T22754] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3224.288434][T22754] ? ___might_sleep+0x163/0x280 [ 3224.293302][T22754] __should_failslab+0x121/0x190 [ 3224.298251][T22754] should_failslab+0x9/0x14 [ 3224.302804][T22754] kmem_cache_alloc+0x2b2/0x6f0 [ 3224.307643][T22754] ? rcu_read_lock_sched_held+0x110/0x130 [ 3224.313353][T22754] ? kmem_cache_alloc+0x32e/0x6f0 [ 3224.318367][T22754] security_file_alloc+0x39/0x170 [ 3224.323382][T22754] __alloc_file+0xac/0x300 [ 3224.327803][T22754] alloc_empty_file+0x72/0x170 [ 3224.332565][T22754] alloc_file+0x5e/0x4d0 [ 3224.336810][T22754] alloc_file_pseudo+0x189/0x280 [ 3224.341761][T22754] ? alloc_file+0x4d0/0x4d0 [ 3224.346277][T22754] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3224.352536][T22754] __shmem_file_setup.part.0+0x108/0x2b0 [ 3224.358188][T22754] shmem_file_setup+0x66/0x90 [ 3224.362866][T22754] __x64_sys_memfd_create+0x2a2/0x470 [ 3224.368234][T22754] ? memfd_fcntl+0x1550/0x1550 [ 3224.373001][T22754] ? do_syscall_64+0x26/0x610 [ 3224.377711][T22754] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3224.382992][T22754] ? trace_hardirqs_on+0x67/0x230 [ 3224.388021][T22754] do_syscall_64+0x103/0x610 [ 3224.392627][T22754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3224.398504][T22754] RIP: 0033:0x458209 [ 3224.402388][T22754] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3224.421985][T22754] RSP: 002b:00007fb74f428a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3224.430383][T22754] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3224.438357][T22754] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3224.446314][T22754] RBP: 000000000073c0e0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3224.454275][T22754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb74f4296d4 [ 3224.462342][T22754] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 000000000000000c [ 3224.472263][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3224.478066][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3224.556469][T22771] FAULT_INJECTION: forcing a failure. [ 3224.556469][T22771] name failslab, interval 1, probability 0, space 0, times 0 [ 3224.610145][T22771] CPU: 0 PID: 22771 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3224.619318][T22771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3224.629402][T22771] Call Trace: [ 3224.632723][T22771] dump_stack+0x172/0x1f0 [ 3224.637078][T22771] should_fail.cold+0xa/0x15 [ 3224.641698][T22771] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3224.647534][T22771] ? ___might_sleep+0x163/0x280 [ 3224.652409][T22771] __should_failslab+0x121/0x190 [ 3224.657458][T22771] ? loop_info64_to_compat+0x6d0/0x6d0 [ 3224.662955][T22771] should_failslab+0x9/0x14 [ 3224.667476][T22771] kmem_cache_alloc_trace+0x2d1/0x760 [ 3224.672873][T22771] ? lockdep_init_map+0x1be/0x6d0 [ 3224.677910][T22771] ? loop_info64_to_compat+0x6d0/0x6d0 [ 3224.683451][T22771] __kthread_create_on_node+0xf2/0x460 [ 3224.688935][T22771] ? lock_acquire+0x16f/0x3f0 [ 3224.693622][T22771] ? kthread_parkme+0xb0/0xb0 [ 3224.698323][T22771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3224.704586][T22771] ? kasan_check_read+0x11/0x20 [ 3224.709455][T22771] ? mutex_trylock+0x1e0/0x1e0 [ 3224.714239][T22771] ? loop_info64_to_compat+0x6d0/0x6d0 [ 3224.719714][T22771] kthread_create_on_node+0xbb/0xf0 [ 3224.724935][T22771] ? __kthread_create_on_node+0x460/0x460 [ 3224.730674][T22771] ? lockdep_init_map+0x1be/0x6d0 [ 3224.735710][T22771] ? lockdep_init_map+0x1be/0x6d0 [ 3224.740758][T22771] lo_ioctl+0xc1b/0x2150 [ 3224.745014][T22771] ? lo_rw_aio+0x1120/0x1120 [ 3224.749683][T22771] blkdev_ioctl+0xee8/0x1c40 [ 3224.754291][T22771] ? blkpg_ioctl+0xa90/0xa90 [ 3224.758940][T22771] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3224.764775][T22771] ? __fget+0x35a/0x550 [ 3224.769048][T22771] block_ioctl+0xee/0x130 [ 3224.773393][T22771] ? blkdev_fallocate+0x410/0x410 [ 3224.778428][T22771] do_vfs_ioctl+0xd6e/0x1390 [ 3224.783037][T22771] ? ioctl_preallocate+0x210/0x210 [ 3224.788152][T22771] ? __fget+0x381/0x550 [ 3224.792321][T22771] ? ksys_dup3+0x3e0/0x3e0 [ 3224.796743][T22771] ? do_sys_open+0x31d/0x5d0 [ 3224.801345][T22771] ? tomoyo_file_ioctl+0x23/0x30 [ 3224.806290][T22771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3224.812534][T22771] ? security_file_ioctl+0x93/0xc0 [ 3224.817660][T22771] ksys_ioctl+0xab/0xd0 [ 3224.821830][T22771] __x64_sys_ioctl+0x73/0xb0 [ 3224.826428][T22771] do_syscall_64+0x103/0x610 [ 3224.831036][T22771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3224.836951][T22771] RIP: 0033:0x458077 [ 3224.840854][T22771] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:32:13 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='team0\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x51, "0b751f2edafeaa8c5a8ca78930e7c044d4714f82f5e8eeebd286eb4e6d76d9746f6efe8bd6bd3230877b4e363f30a660c2d0a684ec8989b4ded91be3b9d45273bd0ceedb6a189f139902440d4d7e3ec520"}, &(0x7f0000000100)=0x59) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={r3, 0x41, "c8a3e795c2c7dbf23e3085b3ceb4d48d7ebb9a5b40c3d7145ad22d735729bcae5ddb64ec4a1b1c6f7be54dbb27a09cfb3a027bfa51b91ee300e482fcf7c955d043"}, &(0x7f0000000280)=0x49) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x400000, 0x0) bind$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) [ 3224.860474][T22771] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3224.868902][T22771] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458077 [ 3224.876888][T22771] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 3224.884873][T22771] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 3224.892850][T22771] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 3224.900841][T22771] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 [ 3224.919457][T22741] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 20:32:13 executing program 4 (fault-call:12 fault-nth:5): ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:13 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40a01, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x10, 0x1a00) iopl(0x9) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) chdir(&(0x7f00000000c0)='./file0\x00') 20:32:13 executing program 2 (fault-call:2 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3224.995623][T22784] Unknown ioctl -2147191718 [ 3225.009257][T22785] Unknown ioctl -2147191718 20:32:13 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:13 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x04\xef\xff\xc0}.\xcb\x00\x00\x00\a\xff\xff\xfa', 0x2000ff}) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) 20:32:13 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) move_pages(r1, 0x2, &(0x7f0000000040)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil], &(0x7f0000000080)=[0x4], &(0x7f00000000c0), 0x6) [ 3225.180150][T22793] FAULT_INJECTION: forcing a failure. [ 3225.180150][T22793] name failslab, interval 1, probability 0, space 0, times 0 [ 3225.193251][T22793] CPU: 0 PID: 22793 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3225.202362][T22793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3225.212413][T22793] Call Trace: [ 3225.212439][T22793] dump_stack+0x172/0x1f0 [ 3225.212461][T22793] should_fail.cold+0xa/0x15 [ 3225.212479][T22793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3225.212498][T22793] ? ___might_sleep+0x163/0x280 [ 3225.212523][T22793] __should_failslab+0x121/0x190 [ 3225.240264][T22793] should_failslab+0x9/0x14 [ 3225.244768][T22793] kmem_cache_alloc+0x2b2/0x6f0 [ 3225.244786][T22793] ? rcu_read_lock_sched_held+0x110/0x130 [ 3225.244801][T22793] ? kmem_cache_alloc+0x32e/0x6f0 [ 3225.244822][T22793] security_file_alloc+0x39/0x170 [ 3225.244844][T22793] __alloc_file+0xac/0x300 [ 3225.269871][T22793] alloc_empty_file+0x72/0x170 [ 3225.274662][T22793] path_openat+0xef/0x46e0 [ 3225.279098][T22793] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3225.284913][T22793] ? kasan_slab_alloc+0xf/0x20 [ 3225.289708][T22793] ? kmem_cache_alloc+0x11a/0x6f0 [ 3225.294717][T22793] ? getname_flags+0xd6/0x5b0 [ 3225.299377][T22793] ? getname+0x1a/0x20 [ 3225.303431][T22793] ? do_sys_open+0x2c9/0x5d0 [ 3225.308022][T22793] ? __x64_sys_open+0x7e/0xc0 [ 3225.312698][T22793] ? do_syscall_64+0x103/0x610 [ 3225.317479][T22793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.323567][T22793] ? __lock_acquire+0x548/0x3fb0 [ 3225.328531][T22793] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3225.333909][T22793] ? __alloc_fd+0x430/0x530 [ 3225.338401][T22793] do_filp_open+0x1a1/0x280 [ 3225.342889][T22793] ? may_open_dev+0x100/0x100 [ 3225.347553][T22793] ? lock_downgrade+0x880/0x880 [ 3225.352405][T22793] ? kasan_check_read+0x11/0x20 [ 3225.357274][T22793] ? do_raw_spin_unlock+0x57/0x270 [ 3225.362407][T22793] ? _raw_spin_unlock+0x2d/0x50 [ 3225.367249][T22793] ? __alloc_fd+0x430/0x530 [ 3225.371748][T22793] do_sys_open+0x3fe/0x5d0 [ 3225.376163][T22793] ? filp_open+0x80/0x80 [ 3225.380397][T22793] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3225.386632][T22793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3225.392073][T22793] ? do_syscall_64+0x26/0x610 [ 3225.396735][T22793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.402782][T22793] ? do_syscall_64+0x26/0x610 [ 3225.407455][T22793] __x64_sys_open+0x7e/0xc0 [ 3225.411972][T22793] do_syscall_64+0x103/0x610 [ 3225.416567][T22793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.422446][T22793] RIP: 0033:0x4121a1 [ 3225.426334][T22793] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3225.445952][T22793] RSP: 002b:00007fec0a951a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3225.454369][T22793] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004121a1 [ 3225.462337][T22793] RDX: 00007fec0a951b0a RSI: 0000000000000002 RDI: 00007fec0a951b00 [ 3225.470288][T22793] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 20:32:14 executing program 2 (fault-call:2 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3225.478242][T22793] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 3225.486192][T22793] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 20:32:14 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) 20:32:14 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0xffffffffffffff38) [ 3225.689144][T22815] FAULT_INJECTION: forcing a failure. [ 3225.689144][T22815] name failslab, interval 1, probability 0, space 0, times 0 [ 3225.702064][T22815] CPU: 1 PID: 22815 Comm: syz-executor.2 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3225.711195][T22815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3225.721263][T22815] Call Trace: [ 3225.724587][T22815] dump_stack+0x172/0x1f0 [ 3225.728968][T22815] should_fail.cold+0xa/0x15 [ 3225.733599][T22815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3225.739461][T22815] ? ___might_sleep+0x163/0x280 [ 3225.744348][T22815] __should_failslab+0x121/0x190 [ 3225.749318][T22815] should_failslab+0x9/0x14 [ 3225.753843][T22815] kmem_cache_alloc+0x2b2/0x6f0 [ 3225.758716][T22815] ? __schedule+0x1387/0x1cc0 [ 3225.763512][T22815] __kernfs_new_node+0xf0/0x6d0 [ 3225.768383][T22815] ? _raw_spin_unlock_irq+0x28/0x90 [ 3225.773603][T22815] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 3225.779095][T22815] ? kasan_check_read+0x11/0x20 [ 3225.783971][T22815] ? _raw_spin_unlock_irq+0x5e/0x90 [ 3225.789188][T22815] ? __schedule+0x1387/0x1cc0 [ 3225.793897][T22815] ? __lock_acquire+0x548/0x3fb0 [ 3225.798861][T22815] kernfs_new_node+0x96/0x120 [ 3225.803561][T22815] kernfs_create_dir_ns+0x52/0x160 [ 3225.808710][T22815] internal_create_group+0x7f8/0xc40 [ 3225.814014][T22815] ? bd_set_size+0x89/0xb0 [ 3225.818466][T22815] ? remove_files.isra.0+0x190/0x190 [ 3225.823783][T22815] sysfs_create_group+0x20/0x30 [ 3225.828665][T22815] lo_ioctl+0x10af/0x2150 [ 3225.833019][T22815] ? lo_rw_aio+0x1120/0x1120 20:32:14 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 3225.837637][T22815] blkdev_ioctl+0xee8/0x1c40 [ 3225.842248][T22815] ? blkpg_ioctl+0xa90/0xa90 [ 3225.846855][T22815] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3225.852691][T22815] ? __fget+0x35a/0x550 [ 3225.856866][T22815] block_ioctl+0xee/0x130 [ 3225.861212][T22815] ? blkdev_fallocate+0x410/0x410 [ 3225.866253][T22815] do_vfs_ioctl+0xd6e/0x1390 [ 3225.870866][T22815] ? ioctl_preallocate+0x210/0x210 [ 3225.875996][T22815] ? __fget+0x381/0x550 [ 3225.880198][T22815] ? ksys_dup3+0x3e0/0x3e0 [ 3225.884647][T22815] ? do_sys_open+0x31d/0x5d0 [ 3225.889259][T22815] ? tomoyo_file_ioctl+0x23/0x30 [ 3225.894220][T22815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3225.900487][T22815] ? security_file_ioctl+0x93/0xc0 [ 3225.905636][T22815] ksys_ioctl+0xab/0xd0 [ 3225.909814][T22815] __x64_sys_ioctl+0x73/0xb0 [ 3225.914418][T22815] do_syscall_64+0x103/0x610 [ 3225.919037][T22815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.925120][T22815] RIP: 0033:0x458077 [ 3225.929033][T22815] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3225.948654][T22815] RSP: 002b:00007fec0a951a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3225.957086][T22815] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458077 [ 3225.965077][T22815] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 3225.973072][T22815] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 3225.981065][T22815] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 3225.989222][T22815] R13: 00000000004c6a7a R14: 00000000004dc070 R15: 0000000000000004 20:32:14 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0)=r2) [ 3226.079060][T22812] BFS-fs: bfs_fill_super(): loop1 is unclean, continuing [ 3226.088391][T22815] hfs: can't find a HFS filesystem on dev loop2 [ 3226.095794][T22817] FAULT_INJECTION: forcing a failure. [ 3226.095794][T22817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3226.141751][T22817] CPU: 0 PID: 22817 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3226.150952][T22817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3226.161025][T22817] Call Trace: [ 3226.164334][T22817] dump_stack+0x172/0x1f0 [ 3226.168686][T22817] should_fail.cold+0xa/0x15 [ 3226.173813][T22817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3226.179654][T22817] ? ___might_sleep+0x163/0x280 [ 3226.184533][T22817] should_fail_alloc_page+0x50/0x60 [ 3226.189739][T22817] __alloc_pages_nodemask+0x1a1/0x7e0 [ 3226.195129][T22817] ? __alloc_pages_slowpath+0x2900/0x2900 [ 3226.200869][T22817] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3226.207125][T22817] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3226.213384][T22817] alloc_pages_vma+0xdd/0x540 [ 3226.218075][T22817] shmem_alloc_page+0xc0/0x180 [ 3226.222944][T22817] ? shmem_swapin+0x1a0/0x1a0 [ 3226.227646][T22817] ? lock_downgrade+0x880/0x880 [ 3226.232504][T22817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3226.238786][T22817] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3226.244522][T22817] ? __vm_enough_memory+0x320/0x5a0 [ 3226.249832][T22817] shmem_alloc_and_acct_page+0x165/0x970 [ 3226.255496][T22817] shmem_getpage_gfp+0x43b/0x2500 [ 3226.260553][T22817] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 3226.266720][T22817] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3226.272637][T22817] ? current_time+0x6b/0x140 [ 3226.277237][T22817] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3226.283749][T22817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3226.290021][T22817] ? iov_iter_fault_in_readable+0x22c/0x450 [ 3226.295943][T22817] shmem_write_begin+0x105/0x1e0 [ 3226.300902][T22817] generic_perform_write+0x231/0x530 [ 3226.306211][T22817] ? page_endio+0x780/0x780 [ 3226.310719][T22817] ? current_time+0x140/0x140 [ 3226.315393][T22817] ? lock_acquire+0x16f/0x3f0 [ 3226.320060][T22817] __generic_file_write_iter+0x25e/0x630 [ 3226.325696][T22817] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3226.331435][T22817] generic_file_write_iter+0x360/0x610 [ 3226.336905][T22817] ? __generic_file_write_iter+0x630/0x630 [ 3226.342706][T22817] ? aa_path_link+0x460/0x460 [ 3226.347372][T22817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3226.353729][T22817] ? iov_iter_init+0xee/0x220 [ 3226.358404][T22817] new_sync_write+0x4c7/0x760 [ 3226.363079][T22817] ? default_llseek+0x2e0/0x2e0 [ 3226.367959][T22817] ? lock_downgrade+0x880/0x880 [ 3226.372840][T22817] __vfs_write+0xe4/0x110 [ 3226.377193][T22817] vfs_write+0x20c/0x580 [ 3226.381433][T22817] ksys_pwrite64+0x183/0x1c0 [ 3226.386034][T22817] ? __ia32_sys_pread64+0xf0/0xf0 [ 3226.391051][T22817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3226.396514][T22817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3226.401977][T22817] ? do_syscall_64+0x26/0x610 [ 3226.406668][T22817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3226.412741][T22817] ? do_syscall_64+0x26/0x610 [ 3226.417430][T22817] __x64_sys_pwrite64+0x97/0xf0 [ 3226.422303][T22817] do_syscall_64+0x103/0x610 [ 3226.426907][T22817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3226.432815][T22817] RIP: 0033:0x412207 [ 