[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.750635] kauditd_printk_skb: 8 callbacks suppressed [ 28.750648] audit: type=1800 audit(1543802488.924:29): pid=5882 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.782337] audit: type=1800 audit(1543802488.924:30): pid=5882 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.200' (ECDSA) to the list of known hosts. 2018/12/03 02:01:38 fuzzer started syzkaller login: [ 39.660255] cc1 (6041) used greatest stack depth: 15328 bytes left 2018/12/03 02:01:40 dialing manager at 10.128.0.26:35001 2018/12/03 02:01:40 syscalls: 1 2018/12/03 02:01:40 code coverage: enabled 2018/12/03 02:01:40 comparison tracing: enabled 2018/12/03 02:01:40 setuid sandbox: enabled 2018/12/03 02:01:40 namespace sandbox: enabled 2018/12/03 02:01:40 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/03 02:01:40 fault injection: enabled 2018/12/03 02:01:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/03 02:01:40 net packet injection: enabled 2018/12/03 02:01:40 net device setup: enabled 02:04:41 executing program 0: socket$inet6(0xa, 0x803, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x26, 0x4000000000004) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/sequencer2\x00', 0x141082, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1000000000001, 0x1, [0x1, 0x101, 0x3ff, 0x40, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x209ffe, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x40044, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000180)=ANY=[@ANYBLOB="000128bd7000fdb1beb7d4000000080003003bddff19080001064e230000dba2"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000800)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="09022b1f805d441ff1c13b948900e21d2975ed345d7c1ac477714acbcf55748aaeea2768e13b1bfa08bcbdb6248478a2f0aed119d5dd8b14bd371235da86a012d3c2f6fc5e6b232c7b7be48c98393ba83dfc625b794a923ff648ef11276f4f6b4ef519e493a9e5b5fbe33ea817beae875051f4448462d6935fdac5f091b18f11236f170c5310f32b315ceb9cbbec87fa02d6e197b3aed7d43a402681c6374fa28584943e2a38bc14989895ec880ef6f71d13e522b26cb7159ced835aa57ea9734f602724552e9bb615"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r0, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r6, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="0800010000000030"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r2, 0x80089ec, &(0x7f0000000880)="039625617620ce22df177564b4b07c978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4aa56ad0c09ea49d5a2b1504ffa828508c3eaae4df2759d4d1abdea9a6f5dd2af16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcd") r7 = syz_open_dev$usb(&(0x7f0000000a80)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000780)='/dev/snd/timer\x00', 0x0, 0x40000407c) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f0000000240)) [ 221.923971] IPVS: ftp: loaded support on port[0] = 21 02:04:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000540)={0x0, 0x7000000, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x20000494}}, 0x0) [ 222.377041] IPVS: ftp: loaded support on port[0] = 21 02:04:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) [ 222.707493] IPVS: ftp: loaded support on port[0] = 21 02:04:43 executing program 3: socket$inet6(0xa, 0x0, 0x0) getuid() r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x768}) [ 223.397318] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.415020] IPVS: ftp: loaded support on port[0] = 21 [ 223.418445] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.439673] device bridge_slave_0 entered promiscuous mode [ 223.581128] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.587704] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.598917] device bridge_slave_1 entered promiscuous mode 02:04:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r0, &(0x7f0000014fc8)={&(0x7f0000000080)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) [ 223.743258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.773128] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.798489] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.805990] device bridge_slave_0 entered promiscuous mode [ 223.893374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.940621] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.947066] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.967497] device bridge_slave_1 entered promiscuous mode [ 223.973404] IPVS: ftp: loaded support on port[0] = 21 [ 224.144604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 02:04:44 executing program 5: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@broadcast, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast1, {[@generic={0x97, 0x2}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 224.310987] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.341658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.464044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.503118] IPVS: ftp: loaded support on port[0] = 21 [ 224.707555] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.716458] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.739727] device bridge_slave_0 entered promiscuous mode [ 