3226.436698][T22817] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3226.456316][T22817] RSP: 002b:00007fb74f46aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3226.464723][T22817] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000412207 [ 3226.472698][T22817] RDX: 000000000000000a RSI: 0000000020000140 RDI: 0000000000000007 [ 3226.480663][T22817] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 20:32:15 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 3226.488643][T22817] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000007 [ 3226.496623][T22817] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000006 20:32:15 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:15 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000", 0x9}], 0x0, 0x0) 20:32:15 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='\nfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:15 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:15 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_rr_get_interval(r0, &(0x7f0000000040)) [ 3226.851689][T22860] hfs: can't find a HFS filesystem on dev loop2 [ 3226.984081][T22861] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing 20:32:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='\nfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:15 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x1a1) 20:32:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000080)=0x364) 20:32:15 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='\xebfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:15 executing program 3: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$setstatus(r0, 0x4, 0x4c03) 20:32:15 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:15 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='\tfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:15 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) read(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r2, 0x128, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3f, 0x3ff, 0x2]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 20:32:16 executing program 3: socketpair(0x1, 0x80001, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f0000000000)) 20:32:16 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b\ns\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:16 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400000) setns(r1, 0x28000002) ioctl$KDSETMODE(r1, 0x4b3a, 0xffffffff) read(r0, 0x0, 0x0) 20:32:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002ac0)={0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r1 = dup(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@empty}}, 0x44) 20:32:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='%fs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:16 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='\nfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:16 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") vmsplice(r1, &(0x7f0000002d00)=[{&(0x7f0000002b00)="b1", 0x1}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x2ee) close(r1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00\x00\x00\x00\x10\x00', 0x10) sendmsg$inet_sctp(r1, &(0x7f00000026c0)={&(0x7f0000000100)=@in={0x2, 0x4e23, @multicast2}, 0x10, 0x0}, 0x8000) splice(r0, 0x0, r1, 0x0, 0x7, 0x0) 20:32:16 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @ipv4={[], [], @rand_addr=0x40}, 0x8}, {0xa, 0x4e20, 0x10001, @mcast2, 0x3}, r2, 0xff}}, 0x48) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x301400, 0x0) socket$netlink(0x10, 0x3, 0xf) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f00000001c0)={0x5, [0x400, 0x8, 0x3f, 0x3, 0x7]}) openat$cgroup_int(r3, &(0x7f0000000200)='io.bfq.weight\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:16 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b%s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:16 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e000000000010100f1ce19cd7cd322b3000001000000e00001010000"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r2, &(0x7f0000465f8e)=""/114, 0x47) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:16 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7ff, 0x18203) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='\x00', 0x1) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r1, 0x0, 0x0) 20:32:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='h\ns\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x28) 20:32:17 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x88, 0x80, {"0bc8b6dfc7d14cf005e43c66b33046f1557091715e599da799b0d049d5b35a4a65a3f70caa51d5caed2f4964718b5bac64bb8722f83bc256c43dbfad82e616564f476c4c867943897e92ce55c65dbcf87636164c694a6b7d7f948578ae9f2a823b290f7726fd2b02380a55d954c9"}}, {0x0, "754df3b51ea89578b8b74a272e8b9676e93c8eb77b766366bfc3da9f531c3c1899753928bcd43db47380536f4063c127b756c11f7318f164f078de02646214c6a707c13d355618937062329ce68dba5bdc40a77eee292ea4cff867c5a1b1b4cbf1bcd8ecfcb7e5a809a80b52dae5f3c84cbe1b9de1c3a4a9d37c1a6bdded1a901fd5aa38fda5f75a403883dd395edef0d0042a73a24162851146a5fdc7f667d375f88399f6a75917b4ade807a074b091bb6a51eb74fb431a190c242bc901cea876f40b039173379957d0d819babf6ce971bb5bbbb0055a9f65420800c48971ef51ed"}}, &(0x7f00000002c0)=""/91, 0x16c, 0x5b, 0x1}, 0x20) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000080)) 20:32:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x00~WMzU\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:?E\x96~\x0e\xe8Y\xbbn\x0f0x0, 0x0, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)={r3, 0xe3, "f548f4e27a39209565dae4b9908589862f43fe089d88353b54f77db807cd52d9a8487a2568ad50879cdb42eb87a54db28b204755932d56b36127d8c51adcf61c9689d9faabf66c33bae9ac94c4487f16a8279ed334704e5f10c364ee9a3fd8cd08842e13614e677711253c3b1e92daab49e59f558db0fb72f38daa8f626e3c7dba0f8783f81715e5a54bddadb105fd67aea8c493400edd1775809235ae63104f927ea28b97cbd384146439b284155c40ee3b23258349f0b2b971815827aca3c6d0bfa7aa49c7d8c359dc83fb0c7c86813c2a13be58786b544bed4ff2109986810c71de"}, &(0x7f00000001c0)=0xeb) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', r4, ':chain\x00'}) read(r0, 0x0, 0xfffffffffffffd2e) 20:32:18 executing program 3: 20:32:18 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/221, 0xdd}, {&(0x7f0000000140)=""/168, 0xa8}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000240)=""/51, 0x33}], 0x4, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x200, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x2a) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x290001, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000380)={r1, r2}) 20:32:18 executing program 3: 20:32:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='h/s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:18 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:18 executing program 0: r0 = socket$inet(0x2, 0x0, 0x4000000000000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e00000027f0000010100000001000000e0060001dfa835f7d853272e2305e3f6"], 0xfff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x7fe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={r2, 0x28, "697cc7998e3297b683951c5fb0cb18b050d6984c243c4874b28da494be4505cbbf76e092d6853147"}, &(0x7f0000000180)=0x30) r3 = dup3(r1, r1, 0x80000) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f00000000c0)={0x1, 0x100, 0x4, {0xfffe0, 0x9, 0xfffffffffffffffb}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00', 0xb444}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:18 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b\xebs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:18 executing program 3: 20:32:18 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) read(0xffffffffffffffff, 0x0, 0xfffffffffffffe3b) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x80, 0x0) r2 = getuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="8d181ffa6de55675fc440cfc87eac79e64d32f0ab577546337ab348930c5d628744ee3b59da45de20c10483ef3b8e124d7bcafa288cced5a45faadbc843dcfad54367564b22de904f225bfc5803ce1f6d9255d0dba94546dd777a9a41a4966cfcb77090fe5698c67283c1cfc949a5ab5528ef675baf4abc8b5e0720fe7dc0163b248125be3f45a1706845eecee790728c96f502a69117189cf4fb81d1fcb7b4377bd6e1923ff3f412da576a414782a0b73a0443bb12c", 0xb6, 0x8}], 0x1100480, &(0x7f0000000600)=ANY=[@ANYBLOB='spacG_cache=v1,space_cache,ssd_spread,noenospc_debug,datacow,compress=lzo,uid<', @ANYRESDEC=r2, @ANYBLOB=',fowner>', @ANYRESDEC=r3, @ANYBLOB="2c6f626a5f726f6c653d7d6367726f75702c736d61636b66737472616e736d7574653d2c6f626a5f757365723d2d2c7063723d30303030303030303030303030303030303031352c66736d616769633d3078303030303030303030303030303034652c00cbf58e7abb6098395a1c075fc6d589fb69c8715db89ffe8ddbb23b8d06c463987467fe8e5616538d686feb977fb1e37f67f96a608f4636c8f5b9380abe0cd867fdcedd1d823cf14217cf5e06bded68b75a6c8ad12cd957740803c9bc0d1082a6645f7c7d"]) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r4, 0x20, 0x0, 0xffffffffffffff9d, 0x3ff}, &(0x7f0000000200)=0x18) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 20:32:18 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b\ns\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:18 executing program 3: 20:32:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf\n\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:18 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0x1, &(0x7f00000000c0)=[0x4], &(0x7f0000000100)=[0x4, 0x3957], 0x20, 0x2, 0x80000000, &(0x7f0000000140)=[0x7, 0x7], &(0x7f0000000180)=[0x9, 0x651]}) 20:32:19 executing program 3: 20:32:19 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf\n\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:19 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f000001010000ed00000000e0000001"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:19 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x88000, 0x0) ioctl$sock_bt_hci(r1, 0x400448e2, &(0x7f0000000040)="91516774a5f4e6bf108978371806d716274895fb4565d26086a1bcffd19cd085cec04c24f76262b333927e79fe3e9fb926a422c197c10fe4df35636e8cfe39c9a0e4825f665b0204d160b7ac9217f3dee08193a2a9d22b2d0b59a2abd7ee97c289ace11228a028a69c5b65f22c77ec7fd20d1d153a2c6e931a27158c5be0df3e25b390270c83cae516d9ecb38dc2e64d72e314afa722afb3a57139a295ad") read(r0, 0x0, 0xfffffffffffffedb) 20:32:19 executing program 3: 20:32:19 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) 20:32:19 executing program 3: 20:32:19 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b%s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:19 executing program 3: 20:32:19 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf#\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf#\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:19 executing program 5: rmdir(&(0x7f0000000040)='./file0\x00') setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='osx./prod/thread-self/attr/exec\x00'], &(0x7f0000000100)='em1&)system\x00', 0xc, 0x1) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x203020, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_off='xino=off'}], [{@appraise='appraise'}, {@dont_appraise='dont_appraise'}]}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x81f49918fd6842) 20:32:19 executing program 3: 20:32:19 executing program 3: 20:32:20 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x450000004, 0x8000000000040) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:20 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r1, 0x0, 0x0) 20:32:20 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf%\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:20 executing program 3: 20:32:20 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b.s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf%\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:20 executing program 3: 20:32:20 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x5, 0x9, 0x1f, 0xff, 0x8}) read(r0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r2, 0x3}, &(0x7f0000000240)=0x8) fgetxattr(r1, &(0x7f0000000280)=@random={'btrfs.', '/proc/thread-self/attr/exec\x00'}, &(0x7f00000002c0)=""/158, 0x9e) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socket(0xb, 0x1, 0x8) 20:32:20 executing program 3: 20:32:20 executing program 3: 20:32:20 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf*\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:20 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) mkdirat$cgroup(r1, &(0x7f0000000100)='s\b%\xdf\xb3', 0x1ff) read(r0, 0x0, 0x0) getdents(r1, &(0x7f0000000040)=""/141, 0x8d) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x5a) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x322, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 20:32:21 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @broadcast, 0x1, 0x4, [@loopback, @remote, @loopback, @remote]}, 0x20) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:21 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b/s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:21 executing program 3: 20:32:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf*\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:21 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x400) read(r0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) 20:32:21 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf+\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:21 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x76747070b13c739, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000000c0)=""/29) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000080)=0x2) read(r0, 0x0, 0x0) 20:32:21 executing program 3: 20:32:21 executing program 3: 20:32:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf+\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:21 executing program 5: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00') r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:21 executing program 3: 20:32:21 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:21 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='b\xebs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:21 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf-\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:21 executing program 5: socketpair(0xa, 0x6, 0xbb, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0xfffffffffffffff8}, &(0x7f00000000c0)=0x2) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e23, 0x4000000000000, @empty, 0xffffffffffffff92}}}, 0x84) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r3, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'rose0\x00', 0x0}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000280)=0x8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@rand_addr="d519175ab060b43d0585e1a97c598aa2", 0x45, r4}) 20:32:21 executing program 3: 20:32:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf-\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:21 executing program 3: 20:32:22 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:22 executing program 3: 20:32:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf.\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:22 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf.\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:22 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xa) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xf) read(r0, 0x0, 0x0) 20:32:22 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x1f, r3, 0x1, 0x5, 0x6, @local}, 0x14) 20:32:22 executing program 3: 20:32:22 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x0) read(r0, 0x0, 0x0) 20:32:22 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf\n\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hf0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:22 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0xfffffe5b) 20:32:22 executing program 3: 20:32:22 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf0\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:23 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:23 executing program 3: 20:32:23 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') setsockopt$inet_int(r1, 0x0, 0x1e, &(0x7f0000000040)=0x62, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:23 executing program 3: 20:32:23 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r0) 20:32:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfX\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:23 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfX\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:23 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf#\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:23 executing program 3: 20:32:23 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000080)={0x5, 0x5, 0x1}) read(r0, 0x0, 0x0) 20:32:23 executing program 3: 20:32:23 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000080)={0x100000000001, 0x4}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r1, 0x0, 0xb7fff3d98bf3dd8d) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x101002, 0x0) 20:32:23 executing program 3: 20:32:23 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfc\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:24 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYRES64=r0], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) getcwd(&(0x7f0000000040)=""/13, 0xd) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'team_slave_1\x00', 0xff}) 20:32:24 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:24 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @empty}}) 20:32:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfc\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:24 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf%\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:24 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000080), &(0x7f00000000c0)) read(r0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x800, 0x301800) 20:32:24 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfd\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:24 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x101040) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000080)={0xa, 0x9, {0x53, 0x1, 0x200, {0x1, 0x2}, {0x80, 0x5}, @cond=[{0x200, 0x95, 0x7, 0x7, 0x0, 0x1ff}, {0x7, 0x8f, 0x257c26e9, 0x2, 0x6, 0x6}]}, {0x51, 0x9, 0x7fff, {0x40, 0x81}, {0x8, 0x1ff}, @ramp={0x88, 0xffff, {0x40, 0xc59b, 0xbe, 0x5}}}}) r2 = socket(0x10, 0x100000000000003, 0x0) write(r2, &(0x7f0000000080)="26000000130047f10701c1b00ef900000700000000ffffdf09efff0000000000006e35000000", 0x26) mmap(&(0x7f0000f95000/0x1000)=nil, 0x1000, 0x1, 0x32, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000f95fd7)={0x0, 0x0, 0x0, 0x0, 0x0, 0xdd}, 0x0) read(r0, 0x0, 0x0) 20:32:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfd\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3236.021974][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3236.027908][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:32:24 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfi\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:24 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf*\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:25 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) exit(0x2) 20:32:25 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @empty}}) 20:32:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000340)={0x0, @reserved}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x54, 0x400000) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r4 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x100, 0x0) r7 = dup3(r1, r1, 0x80000) sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, r3, 0xc20, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7fffffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x44}, 0x4001) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) read(r1, 0x0, 0x0) 20:32:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfi\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) 20:32:25 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:25 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfl\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:25 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x8}, 0x28, 0x1) getitimer(0x0, &(0x7f00000000c0)) ioctl$FICLONE(r0, 0x40049409, r0) 20:32:25 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf+\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:25 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000080)=""/75, &(0x7f0000000100)=0x4b) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r1, 0x0, 0x0) 20:32:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfl\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:25 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:26 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) setsockopt(r0, 0xfb2, 0x2, &(0x7f0000000180)="7b3b2c653084cd76922135494d5406d813bde4eb306c0b806c1fe24b5b64451fc816813e42a56e6d163ade187e9bcae329150d472cc793cd1c55b78141540b58aac6420797ac7bda1e3db819be0eeeac6d2ee0450dec250592c8301a2bebc741dba0da7cd254683cea4c5a3150477021eb8bd0cbdc16f296f951507b7517145e9460a1fd85bfad112f3a76593d17db69a4e743757442d34e538061aeb6610cfd9cc8a46d1d7e7595463be4e31f4accd65cb16b981f64196eb4f6f1f03b89c749a8f4d9001c1bb4ccb978a240dbee2e734f59", 0xd2) 20:32:26 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfo\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:26 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000bc0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) 20:32:26 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x24c) 20:32:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfo\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:26 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf-\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:26 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000080)) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x0, 0x1}) read(r1, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000100)={r0, 0x9}) 20:32:26 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c20000000180c20000000800450000240000000000009078ac1414aae0000002000000000401900300abf20a006b797e"], 0x0) 20:32:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfp\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:26 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfp\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:26 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)={0x4}) read(r0, 0x0, 0x0) 20:32:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) close(r0) 20:32:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e23, @multicast2}}, 0x0, 0xbf}, 0x90) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:27 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf.\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$cont(0x7, r1, 0x6, 0x4) read(r0, 0x0, 0xffffff6f) 20:32:27 executing program 3 (fault-call:6 fault-nth:0): ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfu\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:27 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfu\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 3238.824082][T25824] FAULT_INJECTION: forcing a failure. [ 3238.824082][T25824] name failslab, interval 1, probability 0, space 0, times 0 [ 3238.864108][T25824] CPU: 0 PID: 25824 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3238.873279][T25824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3238.883355][T25824] Call Trace: [ 3238.886673][T25824] dump_stack+0x172/0x1f0 [ 3238.891021][T25824] should_fail.cold+0xa/0x15 [ 3238.895633][T25824] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3238.901454][T25824] ? ___might_sleep+0x163/0x280 [ 3238.906319][T25824] __should_failslab+0x121/0x190 [ 3238.911279][T25824] should_failslab+0x9/0x14 [ 3238.915794][T25824] __kmalloc+0x2dc/0x740 [ 3238.920049][T25824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3238.926309][T25824] ? fput_many+0x12c/0x1a0 [ 3238.930778][T25824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3238.937046][T25824] ? strnlen_user+0x1f0/0x280 [ 3238.941744][T25824] ? __x64_sys_memfd_create+0x13c/0x470 [ 3238.947317][T25824] __x64_sys_memfd_create+0x13c/0x470 [ 3238.952803][T25824] ? memfd_fcntl+0x1550/0x1550 [ 3238.957583][T25824] ? do_syscall_64+0x26/0x610 [ 3238.962290][T25824] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3238.967592][T25824] ? trace_hardirqs_on+0x67/0x230 [ 3238.972660][T25824] do_syscall_64+0x103/0x610 [ 3238.977291][T25824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3238.983188][T25824] RIP: 0033:0x458209 [ 3238.987099][T25824] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3239.006720][T25824] RSP: 002b:00007fd9147c9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3239.015155][T25824] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3239.023132][T25824] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3239.031098][T25824] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3239.039061][T25824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9147ca6d4 [ 3239.047894][T25824] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000004 20:32:27 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:27 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfx\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e00000027f0000010100000001000000e0000001fb7f6c2272370c2e297cccc2e40ed997de1647c6dcb2d6b7b0e67f6b0816a7818bafcf2aad12bc19c9c9054b94e5ee6c906812236052700536bff47c3f193aba7eee12589e6b9177038135f3559c02054de08e469c00b7bff8c3a0da20aebd0f4804d4ddb32bc88a10457d99aea94606035799b7b8b6743b6ffb536482"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:27 executing program 3 (fault-call:6 fault-nth:1): ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x80f2, 0x0) ioctl$KDENABIO(r1, 0x4b36) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x88, 0x2}, {0x100000001, 0x401}, {0x2, 0x7}, {0x7fff, 0x44}]}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x159c00) 20:32:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfx\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:28 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf0\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3239.539728][T25980] FAULT_INJECTION: forcing a failure. [ 3239.539728][T25980] name failslab, interval 1, probability 0, space 0, times 0 20:32:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 3239.614753][T25980] CPU: 1 PID: 25980 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3239.623917][T25980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3239.634021][T25980] Call Trace: [ 3239.637381][T25980] dump_stack+0x172/0x1f0 [ 3239.641759][T25980] should_fail.cold+0xa/0x15 [ 3239.646384][T25980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3239.652256][T25980] ? ___might_sleep+0x163/0x280 [ 3239.657140][T25980] __should_failslab+0x121/0x190 [ 3239.662094][T25980] ? shmem_destroy_callback+0xc0/0xc0 [ 3239.667474][T25980] should_failslab+0x9/0x14 [ 3239.671982][T25980] kmem_cache_alloc+0x2b2/0x6f0 [ 3239.676848][T25980] ? __alloc_fd+0x430/0x530 [ 3239.681368][T25980] ? shmem_destroy_callback+0xc0/0xc0 [ 3239.686755][T25980] shmem_alloc_inode+0x1c/0x50 [ 3239.691527][T25980] alloc_inode+0x66/0x190 [ 3239.695872][T25980] new_inode_pseudo+0x19/0xf0 [ 3239.700558][T25980] new_inode+0x1f/0x40 [ 3239.704641][T25980] shmem_get_inode+0x84/0x780 [ 3239.709332][T25980] __shmem_file_setup.part.0+0x7e/0x2b0 [ 3239.714940][T25980] shmem_file_setup+0x66/0x90 [ 3239.719637][T25980] __x64_sys_memfd_create+0x2a2/0x470 [ 3239.725019][T25980] ? memfd_fcntl+0x1550/0x1550 [ 3239.729795][T25980] ? do_syscall_64+0x26/0x610 [ 3239.734488][T25980] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3239.739789][T25980] ? trace_hardirqs_on+0x67/0x230 [ 3239.744837][T25980] do_syscall_64+0x103/0x610 [ 3239.749473][T25980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3239.755381][T25980] RIP: 0033:0x458209 [ 3239.759296][T25980] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3239.778915][T25980] RSP: 002b:00007fd914787a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3239.787399][T25980] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3239.795409][T25980] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3239.803500][T25980] RBP: 000000000073c040 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3239.811505][T25980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9147886d4 [ 3239.819470][T25980] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000008 20:32:28 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf\xeb\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:28 executing program 3 (fault-call:6 fault-nth:2): ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') 20:32:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x02', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3240.213326][T26117] FAULT_INJECTION: forcing a failure. [ 3240.213326][T26117] name failslab, interval 1, probability 0, space 0, times 0 [ 3240.229196][T26117] CPU: 1 PID: 26117 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3240.238336][T26117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3240.248417][T26117] Call Trace: [ 3240.251749][T26117] dump_stack+0x172/0x1f0 [ 3240.256118][T26117] should_fail.cold+0xa/0x15 [ 3240.260767][T26117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3240.266602][T26117] ? ___might_sleep+0x163/0x280 [ 3240.271478][T26117] __should_failslab+0x121/0x190 [ 3240.276439][T26117] should_failslab+0x9/0x14 [ 3240.282484][T26117] kmem_cache_alloc+0x2b2/0x6f0 [ 3240.287350][T26117] ? current_time+0x6b/0x140 [ 3240.291960][T26117] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3240.297785][T26117] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3240.303093][T26117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3240.309346][T26117] ? timespec64_trunc+0xf0/0x180 [ 3240.314386][T26117] __d_alloc+0x2e/0x8c0 [ 3240.318569][T26117] d_alloc_pseudo+0x1e/0x30 [ 3240.323101][T26117] alloc_file_pseudo+0xe2/0x280 [ 3240.327980][T26117] ? alloc_file+0x4d0/0x4d0 [ 3240.332503][T26117] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3240.338768][T26117] __shmem_file_setup.part.0+0x108/0x2b0 [ 3240.344434][T26117] shmem_file_setup+0x66/0x90 [ 3240.349150][T26117] __x64_sys_memfd_create+0x2a2/0x470 [ 3240.354545][T26117] ? memfd_fcntl+0x1550/0x1550 [ 3240.359322][T26117] ? do_syscall_64+0x26/0x610 20:32:28 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x4, &(0x7f0000000380)=[{&(0x7f00000001c0)="b5a8194ab3fadb015747bea9e732bd30752aa2d0c44128086deb135f57e6b71468fdcfd38317cddd4c9f979dda1c60b35f15efc6f8bcf1cfec47aaca926ee817e37d4ff7387d49ea410c36ba1a78892238070a24b67f41a9a3db190ac47a77090c372c18a5eb3585f3ddd85f861320599936a14b2496174a73292f1864e1e4804a4158c5b2d4a6d78c43752a812aa25a9345036619827fd169cb4e37dffd48ef6acdc7dc62841edac6b1c58ecf91f23819f9d927227e3a2eff44cfa6963198c0c9375a6e810c467411053c73d0a176f065f5cf", 0xd3, 0x5}, {&(0x7f00000002c0)="6c8a5942dc9803fffb959d", 0xb, 0x5}, {&(0x7f0000000300)="72efd3edbb94eb286c75dce838fe1f0183e7a1a05e31ed09f88d7e0be0747255a636984d87826292ecf3d5ca30cb", 0x2e, 0x789}, {&(0x7f0000000340)="d7e818db1b4bdd54821b4a0ca28e91b5", 0x10, 0x32}], 0x20, &(0x7f0000000400)={[{@nobh='nobh'}], [{@dont_appraise='dont_appraise'}]}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="f7000002810000010100092001000000e0000081"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000440)='/dev/dmmidi#\x00', 0x9, 0x2) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge_slave_1\x00', 0xffffffffffdffffc}) syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:28 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000000c0)={'ip_vti0\x00', 0x7, 0x1}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x9, 0x3, 0x20, 0x7, 0x0, 0x47, 0xc0028, 0x2, 0xffff, 0x3, 0x3f, 0x80, 0x4, 0x4, 0xc0, 0x10000, 0x1, 0x9, 0xe7, 0x2, 0x2, 0x4, 0x5, 0x3ff, 0x6, 0x9, 0x2, 0x0, 0x849, 0x3, 0x7fffffff, 0x599, 0x93, 0x2, 0x63, 0x40, 0x0, 0xfffffffffffffffd, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x804, 0x9, 0x4, 0x5, 0x5af3, 0x7, 0x7}, r3, 0xc, r2, 0x3) openat$cgroup_ro(r2, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) r4 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x800000007000) shmdt(r4) read(r0, 0x0, 0x0) [ 3240.364015][T26117] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3240.369325][T26117] ? trace_hardirqs_on+0x67/0x230 [ 3240.374378][T26117] do_syscall_64+0x103/0x610 [ 3240.379000][T26117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.384905][T26117] RIP: 0033:0x458209 [ 3240.388812][T26117] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3240.408460][T26117] RSP: 002b:00007fd9147c9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3240.416894][T26117] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3240.424887][T26117] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3240.432880][T26117] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3240.441003][T26117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9147ca6d4 [ 3240.448993][T26117] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000004 20:32:29 executing program 3 (fault-call:6 fault-nth:3): ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:29 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfX\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) socketpair(0x2, 0x80807, 0x7, &(0x7f0000000040)) [ 3240.747302][T26163] FAULT_INJECTION: forcing a failure. [ 3240.747302][T26163] name failslab, interval 1, probability 0, space 0, times 0 [ 3240.771319][T26163] CPU: 1 PID: 26163 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3240.780488][T26163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3240.780509][T26163] Call Trace: [ 3240.793931][T26163] dump_stack+0x172/0x1f0 [ 3240.798283][T26163] should_fail.cold+0xa/0x15 [ 3240.802907][T26163] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3240.808735][T26163] ? ___might_sleep+0x163/0x280 [ 3240.813612][T26163] __should_failslab+0x121/0x190 [ 3240.813629][T26163] should_failslab+0x9/0x14 [ 3240.813644][T26163] kmem_cache_alloc+0x2b2/0x6f0 [ 3240.813667][T26163] __alloc_file+0x27/0x300 [ 3240.813684][T26163] alloc_empty_file+0x72/0x170 [ 3240.813700][T26163] alloc_file+0x5e/0x4d0 [ 3240.813721][T26163] alloc_file_pseudo+0x189/0x280 [ 3240.813739][T26163] ? alloc_file+0x4d0/0x4d0 [ 3240.813756][T26163] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3240.813782][T26163] __shmem_file_setup.part.0+0x108/0x2b0 [ 3240.862745][T26163] shmem_file_setup+0x66/0x90 [ 3240.867453][T26163] __x64_sys_memfd_create+0x2a2/0x470 [ 3240.872841][T26163] ? memfd_fcntl+0x1550/0x1550 [ 3240.877621][T26163] ? do_syscall_64+0x26/0x610 [ 3240.882311][T26163] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3240.887621][T26163] ? trace_hardirqs_on+0x67/0x230 [ 3240.892669][T26163] do_syscall_64+0x103/0x610 [ 3240.897278][T26163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.903177][T26163] RIP: 0033:0x458209 [ 3240.907084][T26163] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3240.908992][T26149] bridge0: port 2(bridge_slave_1) entered disabled state [ 3240.926703][T26163] RSP: 002b:00007fd914787a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3240.926720][T26163] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3240.926727][T26163] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3240.926734][T26163] RBP: 000000000073c040 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3240.926741][T26163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9147886d4 [ 3240.926748][T26163] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000008 20:32:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x481) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/239) read(r0, 0x0, 0x0) [ 3241.066214][T26160] print_req_error: I/O error, dev loop0, sector 264064 flags 80700 [ 3241.123950][ T2489] print_req_error: I/O error, dev loop0, sector 264064 flags 0 [ 3241.132509][ T2489] Buffer I/O error on dev loop0, logical block 33008, async page read 20:32:29 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x02', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:29 executing program 3 (fault-call:6 fault-nth:4): ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:29 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x67}}, &(0x7f0000000080)='M[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W>\x86E\x10*\xe7{\x15\xba)%\xdc@\x8f*\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe70BL\x7f=\xc08\xc2\xb4\x85\xfc?8\xec\x93\a[M-\xcc\b\xad\xceP9\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\x1c\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\x87\xbd\xfe\x1b\x1b\xae\xe7\xe4\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde4F+\x85\xb4\x97', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:29 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x208, 0x40000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) 20:32:30 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfc\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3241.445729][T26273] FAULT_INJECTION: forcing a failure. [ 3241.445729][T26273] name failslab, interval 1, probability 0, space 0, times 0 [ 3241.482113][T26273] CPU: 0 PID: 26273 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3241.491277][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3241.501340][T26273] Call Trace: [ 3241.504653][T26273] dump_stack+0x172/0x1f0 [ 3241.509006][T26273] should_fail.cold+0xa/0x15 [ 3241.513608][T26273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3241.519442][T26273] ? ___might_sleep+0x163/0x280 [ 3241.524313][T26273] __should_failslab+0x121/0x190 [ 3241.529263][T26273] should_failslab+0x9/0x14 [ 3241.533772][T26273] kmem_cache_alloc+0x2b2/0x6f0 [ 3241.538635][T26273] ? rcu_read_lock_sched_held+0x110/0x130 [ 3241.544369][T26273] ? kmem_cache_alloc+0x32e/0x6f0 [ 3241.549407][T26273] security_file_alloc+0x39/0x170 [ 3241.554447][T26273] __alloc_file+0xac/0x300 [ 3241.558881][T26273] alloc_empty_file+0x72/0x170 [ 3241.563657][T26273] alloc_file+0x5e/0x4d0 [ 3241.567910][T26273] alloc_file_pseudo+0x189/0x280 [ 3241.572861][T26273] ? alloc_file+0x4d0/0x4d0 [ 3241.577378][T26273] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 3241.583641][T26273] __shmem_file_setup.part.0+0x108/0x2b0 [ 3241.589285][T26273] shmem_file_setup+0x66/0x90 [ 3241.593976][T26273] __x64_sys_memfd_create+0x2a2/0x470 [ 3241.599354][T26273] ? memfd_fcntl+0x1550/0x1550 [ 3241.604130][T26273] ? do_syscall_64+0x26/0x610 [ 3241.608820][T26273] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3241.614111][T26273] ? trace_hardirqs_on+0x67/0x230 [ 3241.619198][T26273] do_syscall_64+0x103/0x610 [ 3241.623805][T26273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3241.629703][T26273] RIP: 0033:0x458209 [ 3241.633602][T26273] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3241.653224][T26273] RSP: 002b:00007fd9147c9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3241.661672][T26273] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458209 [ 3241.669655][T26273] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd167 [ 3241.677642][T26273] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 3241.685623][T26273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9147ca6d4 20:32:30 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) [ 3241.693598][T26273] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000003 20:32:30 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000100)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) sched_yield() 20:32:30 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x03', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x04', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0xffffffffffffffc8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101200, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r1, &(0x7f0000000080)=""/185, 0xb9, 0x0, &(0x7f0000000340)={0x11, 0xf5, r2, 0x1, 0x5, 0x6, @link_local}, 0x14) 20:32:30 executing program 3 (fault-call:6 fault-nth:5): ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:30 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfd\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:30 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x800) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x5) 20:32:31 executing program 0: r0 = socket$inet(0x2, 0x8000b, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f0400010100dfff00000000e0000001"], 0x14) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000100)={r0, 0x4}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x10\x00', 0xfffffffffffffffc}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) bind$isdn_base(r1, &(0x7f0000000140)={0x22, 0xfb2, 0x7, 0x16cd, 0x3}, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'r\x00', 0xfe}) [ 3242.432536][T26547] FAULT_INJECTION: forcing a failure. [ 3242.432536][T26547] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:32:31 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x04', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3242.540472][T26547] CPU: 1 PID: 26547 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3242.549634][T26547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3242.559706][T26547] Call Trace: [ 3242.563024][T26547] dump_stack+0x172/0x1f0 [ 3242.567387][T26547] should_fail.cold+0xa/0x15 [ 3242.572018][T26547] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3242.577853][T26547] ? ___might_sleep+0x163/0x280 [ 3242.582733][T26547] should_fail_alloc_page+0x50/0x60 [ 3242.587965][T26547] __alloc_pages_nodemask+0x1a1/0x7e0 [ 3242.593364][T26547] ? __alloc_pages_slowpath+0x2900/0x2900 [ 3242.599112][T26547] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3242.605363][T26547] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3242.611624][T26547] alloc_pages_vma+0xdd/0x540 [ 3242.616318][T26547] shmem_alloc_page+0xc0/0x180 [ 3242.621092][T26547] ? shmem_swapin+0x1a0/0x1a0 [ 3242.625864][T26547] ? lock_downgrade+0x880/0x880 [ 3242.630720][T26547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:32:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x05', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) [ 3242.636980][T26547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3242.642720][T26547] ? __vm_enough_memory+0x320/0x5a0 [ 3242.647938][T26547] shmem_alloc_and_acct_page+0x165/0x970 [ 3242.653595][T26547] shmem_getpage_gfp+0x43b/0x2500 [ 3242.658635][T26547] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 3242.664802][T26547] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3242.670620][T26547] ? current_time+0x6b/0x140 [ 3242.675214][T26547] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 3242.681025][T26547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3242.687260][T26547] ? iov_iter_fault_in_readable+0x22c/0x450 [ 3242.693163][T26547] shmem_write_begin+0x105/0x1e0 [ 3242.698108][T26547] generic_perform_write+0x231/0x530 [ 3242.703411][T26547] ? page_endio+0x780/0x780 [ 3242.707937][T26547] ? current_time+0x140/0x140 [ 3242.712633][T26547] ? lock_acquire+0x16f/0x3f0 [ 3242.717315][T26547] __generic_file_write_iter+0x25e/0x630 [ 3242.722945][T26547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3242.728678][T26547] generic_file_write_iter+0x360/0x610 [ 3242.734143][T26547] ? __generic_file_write_iter+0x630/0x630 [ 3242.739962][T26547] ? aa_path_link+0x460/0x460 [ 3242.744636][T26547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3242.750878][T26547] ? iov_iter_init+0xee/0x220 [ 3242.755559][T26547] new_sync_write+0x4c7/0x760 [ 3242.760237][T26547] ? default_llseek+0x2e0/0x2e0 [ 3242.765096][T26547] ? lock_downgrade+0x880/0x880 [ 3242.769989][T26547] __vfs_write+0xe4/0x110 [ 3242.774346][T26547] vfs_write+0x20c/0x580 [ 3242.778595][T26547] ksys_pwrite64+0x183/0x1c0 [ 3242.783192][T26547] ? __ia32_sys_pread64+0xf0/0xf0 [ 3242.788325][T26547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3242.793799][T26547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3242.799264][T26547] ? do_syscall_64+0x26/0x610 [ 3242.804302][T26547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3242.810409][T26547] ? do_syscall_64+0x26/0x610 [ 3242.815142][T26547] __x64_sys_pwrite64+0x97/0xf0 [ 3242.820005][T26547] do_syscall_64+0x103/0x610 [ 3242.824617][T26547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3242.830548][T26547] RIP: 0033:0x412207 [ 3242.834468][T26547] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3242.854178][T26547] RSP: 002b:00007fd914787a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3242.862607][T26547] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000412207 [ 3242.870699][T26547] RDX: 000000000000000a RSI: 0000000020000140 RDI: 0000000000000009 [ 3242.878668][T26547] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 20:32:31 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x3, 0xd5, [], 0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/213}, &(0x7f0000000300)=0x78) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x26, &(0x7f0000000740)={@multicast2, @loopback, r1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x105801, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000380)={0x18, 0x0, 0x2, {0x6}}, 0x18) write$binfmt_misc(r2, &(0x7f0000000780)=ANY=[@ANYRESHEX=r3, @ANYBLOB="a9ffe3ee6fbbb439d5cad69e4d488ded4df0186159d98d445fae1f6b1c01550097a8ead8019831918c437f2329d7f449e1bc20121b2ffca8be9471ecdc9c416042b455c6d946e63a00b91a37efe19e07a2054e8a6195681efb0f2de20adb3f757cbf59899495b32f1295901aae106654ec403c98d462886307cbb3bc43bbae2597971ac5188fd758f64a5071a346afc2ad2de255575cb2e3e86f95a4d42a327061577ba2976b292b876cccb2a14736ebf23f2e2aee91899e6acce9f69a6011f16a", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES64, @ANYBLOB="1d423c139447e655b62defb8592bfa566c7b791c22df509b78d0b13dc0938e37c233c5c1b138da08ccbcc576d638ae503dbdf11cd7764632e12271c376bc6b6ef103bed2c617c24173a7fa7172b88d1859a291e48747034705e9d4357727eaceea0847f2bd744f66b12c7354ff0abf627076abd6528488187f7d164a3ba65d59ca8818bef1ed909235e4b6e39dbd9a08977117a9d1f244", @ANYRES32, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYRESHEX=0x0, @ANYRES64=r3, @ANYPTR, @ANYPTR64, @ANYRES32], @ANYRES16=r3, @ANYRESHEX=0x0, @ANYPTR, @ANYRESHEX=0x0, @ANYRESHEX, @ANYRES64=r0]], 0xffffffffffffff13) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'team0\x00', 0xff}) [ 3242.886636][T26547] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000009 [ 3242.894614][T26547] R13: 00000000004c69d1 R14: 00000000004dbfb0 R15: 0000000000000008 [ 3243.056395][T26547] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 20:32:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:31 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000180)={[], 0x65, 0x80000001, 0x8b50, 0x0, 0x76, 0xd000, 0x6000, [], 0x5}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:31 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:31 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket(0x13, 0x7, 0x8000009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x1, 0x0, 0x1ff}, &(0x7f0000000100)=0x10) r3 = dup2(r0, r0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x20, 0xfffff80000000000, 0x0, 0x0, 0x2, 0x8, "a592b47b5856a910687231e5d21e79dc66aa8ea0188beab55134917dbea1d04eb676a9f52236715b428d2a63ba1177125973de4d63e3b8ada4884d854992c713", "4b2d84b0b3c46edd8b571e8fdc5a9dfc54485d602cdee160db49179f36118fb2426cf4037edd4c32b03237a50a0a72110a717098c2b1d13df800298ad9381882", "71253040bfc7deadc583c09dfb447b89c604ce8842f9c2ae3478cb2cca32d132", [0x80000001, 0xfffffffffffff9b9]}) read(r0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000240)={0x3, 0x0, [{0x4, 0x1, 0x0, 0x0, @sint={0xa8a, 0x7}}, {0x10000000, 0x2, 0x0, 0x0, @irqchip={0x3, 0x5}}, {0x3f, 0x7, 0x0, 0x0, @sint={0x7, 0x800080000000}}]}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x800, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SG_SET_DEBUG(r4, 0x227e, &(0x7f0000000180)=0x1) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r9 = accept4(r8, 0x0, 0x0, 0x80800) sendto(r7, &(0x7f0000000080), 0xfffffffffffffefc, 0x0, 0x0, 0x13) splice(r9, 0x0, r6, 0x0, 0x80000000, 0x0) ioctl$UDMABUF_CREATE(r4, 0x40187542, &(0x7f00000001c0)={r5, 0x0, 0x4000, 0xfffffffffffff000}) 20:32:32 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfi\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3243.532492][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:32:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:32 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x05', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3243.606452][T26645] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 20:32:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x06', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:32 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='\nfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:32 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x06', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:32 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfl\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\a', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:33 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfffffffffffffffa, 0x3b1702) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000080)={0x3f, 0x30454d54, 0x100000000, 0xfffffffffffffffe, 0x1, @stepwise={{0x7f, 0x1}, {0x100000001, 0x7}, {0x2, 0x7fff}}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x9, 0x7fff, 0x181e653d, 'queue0\x00', 0x1f}) read(r0, 0x0, 0x0) 20:32:33 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='\xebfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:33 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\a', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:33 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x12000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x2, 0x3, [0x2, 0x40, 0x7e00000]}, &(0x7f0000000180)=0xe) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x358, 0xa, [0x4, 0x1, 0x8000, 0xfffffffffffffc01, 0x101, 0x3, 0x9, 0x80, 0x8297, 0x5]}, &(0x7f0000000200)=0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'veth1\x00', 0x800}) 20:32:33 executing program 5: set_robust_list(&(0x7f0000000140)={&(0x7f0000000080)={&(0x7f0000000000)}, 0x3, &(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x30) read(r0, 0x0, 0x0) 20:32:33 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x103480, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_UIE_OFF(r1, 0x7004) 20:32:33 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfo\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:33 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x3f) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f00c62f7ee4ef770001010000000100"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 20:32:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\b', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:33 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14, 0x800) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000001c0)={@empty, @dev={0xac, 0x14, 0x14, 0x28}, r2}, 0xc) read(r0, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:32:33 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='b\ns\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:33 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\b', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) capget(&(0x7f0000000040)={0x20071026, r1}, &(0x7f0000000080)={0x6, 0x7fffffff, 0x3ff, 0x5, 0xff, 0xb0b3}) r2 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @mcast1, 0x5}, r3}}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) 20:32:34 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[], 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@dev={0xac, 0x14, 0x14, 0xc}, @multicast2, r2}, 0xc) [ 3245.617421][T27171] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 20:32:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\t', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x8001, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@mcast2, 0x3, 0x3, 0xff, 0x9, 0xd45, 0x2}, 0x20) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x10000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[0x4, 0x1b1b, 0x3, 0x5, 0x1, 0xffffffff, 0x1f, 0xbe7, 0x3ff, 0xfff, 0x80000000, 0x1f, 0x5, 0x1ff, 0x7, 0x5], 0x101000, 0x200000}) 20:32:34 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfp\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) poll(&(0x7f0000000040)=[{r0, 0x8000}], 0x1, 0x9) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x10a80, 0x2) ioctl$PPPIOCDISCONN(r1, 0x7439) r2 = fcntl$getown(r1, 0x9) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x3, 0x2, 0x1, r2}) read(r0, 0x0, 0xffffffffffffffd9) socketpair(0x10, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000500)={&(0x7f0000000200), 0xc, &(0x7f00000004c0)={&(0x7f0000000280)={0x21c, r5, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc636}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x82}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3fffffff80000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_LINK={0xec, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x280}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe4b1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x8000}, 0x44001) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KDGKBLED(r6, 0x4b64, &(0x7f0000000140)) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f00000000c0)={0x3, 0x0, 0x1000}, 0x4) 20:32:34 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\t', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:34 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='b%s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) read(r0, 0x0, 0xfffffffffffffe47) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x4000) socketpair(0x11, 0x800, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) bind$isdn_base(r1, &(0x7f0000000080)={0x22, 0x6, 0x7c9, 0x1, 0x8}, 0x6) 20:32:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\n', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:34 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:35 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\n', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@empty, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'l\x00\x00\x00\x00\x00\x11\x1fe\xad\x05\xe2\xdd\'\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:35 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x169) epoll_create1(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x1000000000, @empty, 0x81}]}, &(0x7f0000000100)=0x10) r3 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) r4 = getuid() ioctl$TUNSETOWNER(r3, 0x400454cc, r4) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={r2, @in={{0x2, 0x4e24, @empty}}}, 0x84) 20:32:35 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='b.s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:35 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfu\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x0e', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:35 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\v', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:35 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x2000, 0x0) recvfrom$inet(r1, &(0x7f0000000540)=""/239, 0xef, 0x3ffffffe, &(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0xffffffffffffff71) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000480)) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0xffffffffffffff80, 0x10001, 0x0, 0x400, 0x1, 0x101, 0x1, 0x1, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000003c0)={r6, 0x0, 0x20}, 0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x6a072b89f5ba5872}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@dont_hash='dont_hash'}, {@uid_lt={'uid<', r5}}]}}) read(r0, 0x0, 0x0) 20:32:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8400, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:35 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) r1 = accept4(r0, &(0x7f0000000200)=@isdn, &(0x7f00000001c0)=0xfffffffffffffe2e, 0x803) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) kcmp(r2, r3, 0x4, r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@rand_addr="745ef1242b6c0963d728a4048da5670f", 0x80000000, 0x0, 0x2, 0x4, 0x8, 0xcbf}, 0x20) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r4, 0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x602080, 0x0) write$P9_RXATTRCREATE(r5, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) 20:32:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x10', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:36 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) ioctl$SIOCRSACCEPT(r2, 0x89e3) read(r0, 0x0, 0x0) 20:32:36 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\f', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:36 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r0 = syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x100000000, 0x8280) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000005c0)={0x5, 0x5}) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000400)=0xb) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0), 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000001c0)) rmdir(&(0x7f0000000000)='./file0/file0\x00') socket$inet_smc(0x2b, 0x1, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r4, 0x0, 0x0) 20:32:36 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='b/s\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs#', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:36 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfx\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:36 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='b\xebs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:36 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\r', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfsH', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:36 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0xfffffffffffffda3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x4, 0x4b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000040), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'batadv0\x00', 'veth1_to_bond\x00', 'syzkaller0\x00', 'team_slave_1\x00', @local, [0x0, 0x0, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xd8c9}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0xb, 0xa, 0xeffe, 'irlan0\x00', '\x00', 'tunl0\x00', 'veth1_to_bond\x00', @dev={[], 0x1a}, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], @remote, [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0x10}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x2, [{{{0x17, 0x10, 0x89ff, 'ip6_vti0\x00', 'vcan0\x00', 'team0\x00', 'nr0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0x188c0c4178eec96b, 0xff], @random="f85ddf7db8d4", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xb0, 0xf8, 0x170, [@statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x5, 0x3ff, 0x3, 0x75f}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x400000000000000, 0x0, 0x7}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x7, 0x10001, 0x1f, 0x0, 0x0, "4f02bfa0fb891a6b9ed0c895be85c07559bb8cd4ec199e694b50db88b71b1d365968041a574b228274b9243da676ec626045d2b27282095a3f8c7eb41a524ed7"}}}}, {{{0x9, 0x4, 0x17, 'lapb0\x00', 'veth1_to_bond\x00', '\x00', 'bcsf0\x00', @random="a750ff81aedc", [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0xff], 0x110, 0x140, 0x170, [@stp={'stp\x00', 0x48, {{0x4, {0xff, 0x8, 0x5, @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], 0x3ff, 0x40004000, 0x8, 0x6, @local, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x4e22, 0x4e22, 0x400, 0x5cf, 0x1ff, 0x4445c879, 0xd043, 0x0, 0x4, 0xfd78}, 0x1, 0x40}}}, @cpu={'cpu\x00', 0x8, {{0x101}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}]}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}}]}]}, 0x530) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:36 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x6239b99b7dae7f84) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x10000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000100)=""/149) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000200)=[0x7fff, 0xffffffffffff8000]) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x10000) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x9, 0x40000) ioctl$TIOCNXCL(r2, 0x540d) sendto$inet6(r2, &(0x7f00000002c0)="fa1e0d0d15ff118d59b1384feedbd51d84aa5f2ec2ded6216ac440d3678c6d3ba24ab0b32a2a6c30d60ae1692b25c539c731671cd5f6b9c0aded83773862e39f71ef81c52992fe504899fee40116ff9911cc402b812a1495166508b6e64c83d9421516fe7a92d0ffaace73474a3e30242dbab062fd96c57565f814a9b096ec540b4fd98862383678c77f7d4a324ad77b26005df0d12f4cf60a9bf8a0365f7617ca73905b6e2f3c1b6c7dc126c5140279c60dcf0d0f563e45923030de19261ac7a19be93dc37174acf979b2ad7a5629885b9b02148c933f12a54dec083afb6feedb24dc061741c1047106674e3f9b5b10747a0624413a39f4f44d092e285f67f34c2caecae59354021bfc4716a989f4ce3611d50f1eba99caa4fa4cd9bbef1dd186cc92e86d5d15e50fba443af71108bc323b98cf9bcd92e66a749e0595cfe1c140e052045a5219182c3c99c8307927f3fcc149eb1495f99a8f506c08ad2c9f2bc02f6379cb6e69962cfc0fe1dc66de6c2306a8e544e9bedb5c823a46b74545be8a25cdcceab192ef65bda8972415c6f5451da2ba3874a44776767396102890188887fa3fdb044c7bb581392161b036c623a35cad241a56726c3a344d681971fba4757d8eff82668a853bab4cab6f6c00105ac9383c8dde97959209ca9cbad3117d08fa92ed7b063faf1db6833ec634c71ef70f1f5b3477d0bc173af411da35f1fcf89233a397de10ce0886c2680b59924a8f6582961353e974e8f7497d6c81828c1773f4f03e3bbb4aa2d16f1f04c6b40825d42a2cdd89629d2814ddaeca44ea93efcde8ef23d2877b1ca436f340387db2a05a7e98fb0c2c690a96314113b7221109ce5fea2522524bc7a05ae3834a23d51f5d2557a28fd35a6dd0776d4aa280b6d3bad30fb11994e53deb666b7d7e0df0f242a3c3a3723fdde835e1f907b537e4c7e3cb4c37c4ede1745b74ad0fc1a1e4c9b37c6af09a62e0bd381f6de48979dc39a2d73ff4190041df827f8c993e9eb655d87b24c4f8cc8399e55ce398c47750e9e32b717306a51613dd3b157435f912daf8ccc13a7110dba7bdece2b4ddfe3baf527d4e9750e44e7d3e00091453fbfecb06a18ae1dd7140ffe6a0e982d3fa2e34cd28f30ac04c62279671a0a7f4dc1d8e2b00873050e10936aa0c6b8ef3a1d8e42ceb6bede2fb69047653790adbb86599140e222917c6d4844acd965a3485aa616b3f11ecfd2828b12140ba36e2ee33e619ec1983f0c74d98a15b490054d1ef6808cb826d889f8e9fa8c8887606d4bb4fa255a1a2978409834381364d3fbfed43f69cf5ddbc9f7c76b1655a21fbb1f82eb2f76046d1543e4d7d08a14c3a82d048427fead386c75ff09f15864b51ad80841fe7c0fed075837c253ac4d158c8c48322c22cb6b45e892b300a72a98d0994f2a31ca016ba7c1c8aaaed64a58cbe800c1ad3d10eb5269215c81e9c187b01a2985c7797a50abc1e82caa61a7a10f8717c5a0524f06b62adec4c920f5583e355f76d0ab6d2a256df6cf1322b73b871e51820197b8e70fffebfb9e9d29f561199e8038720e3bd9e12a4f9882eaefbd8b1f8cdb7a60039e6ce5b46b2d8efed7f150fe3015365d572101ffa9eac3cb86e05a7db0a2b553f3a6a1e08c16010b45df7c49234a80cd025c7a27c5693cd6099c489389278732912a0adba36c26ecaf25f47c28e97020926a912a7f27911430cbbc78e9c1d83991d1cdea8608beb7010a22e6d9a217aa7e1352f670c5f28cc08813a582e98da93b5b26fe391b843de49ba0626e5669ff69147be0c2a1127e072d178bef05365039cf077ff57fd26477188348885c36b7196e4ca3536032692573b446f9c6cb0a64b9ba10156405818c64e49f77eca1cbceffc92492f2bd4ccd3cd3823de7dbc77b969bda807a7616dcb4cdde4e253ed9f4ca7bbac9c9db09e92c1ec65521f70c80c1b51a5029c82aafaa4b79a579884727ae5b5fb3035acea1bb4e338d70c14b23899a7919a46a119d6fd30a8623a7b364871152a735053b28d4123affe228a07392a3ef6f5616e85c633d8985abb9039fe97ea7b5191f6f37453ca87d47b952a32d7cb5362295b0077f3d4b3a8200d4be6b5bd3af261e0bd6078aaf9f007a9193580ddf7f08366fc87572490f9d0305e9c39f5f019def702cc8cb1a31cc3223e7207f824674c0cd8d9a0836f1f3724b942e96d7fa1a437a818bacbb373584933d08683dfbb8254d312dc5a2b309b3c2629c8c0dcc6289821dc4a700c24357e7b461b2d9dbbd8b8de61c67155c4f43838944413ab0cac3420eed866b0b5f00813316270da48b519b2402b1d63fdf8292ce68ee6f8bf7cac7b1c76febdbe4804e61f6732470b86b98f401321edeea9af6a92a48bdabc0eff12feee1e4923f1ab7b34082bfefd12a7654b7545aacfe2e0291add24c625a45c4737be018f3e5bf5770859de9d53417e76098337ccdb3950073a51d26a009ee1ca051fcededefd5f47b505bd7f9b02163db4240bdfa2fcd8cfe1d8fd348abde400c1108fb6096cfa43ff4af42cb288a8e962144f403b1ecc49e885afeb9d798f1994a02e208ca3d042d52192ce0b8d14484a462765d4ed002b6800ed903fe44f5c544d3488c40b2ef2d898ab51940907e1dce2705572c32b0fc2052757aee3b82bafd98461a829f8d4290b446ba832f4a6a82261eb7421619ef8fc97a7de6e4770ed859bbacfae9f75c888903d38189572c9666e7d87db05f3e2b2b06172df538d5d7836006baa2168d34f4d93811d7cca5edbd2019c1090f723f0b4c79caeb0392637db98ca40aaec446b822663a74e56ecef595928c3cd705dbd550ed2ff2b9a2aecbb0ed8f0ec89a1e2e26db0a1b7b7c735c731195a34a8b8ca2f31cfefb4a37fd7d30a012d0411fa20cef295f943aa3499a8ea729aa6f8daeac545bda97c1c3c2d9c23bcd048fe21b3d91114f879070c6954d64199eeb6f7935b8430ec4a74c0f440186d7e0735ab46f8dd13a6e1d6b479dd2d59f46acb2cce89c5308b0bd36e8e858c1995029e17ba298fa3bbbc92cc3349a398cde33abe978be50fe0da0c6073d5d444be5432247bdc532a3242594c47b0cb550bd4c83d88645666d03971bd397292b205574c0e104f6c392bbeb453cecefaf5a3e2b5ade7fb593fb53e6aa2c58b87f1a524c25994cbfd7cb560f165449ad991f36c917b2b6442a30f236acdeaac18a22ca9edd78f0560948c8f6bad4bd9a9b8885a7e2e2dbc9f7cafb3b5a5e67eeb23c4d668b0e3c82d4376540019c482a3ece1561eef1ee7f397f2417a693528e7466711ae52b88719863b2085a073f9775d0cd88350f31dd9aff6c27e27db4733d4a0e1a3bbb512f786462afe98ccd4e314454ee90da87a829af7a6a2e7432fe79a5337691520fa3c4dd8746ee8bdcfc0abe5deea24c6a6c70833d45032fb53d546690fb95c506597722429255388d8aac245e9bd32120c1c37798e97a781d074d784fead61e9daf85f6db216532d8fe456de1519523667fe4ff2576d8ed7307624ee780cc1f152a48c345ce68c03b100a953431cbef13ca96cc3254d7600ff6a883069341a0b689c5a3882edd13b6834f4a8208c9f88f07840e719ece4e34c4454daf12ece7bc03dbdf87a129078e71bfbb3bcfa5965ab64dbf4b07b38f55d4ce397cd9a8a72444a9be6482d6ac28f50aa14d76e6ca7c65a19b2d54a715c82d26849967a653361ce7a67ad8ab4ee0d618e0849996debe6e2e63beaa9d56cd6d5101956480adc9b107cdda2da3b902ea281414c1254da65b8e5c9f5b19b84e08b91f3e4ff9efdd8bbc0823be1b987d2946f3420074cb8d49683bc98e91a93a04629ca7a94032af01fc21850421085af2969414f2a7beaae0b846b4120a4d9baa879597d2cd47bc60bb90b8423a0d87bc844072836a34cd661856640bc5a62d8f6befe8568989b4566dcae1d729426cc55755cf9a7bd7e62ce6d94a93f2743ce1b3a4bf42f9ceef429a4ff9c6cbab2de41e837909e15c9d400f3fb621cd71cffd9c01f75168f2562271a3be515c0d2cfee3f4f2849c5eeb4e85abf51161816db317d5401affe72085be6a81d82964a063a5ac3c8c4a822d2dd7e2e1c537032da30256471fa7d36182a593b3c046e570fc3b667384666f1d03202bd580c106478740a92f09ecadbf4ecf3064e962594fc3e98697734f3bcd688b1820062bd01baa63550d8dcbd5faf5bdcadba31b6ee77b58b77b4883d7ead8b1769ba3786406c4a7da0ab644a7627fbe4f9d929dd7499658e5843a1f27a43cf3e8e5cb71ef4aec23254c0848709e34885ae8c9344330d9b3ba7bbb87aa4b77cdf6a46c5f4649ba3d9730a5a909877c13c1fabfd6db62825f94f64466604ec441cfb6c2b44eb29022f6043518f686e60354fe2ef20891ca92c043c3408cbceceeb40885b15bf3d571ea98442542e8b0f21dcac2252804bcfd99ee1a037eeea4943ff950266e28f5a154bf1963f695f8fd6f840adcb584ed5e4e25fca5f289bf31e09b774f9cba4f25a8402c3b8ab3c6b194bebc2cfa0b52388e2015c4591360d9ec950bff2a76764872ee4dc67558a51ef5f0db451ca6248af7fea46c7a4429697c656909d8cc387cee2bfbe64d88e2969b944f6c8b5e3ed8bc9b3ff3fb02e0dc4d9aa74aebeff2b597257e29fca3503517a70153ef1891df7525c0c3d5c9f67051e98a627e4793665b53bbfe36bc479952fad574aa38e05e5299e86453fa3fb2d7e3f50d7285fa27e767b38c22d0fa64fa01f0d03c0b36d095897e69e66caf3c7750b3c52f87fdaa7b26cd4cf4d31aa7d09b21d82e115b2b4175042c1b6fcf8a4ca1cd365209b851acece7e8f2b188f48e06c50b444247792a5e90760136a538b391418cacb310ef559f8eef0c250b52f031f7747c9bae34283cdc7b26d93962a6a6103d9aad232788a9100ce4eed1cb6bc4ce60af8e2c2274ff28cfe3a33087f0cb27de72bfb88ad2079687de0ce9bd2d4cac5e8ac4f7aef062925b0340b90e7c1c6555a412aed807b677ddb339c22131370d009aafc9794d0a64b9e7553e68652dd2d17f997bf6ecf2e196cecb87b14bf4f4e949e9905ae193e783d90f6dbe350673498b6ed0ba5918de8fc6c3a87f406a71cc4708deefac2186db206fc4e34ac583e02b182e6c2c9dd1eef81ae50a15309506f5f93ba82636be77886ca1115c3cea7821e85ee26be72e0db387839174fc8898a8e4695d47e1534837c70348ab50bb03bde4754d7d5f67970ce749fa36d2835a1e6745e12318e01b9be903cf5b85f35378420d88cc6c622f63d7cb473d78cb3842479abd1592bc9eeb997301b4bbeb3c99953f80d19e631f55eca0901c0b97ed53501df6a0debd89118d4eca58948c4908c9eaafff1cae1d0eda024dbd28495f50f64b3cf82d8ad0e11403bec63d26278710f83c578ad0ea029c7424593062ef87941463e5815f6bdae824f426b50edda582668e76dd8a351cbba5f95274630ea7ba479d45991cd992b79ff619f7b56dac39be76052a4b738e8094dc9a4c2972f8ccf79381ed61a7a8fe9b46e39fa3034e896f970bd224e523c005f41c31b184a10236a17c444b81f7f34a5b7569f9fb2e930c50c4fb7d7619322bfd5aac30f70ef4c50ac6ebc94df3ac13c14aea97b2e21c11c117f065d4eeb690e45a8d5e1174d37d5f0dd0987d9f335217f90aaf2d420a9937a9fd8baf50748e010889c73f8ed11e59df72146455fb2554215d883490744f63963fbdb9be1ce03f0c401908e4a70e02dccb97c4f6484cb8e3dd65d3f", 0x1000, 0x4000000, &(0x7f00000012c0)={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) accept4$rose(r2, &(0x7f0000000240)=@short={0xb, @dev, @bcast, 0x1, @default}, &(0x7f0000000280)=0x1c, 0x80000) finit_module(r0, &(0x7f0000000080)='ppp1*systemeth1{cpuset\x00', 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000001340)={0x2, [0x0, 0x0]}, &(0x7f0000001380)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000013c0)={r3, 0x7c9f, 0x71}, 0x8) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000001400)={r1, 0x0, 0x1, 0x0, 0x8001}) 20:32:37 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80000, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000080)) read(r0, 0x0, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@random={'system.', '/dev/autofs\x00'}, &(0x7f0000000100)=""/144, 0x90) 20:32:37 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x0e', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfsL', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:37 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bf\xeb\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:37 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @multicast1}, @in6}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in6=@empty}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000640)=ANY=[], 0x349) clone(0x100, &(0x7f0000000840)="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", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000640)="279af3e1f6bf348eee20989aedee008073d31bc53521a8d0fa026d13086070ca47816029b05ab3e591ad19f008d47559e7d350b32a022f5b7c0cf6073d720fc5827b8c1345da8d2a9b314eeee9a5893eb4ad69547fc1abcfc871501b4a67ef532c8dd6ee50442e7075d38d01e9abb2d653cf3d2d0764a601a451b230b6d9612b6b0aa94d4504a0451fd3fd6a65a1ebc7da07e3b3196074300c45389c2b575bda79cefd5daaed31c5800bd3eb36c6449fc1136910047acc0d6235dbc77422c5774a5a88174d9d9ffc5ddc3938609ad2ca5dfcccc5ebfd53f2883dbf0ee27201d8e2439a4046259057ca814ba8f2c9") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$pptp(r1, &(0x7f0000000300)={0x18, 0x2, {0x3, @rand_addr=0x5}}, 0x1e) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x0, 0x65, 0x71, &(0x7f00000001c0)="5628c764b59a2b1ec4bb4ff93914af23fda7f4efafb9cc19f7a21bf05a82b8731336682a7160932c4a42b6ec1376ad534150bae9fa0b13dd33060876e7245bd36dfc539151abaa79efde6cd2c1c538d5d10639f2647578813874a5f071b0d6c739a7cceae5", &(0x7f0000000280)=""/113}, 0x28) fcntl$setlease(r3, 0x400, 0x3) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000ce, 0x0) read(r0, 0x0, 0x0) 20:32:37 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf\n\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:37 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x756b9eef, 0x0}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f00000000c0)=0x1, 0x99) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x6, r2}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x10382, 0x0) 20:32:37 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x11', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs`', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:37 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) alarm(0x7fff) read(r0, 0x0, 0x0) 20:32:38 executing program 0: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:38 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x02', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:38 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000080)={{0x4, 0x6, 0x8, 0x9, 0x190665d2, 0xffffffffb1e3f186}, 0xffffffffffffff00}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x14) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x41, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@empty, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0xc) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000780)=[0x0, 0xee00, 0xee01, 0xee00]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000b00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000ac0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000000d00)={0x15, 0x110, 0xfa00, {r14, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x2, @empty, 0x9}, @in={0x2, 0x4e20, @broadcast}}}, 0x118) getresgid(&(0x7f00000008c0)=0x0, &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x7, &(0x7f0000000980)=[0xee01, 0x0, 0x0, 0xffffffffffffffff, 0xee01, 0xee01, 0x0]) getresgid(&(0x7f00000009c0)=0x0, &(0x7f0000000a00), &(0x7f0000000a40)) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="02000000010007000000000002000300", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000300", @ANYRES32=r7, @ANYBLOB="04000308000400000000000083471413ddd8b3059847c0e13ab1950a2c10d3c41045cf6a4d72e40973d5a5dc24b4cfdadafca9584e949fa54d89a61795ef55399038fc8c351d626f9b1cb7b9b0b6bd24ae27869728d091536ca7e4aa990c56c7f9eb35336afec90510304492e2b3a42d53cbc2a51b7e61edc1c175d535b4d83f2c673085cc5810ed4d28edd895a06e34679f31e2e580b48cf362d6748f5a1847f39b32f4d84cfd9f6e13de000232", @ANYRES32=r8, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r9, @ANYBLOB="08000600", @ANYRES32=r10, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000500", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="08000400", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="10000300000000002000040000000000"], 0x94, 0x3) 20:32:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfsh', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:38 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x100) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7f, 0x90000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x9, 0x20, 0x4, 0x8}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x10000, 0x7}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={r2, 0x6, 0x3ff, 0x9, 0x4, 0x0, 0x82c5, 0xfe2e, {r3, @in={{0x2, 0x4e21, @local}}, 0xffffffffffffffff, 0x7, 0x1000, 0x1, 0xb6b}}, &(0x7f0000000240)=0xb0) read(r0, 0x0, 0x0) 20:32:38 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs#', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:38 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf#\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:38 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read(r0, 0x0, 0x0) 20:32:38 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 20:32:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfsl', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:38 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0xffffffcc) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) 20:32:38 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsH', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:39 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) readahead(r0, 0xfff, 0x0) 20:32:39 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x03', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:39 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf%\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:39 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/4\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x5}, &(0x7f00000001c0)=0x8) read(r0, 0x0, 0x0) 20:32:39 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsL', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfst', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:39 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r2 = dup2(r0, r0) r3 = getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000600)={0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000940)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000a80)=0xe8) getgroups(0x1, &(0x7f0000000ac0)=[0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001540)={0x0}, &(0x7f0000001580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000016c0)=0xe8) r17 = getegid() r18 = gettid() getresuid(&(0x7f0000001700)=0x0, &(0x7f0000001740), &(0x7f0000001780)) r20 = getgid() r21 = socket$isdn(0x22, 0x3, 0x22) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001a40)='*-self]\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001ac0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001bc0)=0xe8) r24 = getgid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001c00)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c40)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d40)=0xe8) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000003300), &(0x7f0000003340)=0x0, &(0x7f0000003380)) getresgid(&(0x7f0000003b80)=0x0, &(0x7f0000003400), &(0x7f0000003440)) r31 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003580)=0xe8) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r34 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003680)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000003780)=0xe8) stat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r37 = getpgrp(0xffffffffffffffff) r38 = getuid() r39 = getgid() r40 = openat$tun(0xffffffffffffff9c, &(0x7f0000003880)='/dev/net/tun\x00', 0x200000, 0x0) sendmmsg$unix(r2, &(0x7f0000003a40)=[{&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f00000003c0)="95fe9fe920d6f1b0aae262c8937c01c843c974509fb4a91786261c03fc3f5cd9f93dd7d7c98246865ecb75a1f3e9fb2e1d6b375115f0bc60a8766f2f2e097966a815ba4eb58b8d6cc7485f161c329340be7d7e9554232be7f926736fd965", 0x5e}, {&(0x7f0000000440)="9385852cbb8bccdd318119dd4e35299d570f83104674ffc41047bbd1a10e2eebc85882754f894cd29caf1359cf0c921c567785314f1759f35dbcefe48da8a396658e6c06f34dea0b", 0x48}], 0x2, &(0x7f0000000b00)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x28, 0x1, 0x1, [r1, r0, r0, r1, r0]}], 0xa8, 0x40}, {&(0x7f0000000bc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000c40)="4320e561fa2f06c943f6e85801a061d2d0070e87c3d6806aa72f735aed0a9ebf8ea5672755a80128684fd977a891175f25b94c0820b1c6e6cb9d50271ddd5fd8867c1c3624be13b1c54c82ddf3953fbac87a92537497ba09f0351e14a27baea5ffa6438cbfc9eb05ccdb465b7e9e11c8d75259498116d3b2f6444934e225eb2d6454e2ac3b8921f52ac21de4888556", 0x8f}, {&(0x7f0000000d00)="2028bf55676d281c2392c72cc51bad202db81f87cb3b5b72d6d48c6e7f264ce83961b199b94dea85cffc44f64a83cf0c9b325ef56f16c32cb28e8c8ab27433b31d009af2", 0x44}, {&(0x7f0000000d80)="6e968c76abf81983ecbb4e2c90b5a32500ec0cfa8456f715a0a23c7fabb9e74104c4b9c0af01c209070637ffd6c4ec4ff73ea16a44af8728b3c1c0aa6af6655f4296d179d792127db369d61a3fd748ad70a3c3faa1b3b545b4c16a249504db22a526b0412bd89dbef02eeefc09adf50437d4a13d0e99bf80fcec4c652e377a59da07d1927f23ab8111d9a86fa62afac86db4b369c6a6959e261ab26524f4b64d6060cb88392adda508d37327d04cfd504d53cd452899ebf2749c9e7ddd974fe1f31a9f59d70fa2e18ef333818f61fa897f93a9c316431e0f0add1c9cac2f6fd2c10043db7fbc6a3247a1c331511c24d7bd455dfe66", 0xf5}, {&(0x7f0000000e80)="6c02414f9d97ff34a2b9a6d3ef64162c18dfaa09d9a4600aa089ddb659a1a6820184fd7ad51622461566a67a1480c1b80c4693e29a555fd7f6b5663fbcdc21df6dbbe1769370dbd162fc92430af9915393bd4ad0998065857d094f918810e8d8d006fd6d76b724e9d39478d3106b6b74b2479352b2d129b2dc886762df62935010e9b7f62a9e7c06c52f8a414f9ddde0655ee67c6bf77b7042320871f452f3b290989d7fef10d22a3bc7a1bd0785343a054e705b674d5c0526d7095d9f984f96f211f325edb7", 0xc6}, {&(0x7f0000000f80)="7571aba50020670fabc05c918f5d9c63d00e349892d71c74e168cb3c99512fa794362471bb43c553969de688b2fc4b181d7ee1ec4894bc8c9123da0504126821f22783e994a3a6a9193ecb7193c2c25186412c29fe565a4c409e007046cd7c2e3251097b754ec7afbaa485461172951deaf315fa3bccaaf26ef72d9ce740e5a7f3fa5c8a3fab2d7ba01ad7e6aa340883f0881cf57f2d457094583d5f1276d31b", 0xa0}, {&(0x7f0000001040)="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", 0xfa}], 0x6, 0x0, 0x0, 0x40000}, {&(0x7f00000011c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000001240)="5df9c0d99c2f249659919808a44560f28a7c5aa37dec", 0x16}, {&(0x7f0000001280)="aad160956b7109e3ded504f38581d95637be7cff97e8506fd6aaa4c8812a594eecf6a2d2d856d3c656a534f1ebdfa0ad19d328947b2191d746d1d3afdc317d3090c225d789f54c8b9239f896c88d67297c", 0x51}, {&(0x7f0000001300)="4fe9807dfa82011c2245e67b3ad87ce50f7c2b6aada657df4cf6a480939c401fc8609c8686190582fe415fb84f61630f37442735b44144505c61e1af8425a6ab3d9df4d52d9adc503c3c95c303a327abc05dd885eb2678ac13e755c6b64bfec7b39a77e147fb6823905fd7ef41b3de03b101fc501542b2bb6721faa57090a64d5c29e0f05288daf43f83af316e88614a30a8305d0356ed76d766f886", 0x9c}, {&(0x7f00000013c0)="78af3c4c49af033b4feaf7d450fe", 0xe}, {&(0x7f0000001400)="16db7edd7e9154de4a96b3fc49d76d48d55118fcdd3b5f449fb3", 0x1a}, {&(0x7f0000001440)="0fa42634a06b41f8f3a024f6c69aeea62956b548ab72dd47512ed785c073bee0a7f64271a0f6716643fcdb30e7486cf6d0cebfeab66ce2d3a99d9b0262e3af120b924f8bc22ee717ca72d8e2b3e60c838c4b4d3ccc833f168daa5eaff3130a3370f378de0b2e9a48c98ac24ee83ecf2c", 0x70}], 0x6, &(0x7f00000017c0)=[@cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r0, r0, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r1]}], 0xe8, 0xc001}, {&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001a00)=[{&(0x7f0000001940)="f164b94c5ee2699d92212e07d37c1dee3ed73c4ab7e3b96a287e8a050b6196047073acd03bebb68cd70b15d35e096b9d20ed5efc1b1a0557e84c3ca3642a72cc0ac1e89dbe39f23d57653a30f4994bb8d89d231cdcb91b6e8e0a2a37db310491bc93f4033c01d303265e23a30f93d9e54b7e953d4fa12cde5c056f9970e3756c1c7966f4cc18ce92512c4b9bccc50337477f3e0e0ec6a399f71e4673e70a07b889c9", 0xa2}], 0x1, &(0x7f0000001e40)=[@rights={0x38, 0x1, 0x1, [r0, r1, r1, r1, r0, r0, r1, r1, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r1, r1]}, @rights={0x30, 0x1, 0x1, [r1, r1, r0, r1, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @rights={0x18, 0x1, 0x1, [r21]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}], 0x138, 0x40050}, {&(0x7f0000001f80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003280)=[{&(0x7f0000002000)="3ecaa31c2af832e089ba9d2ba8fd5adca6cf15edda2b13220456b10d81d4d59f770f8fe24ab868f8a94d3c380f9f6010170108af99add5e282a1f2bdd8ae2c46a909a1ce22d12a62acb56dc55856159d131332ff793d5e9f08bdc570b0e202d1c317c45f42ce76a716adf0ade0e301f593ffd228924a99bcc547044e72b8168e778054cc1ac04847c53b7d03edbbd222c9a481a555eac5738ba17e1f9b2f067ce0a39192bcd9e618b8dc74891ee0e1a3558d43dd91", 0xb5}, {&(0x7f00000020c0)="57d18d4162b8b0ec823a3eb6ec714b79ae6d86f1b1db2eee3295b957a7837faa3e07c740099f4e1397b79f43e8cfbfaf441bf0711267e8cb01ad8801e49a68da366962bb5816ebd9a70f0766dfb55d5467f4bad3c152a99dbb492c39219a6cdeb0c4a653b880096faf05d8818afb18721f2071b7656a201143db3a02ae547a519568872f7666049a410c9b5367714af8ff5e5b0e2b67b9577d853ba660de641e65e9b741c97fb4384022a70ce4c5bcf4dc575ff24e0de7726a33fa39cb5e47dc9be2c5bf3f32104c915fc5d560d9c9d8cbd3", 0xd2}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="15c59be7729a538b1eec5475c25bf6fcfca890077f", 0x15}, {&(0x7f0000003200)="9108f70e3e7c7fee340651c0f2caa732d5f1600dbc7c380339d39d32a9c582cc8e6af409357ea494eb782d02cd2f0ad2662e678e31199ac3770a2cc47bdc21fc227c05b14903faef8377404ee5fbefbecc856761e48fdebf7ce0d9cb560d05a9c83e24", 0x63}], 0x5, &(0x7f00000038c0)=[@cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x30, 0x1, 0x1, [r1, r0, r1, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r34, r35, r36}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @rights={0x20, 0x1, 0x1, [r0, r1, r1]}, @rights={0x20, 0x1, 0x1, [r0, r1, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r1, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r1, r1, r1, r0, r1, r1, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r40]}], 0x160, 0x1}], 0x5, 0x4044000) r41 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20410001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1a0, r41, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff74}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @multicast1}, 0x81}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x173}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfffffffffffffffe, @local, 0x2a}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @remote, 0x3}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) 20:32:39 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf*\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:39 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) 20:32:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfsz', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:40 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x04', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:40 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs`', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:40 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:40 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf+\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200040, 0x0) r2 = gettid() syz_open_procfs(r2, &(0x7f00000000c0)='net/rt_cache\x00') ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0xff, 0x7de2, 0x80}) 20:32:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:40 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsh', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3252.175433][T28964] hfs: can't find a HFS filesystem on dev loop2 20:32:40 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x67}}, &(0x7f0000000080)='M[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W>\x86E\x10*\xe7{\x15\xba)%\xdc@\x8f*\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe70BL\x7f=\xc08\xc2\xb4\x85\xfc?8\xec\x93\a[M-\xcc\b\xad\xceP9\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\x1c\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\x87\xbd\xfe\x1b\x1b\xae\xe7\xe4\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde4F+\x85\xb4\x97', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:41 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x05', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:41 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf-\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) [ 3252.618055][T29102] hfs: can't find a HFS filesystem on dev loop2 20:32:41 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsl', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:41 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x06', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3253.240072][T29239] hfs: can't find a HFS filesystem on dev loop2 20:32:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)=ANY=[@ANYBLOB="e0000002015c214f38000028929218818fdb0000180e974607349c4ce59e5b8b4c5c8d97f567649f278e439d6b8d2a95c640f1a1461d311381a0edbaceac5d14d580f126fb72fe3e89c1175826add9f67550e1881bd0163874a2887f5fc829492f854e408ef142e78de10dfa7b56bb79d607381f974a8c8330888fa4c1dfa18fc8e87cb011e2cea17405bf7b7acaee7cbea0b91eef81bd5853104272a950aa9e886fff946bece5eae2bbce"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00', 0xffffffffffffffff}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x1) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x50}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x80, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x200}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3f}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xb108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9a37}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7f}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:42 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsm', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:42 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e00000027f0000010100000001000000e0000001fb7f6c2272370c2e297cccc2e40ed997de1647c6dcb2d6b7b0e67f6b0816a7818bafcf2aad12bc19c9c9054b94e5ee6c906812236052700536bff47c3f193aba7eee12589e6b9177038135f3559c02054de08e469c00b7bff8c3a0da20aebd0f4804d4ddb32bc88a10457d99aea94606035799b7b8b6743b6ffb536482"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:42 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf.\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3253.796301][T29385] device lo entered promiscuous mode [ 3253.805534][T29388] device lo left promiscuous mode 20:32:42 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\a', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3253.858762][T29395] hfs: can't find a HFS filesystem on dev loop2 [ 3253.871383][T29318] device lo entered promiscuous mode [ 3253.919448][T29377] device lo left promiscuous mode 20:32:42 executing program 5 (fault-call:3 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 20:32:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="d53be1f3384cc36dac0000027f00000101000000c72e0000e05d313c67f88089ae6872aa840000f532b24eb544c6b107f4e4a0cb5e78788f293dbbf2347dd859119a2d11973c08923e7fe6ffed06e933289e3a82d71f813083aa42e0f5d839054bb0c1ff8610ce0f7b3c7473966eafec329be25128ad28733730eda4f210064ccb6989e83d"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000380), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x80c0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000004c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x23}, 0x4e22, 0x3, 0x4e22, 0x3, 0xa, 0x20, 0x80, 0xbb, 0x0, r3}, {0x3, 0x544, 0x7, 0x7, 0x4, 0x4, 0x800000010000, 0xfffffffffffffffc}, {0x1, 0x3fa5, 0x3, 0x8000}, 0x5, 0x6e6bba, 0x9d66b9c981df5d40, 0x1, 0x1}, {{@in6=@loopback, 0x4d2, 0x3c}, 0xa, @in6=@mcast1, 0x3500, 0x0, 0x3, 0x100, 0x10001, 0x4, 0x9c60}}, 0xe8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r4, 0xf77}, 0x8) 20:32:42 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsn', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:42 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bf0\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3254.111669][T29515] FAULT_INJECTION: forcing a failure. [ 3254.111669][T29515] name failslab, interval 1, probability 0, space 0, times 0 [ 3254.132086][T29515] CPU: 1 PID: 29515 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3254.141257][T29515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3254.151327][T29515] Call Trace: [ 3254.154619][T29515] dump_stack+0x172/0x1f0 [ 3254.159087][T29515] should_fail.cold+0xa/0x15 [ 3254.163692][T29515] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3254.169518][T29515] ? ___might_sleep+0x163/0x280 [ 3254.174703][T29515] __should_failslab+0x121/0x190 [ 3254.179637][T29515] should_failslab+0x9/0x14 [ 3254.184146][T29515] kmem_cache_alloc_trace+0x2d1/0x760 [ 3254.189528][T29515] ? __radix_tree_lookup+0x1ef/0x260 [ 3254.194943][T29515] cma_alloc_port+0x4d/0x190 [ 3254.199608][T29515] rdma_bind_addr+0x1658/0x1f80 [ 3254.204487][T29515] ? mutex_trylock+0x1e0/0x1e0 [ 3254.209263][T29515] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 3254.214715][T29515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3254.220950][T29515] ? wait_for_completion+0x440/0x440 [ 3254.226258][T29515] rdma_listen+0xa3/0x970 [ 3254.230659][T29515] ucma_listen+0x14d/0x1c0 [ 3254.235193][T29515] ? ucma_notify+0x190/0x190 [ 3254.239786][T29515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3254.246036][T29515] ? _copy_from_user+0xdd/0x150 [ 3254.250897][T29515] ucma_write+0x2da/0x3c0 [ 3254.255230][T29515] ? ucma_notify+0x190/0x190 [ 3254.259819][T29515] ? ucma_open+0x290/0x290 [ 3254.264248][T29515] ? apparmor_file_permission+0x25/0x30 [ 3254.269819][T29515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3254.276302][T29515] ? security_file_permission+0x94/0x380 [ 3254.281952][T29515] __vfs_write+0x8d/0x110 [ 3254.286305][T29515] ? ucma_open+0x290/0x290 [ 3254.291287][T29515] vfs_write+0x20c/0x580 [ 3254.295641][T29515] ksys_write+0xea/0x1f0 [ 3254.299896][T29515] ? __ia32_sys_read+0xb0/0xb0 [ 3254.304670][T29515] ? do_syscall_64+0x26/0x610 [ 3254.309356][T29515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3254.315507][T29515] ? do_syscall_64+0x26/0x610 [ 3254.320182][T29515] __x64_sys_write+0x73/0xb0 [ 3254.324786][T29515] do_syscall_64+0x103/0x610 [ 3254.329428][T29515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3254.335318][T29515] RIP: 0033:0x458209 [ 3254.339212][T29515] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3254.358857][T29515] RSP: 002b:00007f9d51338c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3254.367273][T29515] RAX: ffffffffffffffda RBX: 00007f9d51338c90 RCX: 0000000000458209 [ 3254.375290][T29515] RDX: 0000000000000010 RSI: 0000000020000240 RDI: 0000000000000003 [ 3254.383268][T29515] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3254.391251][T29515] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d513396d4 [ 3254.399219][T29515] R13: 00000000004c7440 R14: 00000000004dcf40 R15: 0000000000000004 20:32:43 executing program 5 (fault-call:3 fault-nth:1): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 3254.608534][T29532] hfs: can't find a HFS filesystem on dev loop2 [ 3254.646558][T29548] FAULT_INJECTION: forcing a failure. [ 3254.646558][T29548] name failslab, interval 1, probability 0, space 0, times 0 [ 3254.670138][T29548] CPU: 1 PID: 29548 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3254.679420][T29548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3254.689496][T29548] Call Trace: [ 3254.692821][T29548] dump_stack+0x172/0x1f0 [ 3254.697542][T29548] should_fail.cold+0xa/0x15 [ 3254.702164][T29548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3254.708006][T29548] ? ___might_sleep+0x163/0x280 [ 3254.712894][T29548] __should_failslab+0x121/0x190 [ 3254.717864][T29548] should_failslab+0x9/0x14 [ 3254.722403][T29548] kmem_cache_alloc+0x2b2/0x6f0 [ 3254.727295][T29548] ? save_stack+0x45/0xd0 [ 3254.731657][T29548] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3254.737665][T29548] ? kasan_kmalloc+0x9/0x10 [ 3254.742200][T29548] ? kmem_cache_alloc_trace+0x151/0x760 [ 3254.747773][T29548] ? cma_alloc_port+0x4d/0x190 [ 3254.752570][T29548] ? rdma_bind_addr+0x1658/0x1f80 [ 3254.757679][T29548] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 3254.764046][T29548] idr_get_free+0x425/0x8d0 [ 3254.768610][T29548] idr_alloc_u32+0x19e/0x330 [ 3254.773247][T29548] ? __fprop_inc_percpu_max+0x230/0x230 [ 3254.778834][T29548] ? cma_pernet_idr+0x13f/0x2e0 [ 3254.783728][T29548] idr_alloc+0xe5/0x150 [ 3254.788005][T29548] ? idr_alloc_u32+0x330/0x330 [ 3254.792808][T29548] ? kasan_check_read+0x11/0x20 [ 3254.797792][T29548] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 3254.804123][T29548] cma_alloc_port+0xab/0x190 [ 3254.808732][T29548] rdma_bind_addr+0x1658/0x1f80 [ 3254.813602][T29548] ? mutex_trylock+0x1e0/0x1e0 [ 3254.818395][T29548] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 3254.823864][T29548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3254.830103][T29548] ? wait_for_completion+0x440/0x440 [ 3254.835392][T29548] rdma_listen+0xa3/0x970 [ 3254.839729][T29548] ucma_listen+0x14d/0x1c0 [ 3254.844149][T29548] ? ucma_notify+0x190/0x190 [ 3254.848838][T29548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3254.855197][T29548] ? _copy_from_user+0xdd/0x150 [ 3254.860060][T29548] ucma_write+0x2da/0x3c0 [ 3254.864428][T29548] ? ucma_notify+0x190/0x190 [ 3254.869056][T29548] ? ucma_open+0x290/0x290 [ 3254.873516][T29548] ? apparmor_file_permission+0x25/0x30 [ 3254.879097][T29548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3254.885372][T29548] ? security_file_permission+0x94/0x380 [ 3254.891058][T29548] __vfs_write+0x8d/0x110 [ 3254.895397][T29548] ? ucma_open+0x290/0x290 [ 3254.899842][T29548] vfs_write+0x20c/0x580 [ 3254.904141][T29548] ksys_write+0xea/0x1f0 [ 3254.908387][T29548] ? __ia32_sys_read+0xb0/0xb0 [ 3254.913164][T29548] ? do_syscall_64+0x26/0x610 [ 3254.917870][T29548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3254.923944][T29548] ? do_syscall_64+0x26/0x610 [ 3254.928649][T29548] __x64_sys_write+0x73/0xb0 [ 3254.933263][T29548] do_syscall_64+0x103/0x610 [ 3254.937858][T29548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3254.943738][T29548] RIP: 0033:0x458209 [ 3254.947620][T29548] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3254.967238][T29548] RSP: 002b:00007f9d51338c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3254.975756][T29548] RAX: ffffffffffffffda RBX: 00007f9d51338c90 RCX: 0000000000458209 [ 3254.983727][T29548] RDX: 0000000000000010 RSI: 0000000020000240 RDI: 0000000000000003 [ 3254.991709][T29548] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3254.999723][T29548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d513396d4 [ 3255.007719][T29548] R13: 00000000004c7440 R14: 00000000004dcf40 R15: 0000000000000004 20:32:43 executing program 5 (fault-call:3 fault-nth:2): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 20:32:43 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfst', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3255.176240][T29637] FAULT_INJECTION: forcing a failure. [ 3255.176240][T29637] name failslab, interval 1, probability 0, space 0, times 0 20:32:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3255.222085][T29637] CPU: 0 PID: 29637 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3255.231250][T29637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3255.241343][T29637] Call Trace: [ 3255.244666][T29637] dump_stack+0x172/0x1f0 [ 3255.249226][T29637] should_fail.cold+0xa/0x15 [ 3255.253847][T29637] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3255.259683][T29637] ? ___might_sleep+0x163/0x280 [ 3255.264555][T29637] __should_failslab+0x121/0x190 20:32:43 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\b', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3255.269556][T29637] should_failslab+0x9/0x14 [ 3255.274079][T29637] kmem_cache_alloc+0x2b2/0x6f0 [ 3255.278969][T29637] ? save_stack+0x45/0xd0 [ 3255.283340][T29637] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3255.289165][T29637] ? kasan_kmalloc+0x9/0x10 [ 3255.293688][T29637] ? kmem_cache_alloc_trace+0x151/0x760 [ 3255.299255][T29637] ? cma_alloc_port+0x4d/0x190 [ 3255.304052][T29637] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 3255.310417][T29637] idr_get_free+0x425/0x8d0 [ 3255.314973][T29637] idr_alloc_u32+0x19e/0x330 [ 3255.319607][T29637] ? __fprop_inc_percpu_max+0x230/0x230 [ 3255.325204][T29637] ? cma_pernet_idr+0x13f/0x2e0 [ 3255.330086][T29637] idr_alloc+0xe5/0x150 [ 3255.334267][T29637] ? idr_alloc_u32+0x330/0x330 [ 3255.339049][T29637] ? kasan_check_read+0x11/0x20 [ 3255.343919][T29637] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 3255.349833][T29637] cma_alloc_port+0xab/0x190 [ 3255.354525][T29637] rdma_bind_addr+0x1658/0x1f80 [ 3255.359390][T29637] ? mutex_trylock+0x1e0/0x1e0 [ 3255.364167][T29637] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 3255.369648][T29637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3255.375908][T29637] ? wait_for_completion+0x440/0x440 [ 3255.381222][T29637] rdma_listen+0xa3/0x970 [ 3255.385569][T29637] ucma_listen+0x14d/0x1c0 [ 3255.390000][T29637] ? ucma_notify+0x190/0x190 [ 3255.394613][T29637] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3255.400867][T29637] ? _copy_from_user+0xdd/0x150 [ 3255.405742][T29637] ucma_write+0x2da/0x3c0 [ 3255.410075][T29637] ? ucma_notify+0x190/0x190 [ 3255.414691][T29637] ? ucma_open+0x290/0x290 20:32:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x82000, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000180)=""/167, 0xa7) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000240)={0x3f, {{0xa, 0x4e22, 0x5, @remote}}}, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 3255.419117][T29637] ? apparmor_file_permission+0x25/0x30 [ 3255.424679][T29637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3255.430922][T29637] ? security_file_permission+0x94/0x380 [ 3255.436549][T29637] __vfs_write+0x8d/0x110 [ 3255.440886][T29637] ? ucma_open+0x290/0x290 [ 3255.445326][T29637] vfs_write+0x20c/0x580 [ 3255.449595][T29637] ksys_write+0xea/0x1f0 [ 3255.453848][T29637] ? __ia32_sys_read+0xb0/0xb0 [ 3255.458609][T29637] ? do_syscall_64+0x26/0x610 [ 3255.463289][T29637] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.469380][T29637] ? do_syscall_64+0x26/0x610 [ 3255.474071][T29637] __x64_sys_write+0x73/0xb0 [ 3255.478675][T29637] do_syscall_64+0x103/0x610 [ 3255.483280][T29637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.489166][T29637] RIP: 0033:0x458209 [ 3255.493059][T29637] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3255.512680][T29637] RSP: 002b:00007f9d51338c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3255.521083][T29637] RAX: ffffffffffffffda RBX: 00007f9d51338c90 RCX: 0000000000458209 [ 3255.529070][T29637] RDX: 0000000000000010 RSI: 0000000020000240 RDI: 0000000000000003 [ 3255.537028][T29637] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3255.544988][T29637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d513396d4 [ 3255.552953][T29637] R13: 00000000004c7440 R14: 00000000004dcf40 R15: 0000000000000004 20:32:44 executing program 5 (fault-call:3 fault-nth:3): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 20:32:44 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfX\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 3255.755377][T29681] hfs: can't find a HFS filesystem on dev loop2 20:32:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x16, 0x8, 0xfa00, {r1}}, 0x10) 20:32:44 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsz', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x20000248, 0xfa00, {r1}}, 0x10) 20:32:44 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfc\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:44 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\t', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x20000250, 0xfa00, {r1}}, 0x10) 20:32:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e0006bf5ffff0200178c0c9b4b1c6af07d874f5eb40095260a00000001000000e0002001"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x4000) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000200), 0xfffffffffffffe72) [ 3256.470192][T29833] hfs: can't find a HFS filesystem on dev loop2 20:32:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa02, {r1}}, 0x10) 20:32:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs%', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:45 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\xdc', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 20:32:45 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfd\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs ', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0x3f00}}, 0x10) 20:32:45 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\xf2', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:45 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r2, 0x2, 0x30}, &(0x7f0000000180)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:46 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\n', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0xc3e5}}, 0x10) 20:32:46 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfi\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0xe5c3}}, 0x10) 20:32:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0x2000000}}, 0x10) [ 3257.969397][T30286] hfs: can't find a HFS filesystem on dev loop2 20:32:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0x3f000000}}, 0x10) 20:32:46 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfsG', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:46 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:47 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfl\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0xc3e50000}}, 0x10) 20:32:47 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\f', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 3258.475356][T30429] hfs: can't find a HFS filesystem on dev loop2 20:32:47 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\xe4', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0x200000000000000}}, 0x10) 20:32:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x10', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0x3f00000000000000}}, 0x10) 20:32:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xfffffffffffff1e5, 0x800000000000000, "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", 0x1, 0x0, 0x1, 0x0, 0x4, 0x8, 0x7}, r2}}, 0x120) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:47 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfo\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1, 0xc3e5000000000000}}, 0x10) 20:32:47 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x7) 20:32:48 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfp\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:48 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x5, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="be26c48abf38065d9a6f93ae8a2487b0989152153b397a2f9f6aed66ca0cd46bed3a93900f850abfc00601f905354c5577b073b1bba5bf18937e05c0a9f579deb7bac1dc9d29e67177f0c1a233a500368b7c4a1616511c1fc0cadf023c47b0"]) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_read_part_table(0x7fffffff, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x100) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x0e', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x20000250) [ 3259.512460][T30707] BFS-fs: bfs_fill_super(): loop1 is unclean, continuing 20:32:48 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x4, 0x12200) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r1, 0x10, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x4000) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000780)={'filter\x00', 0x1000, "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"}, &(0x7f00000000c0)=0x1024) r3 = socket$inet(0x2, 0x2, 0x5) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) 20:32:48 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\'', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 20:32:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) kexec_load(0x800, 0x9, &(0x7f0000000700)=[{&(0x7f00000000c0)="41d754bb3288d9a2bd71d55cb74ffb4a51a7932d2ea0d5908f773086eeaf2c1af71cc54b89ecf4077783d97762c8ef56d39c8f104e21d89ba41d42d2f691c633ea0c71b4ef6b07bc9fa64e787728a6c7046d77f3bff215b6e7b7fcb73cffa3474945220dde41ba112a55364002e8a706061347e0917c99a3e6ac7ddae7f427", 0x7f, 0x9, 0x8001}, {&(0x7f0000000040)="944ecb36c959d270e4a76469148362ee562f3160944386f0110e8f197ae0", 0x1e, 0x1, 0x1f}, {&(0x7f0000000140)="161c362cffce1b53ed1099dc322b3af9c1e8f9ae0340ffcdc4d1b0f093c6858a9f259925bc65eade5c724e727e6a8ef945581b97a96af8c5f1b3c8c8c9c0f4f81faa6e0f9129cf353a0d7b7e4f8f6190a3603e28889d6d9dc865fe3dc704b5c013c1dcaedc4381b0788268db706fdf390a109367b209da8504046c404e61d4a18d0b93476753faf2a62a0aa8ec81ca73a230cfba5e7ebf3ee5004796d609f6837a62e972642217657d673dd3aba75230b3c904e099a66e9c8a27e46cb93df9e6be766c8d4a0c311f", 0xc8, 0x101, 0x8}, {&(0x7f0000000280)="e868261faf2fa1441651e682a9083401837f680c38dcabb29f789faa685b22e477d4e03d0bfb9b9cb18334c2b2523c8d73accbd69a002bdf58e41a717b3ca47e20d4757e51b55058fbbed34ad4", 0x4d, 0x9, 0xfffffffffffff421}, {&(0x7f0000000300)="5983e8d497401b90da6b514291041aa5e2", 0x11, 0x1, 0x7}, {&(0x7f0000000340)="149e0df5780c0b821f941340ac4b9e84cbacb59ed8367c5b26586de88b913691370917e22d517d1ede7df8dc6efa212166ba48d12a7aaf7a7c0bce804766cc50b7a2bf93bdc3f1c08f885ea5e655396039145892884e0a455ab83f80bc5503c85fe29940ec384629b41e62b624fb6a014b7de3c02bfa8bcf48d28993a6ec30f5a531015e4150e3ef12fb88f20e1bc66a0f86fb17294fc9a2deaf9b102c20e490af1d0e8529f780ab2a29466d7ab0d06ba4b42e876165135ee31a1c2a832e0979dd6c945f17e8933f761bb3d2e9e1e0bc5bf288011df8168c7347126c916517edc83b2581b0ad893bd8005a08627e5e03", 0xf0, 0xbc6, 0x5}, {&(0x7f0000000440)="5b6351211d948587b11f2ed4eaefef054076d4ddb5292ca50bd99e738123d9897dc9bec46d9d988639bd5af41d3e997c24fd16c2a83c7c520de309bdd96b2be0798baf60ffa0ecc124197241fc81490f308d45b0c26901cd541a90c4c36b2165", 0x60, 0x2, 0x2247}, {&(0x7f0000000540)="fa1c077e20f65a1d9b1489ab6496e41f006cdae18587f45392ad94a9cdd78d00e73a91ca47bf0df189b836ea05a1b3fcb607473483282be7e3ad48611d949c58c2f7ed873398716f9b5ca3c38fa6aeab4d5b77bed567f88c41feb9cd80a4430eefe74673c42a0bcba4339f71958c3e8704cf8e1dcffe95f8c845fff49967", 0x7e, 0xfffffffffffffeff, 0x7}, {&(0x7f00000005c0)="400c93e40d31fe7c1daa0c0db7a0e813e407acac6ffd0de686e3cfe7c21525cbf9aa84ef1be5995bef4e3066d0232cae13f1d3d92ae17888920f42083f106de198fcc82cb851c037b4d302bf6426a423254db3d77d230a8fca05e27da9abfef0cd3200ca6100442c52a53b760d4f73aea3046fb6bfe96f75776891ef4d0cfdff1fdf0c36b58b5411960223ab9bbaf206a44105df4021d3942956b26e020c299f774e1ff4cd38f23489da7cd1e34947bf48aa88083617415c8c16", 0xba, 0x8, 0x2}], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) socketpair(0x1b, 0xa, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCNRDECOBS(r2, 0x89e2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 3259.822265][T30749] hfs: can't find a HFS filesystem on dev loop2 20:32:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@generic, &(0x7f0000000040)=0x80) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000140)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @local}}, 0x0, 0xcf5}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r3, @in={{0x2, 0x4e23, @local}}, 0xcf, 0x8, 0x9ed4, 0x6}, 0x98) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) socket$pptp(0x18, 0x1, 0x2) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r2}}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x8cf}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r4, 0x9}, 0x8) 20:32:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x0f', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:32:48 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sched_setscheduler(0x0, 0x0, 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfu\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 20:32:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000004c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7fffffff, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = dup3(r0, r0, 0x80000) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000200)=0x8, &(0x7f0000000280)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregset(0x4205, r3, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)="d13394ca4274921c7f6a9cf8972f245b7da2f6f3dc4a25fdd90c82b3cbedadffd90b1445e6615199dbff81461c4b0e630a76c67b9120be3e7075590a65cb16f1302c7c96e825a0acba1564e514326ad0afd4378214f514e67f4a3cad85526294a4633d45ce0b910acc42432c0156d96e4b8ce3bfa48222ae5368dcaf5ad49e2c37ab1aa3314d70dae404a7721d79c2fb5c9ea487b1a0eb1b7321cdbe5398365ef5118979e9346f7c512fdc831cb5e11d5759727d9da49d9d36297acf856c788938ed6be773205f19b60e75", 0xcb}) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) [ 3260.371004][T30919] ================================================================== [ 3260.379684][T30919] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 3260.386901][T30919] Read of size 8 at addr ffff8880957e4d60 by task syz-executor.5/30919 [ 3260.395166][T30919] [ 3260.397516][T30919] CPU: 0 PID: 30919 Comm: syz-executor.5 Not tainted 5.1.0-rc2-next-20190327 #12 [ 3260.406640][T30919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3260.416714][T30919] Call Trace: [ 3260.420033][T30919] dump_stack+0x172/0x1f0 [ 3260.424376][T30919] ? __list_add_valid+0x9a/0xa0 [ 3260.429239][T30919] print_address_description.cold+0x7c/0x20d [ 3260.435231][T30919] ? __list_add_valid+0x9a/0xa0 [ 3260.440099][T30919] ? __list_add_valid+0x9a/0xa0 [ 3260.444970][T30919] kasan_report.cold+0x1b/0x40 [ 3260.449754][T30919] ? __list_add_valid+0x9a/0xa0 [ 3260.454643][T30919] __asan_report_load8_noabort+0x14/0x20 [ 3260.460293][T30919] __list_add_valid+0x9a/0xa0 [ 3260.464983][T30919] rdma_listen+0x6b7/0x970 [ 3260.469438][T30919] ucma_listen+0x14d/0x1c0 [ 3260.473868][T30919] ? ucma_notify+0x190/0x190 [ 3260.478472][T30919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3260.484731][T30919] ? _copy_from_user+0xdd/0x150 [ 3260.489609][T30919] ucma_write+0x2da/0x3c0 [ 3260.493956][T30919] ? ucma_notify+0x190/0x190 [ 3260.498557][T30919] ? ucma_open+0x290/0x290 [ 3260.502999][T30919] ? apparmor_file_permission+0x25/0x30 [ 3260.508557][T30919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3260.514824][T30919] ? security_file_permission+0x94/0x380 20:32:49 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f00729a69e6f96f8f2938a838a68cb05363db9508d8b1a05bee970160166f1feeaa7420f31ccdbce0ba8f3c99eb5593cc0628fa"], 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\xfc\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffa000/0x4000)=nil) [ 3260.520478][T30919] __vfs_write+0x8d/0x110 [ 3260.524821][T30919] ? ucma_open+0x290/0x290 [ 3260.529255][T30919] vfs_write+0x20c/0x580 [ 3260.533536][T30919] ksys_write+0xea/0x1f0 [ 3260.537800][T30919] ? __ia32_sys_read+0xb0/0xb0 [ 3260.542578][T30919] ? do_syscall_64+0x26/0x610 [ 3260.547294][T30919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3260.553390][T30919] ? do_syscall_64+0x26/0x610 [ 3260.558195][T30919] __x64_sys_write+0x73/0xb0 [ 3260.562819][T30919] do_syscall_64+0x103/0x610 [ 3260.567440][T30919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3260.573370][T30919] RIP: 0033:0x458209 [ 3260.577297][T30919] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3260.596895][T30919] RSP: 002b:00007f9d51338c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3260.605384][T30919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 3260.613386][T30919] RDX: 0000000000000010 RSI: 0000000020000240 RDI: 0000000000000003 [ 3260.621381][T30919] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3260.629369][T30919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d513396d4 [ 3260.637336][T30919] R13: 00000000004c7440 R14: 00000000004dcf40 R15: 00000000ffffffff [ 3260.645324][T30919] [ 3260.647640][T30919] Allocated by task 30775: [ 3260.652070][T30919] save_stack+0x45/0xd0 [ 3260.656230][T30919] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3260.661857][T30919] kasan_kmalloc+0x9/0x10 [ 3260.666185][T30919] kmem_cache_alloc_trace+0x151/0x760 [ 3260.671543][T30919] __rdma_create_id+0x5f/0x4e0 [ 3260.676291][T30919] ucma_create_id+0x1de/0x640 [ 3260.680999][T30919] ucma_write+0x2da/0x3c0 [ 3260.685349][T30919] __vfs_write+0x8d/0x110 [ 3260.689677][T30919] vfs_write+0x20c/0x580 [ 3260.693910][T30919] ksys_write+0xea/0x1f0 [ 3260.698148][T30919] __x64_sys_write+0x73/0xb0 [ 3260.702732][T30919] do_syscall_64+0x103/0x610 [ 3260.707314][T30919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3260.713195][T30919] [ 3260.715524][T30919] Freed by task 30762: [ 3260.719581][T30919] save_stack+0x45/0xd0 [ 3260.723721][T30919] __kasan_slab_free+0x102/0x150 [ 3260.728741][T30919] kasan_slab_free+0xe/0x10 [ 3260.733251][T30919] kfree+0xcf/0x230 [ 3260.737047][T30919] rdma_destroy_id+0x719/0xaa0 [ 3260.741893][T30919] ucma_close+0x115/0x320 [ 3260.746231][T30919] __fput+0x2e5/0x8d0 [ 3260.750216][T30919] ____fput+0x16/0x20 [ 3260.754270][T30919] task_work_run+0x14a/0x1c0 [ 3260.758867][T30919] exit_to_usermode_loop+0x273/0x2c0 [ 3260.764149][T30919] do_syscall_64+0x52d/0x610 [ 3260.768743][T30919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3260.774654][T30919] [ 3260.776974][T30919] The buggy address belongs to the object at ffff8880957e4b80 [ 3260.776974][T30919] which belongs to the cache kmalloc-2k of size 2048 [ 3260.791026][T30919] The buggy address is located 480 bytes inside of [ 3260.791026][T30919] 2048-byte region [ffff8880957e4b80, ffff8880957e5380) [ 3260.804437][T30919] The buggy address belongs to the page: [ 3260.810076][T30919] page:ffffea000255f900 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 3260.820854][T30919] flags: 0x1fffc0000010200(slab|head) [ 3260.826224][T30919] raw: 01fffc0000010200 ffffea0002380388 ffffea00025ddd88 ffff88812c3f0c40 [ 3260.834890][T30919] raw: 0000000000000000 ffff8880957e4300 0000000100000003 0000000000000000 [ 3260.843636][T30919] page dumped because: kasan: bad access detected [ 3260.850063][T30919] [ 3260.852377][T30919] Memory state around the buggy address: [ 3260.858002][T30919] ffff8880957e4c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3260.866055][T30919] ffff8880957e4c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3260.874107][T30919] >ffff8880957e4d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3260.882154][T30919] ^ [ 3260.889346][T30919] ffff8880957e4d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3260.897399][T30919] ffff8880957e4e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3260.905447][T30919] ================================================================== [ 3260.913493][T30919] Disabling lock debugging due to kernel taint [ 3260.929910][T30919] Kernel panic - not syncing: panic_on_warn set ... [ 3260.936649][T30919] CPU: 1 PID: 30919 Comm: syz-executor.5 Tainted: G B 5.1.0-rc2-next-20190327 #12 [ 3260.947190][T30919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3260.957322][T30919] Call Trace: [ 3260.960647][T30919] dump_stack+0x172/0x1f0 [ 3260.965081][T30919] panic+0x2cb/0x65c [ 3260.968971][T30919] ? __warn_printk+0xf3/0xf3 [ 3260.973551][T30919] ? __list_add_valid+0x9a/0xa0 [ 3260.978395][T30919] ? preempt_schedule+0x4b/0x60 [ 3260.983242][T30919] ? ___preempt_schedule+0x16/0x18 [ 3260.988361][T30919] ? trace_hardirqs_on+0x5e/0x230 [ 3260.993392][T30919] ? __list_add_valid+0x9a/0xa0 [ 3260.998269][T30919] end_report+0x47/0x4f [ 3261.002449][T30919] ? __list_add_valid+0x9a/0xa0 [ 3261.007309][T30919] kasan_report.cold+0xe/0x40 [ 3261.012007][T30919] ? __list_add_valid+0x9a/0xa0 [ 3261.016867][T30919] __asan_report_load8_noabort+0x14/0x20 [ 3261.022493][T30919] __list_add_valid+0x9a/0xa0 [ 3261.027164][T30919] rdma_listen+0x6b7/0x970 [ 3261.031581][T30919] ucma_listen+0x14d/0x1c0 [ 3261.035992][T30919] ? ucma_notify+0x190/0x190 [ 3261.040585][T30919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3261.046853][T30919] ? _copy_from_user+0xdd/0x150 [ 3261.051705][T30919] ucma_write+0x2da/0x3c0 [ 3261.056040][T30919] ? ucma_notify+0x190/0x190 [ 3261.060641][T30919] ? ucma_open+0x290/0x290 [ 3261.065064][T30919] ? apparmor_file_permission+0x25/0x30 [ 3261.070605][T30919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3261.076843][T30919] ? security_file_permission+0x94/0x380 [ 3261.082504][T30919] __vfs_write+0x8d/0x110 [ 3261.086856][T30919] ? ucma_open+0x290/0x290 [ 3261.091279][T30919] vfs_write+0x20c/0x580 [ 3261.095527][T30919] ksys_write+0xea/0x1f0 [ 3261.099795][T30919] ? __ia32_sys_read+0xb0/0xb0 [ 3261.104563][T30919] ? do_syscall_64+0x26/0x610 [ 3261.109242][T30919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3261.115306][T30919] ? do_syscall_64+0x26/0x610 [ 3261.119982][T30919] __x64_sys_write+0x73/0xb0 [ 3261.124604][T30919] do_syscall_64+0x103/0x610 [ 3261.129208][T30919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3261.135126][T30919] RIP: 0033:0x458209 [ 3261.139027][T30919] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3261.158656][T30919] RSP: 002b:00007f9d51338c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3261.167065][T30919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 3261.175046][T30919] RDX: 0000000000000010 RSI: 0000000020000240 RDI: 0000000000000003 [ 3261.183631][T30919] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3261.191683][T30919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d513396d4 [ 3261.199674][T30919] R13: 00000000004c7440 R14: 00000000004dcf40 R15: 00000000ffffffff [ 3261.208595][T30919] Kernel Offset: disabled [ 3261.212932][T30919] Rebooting in 86400 seconds..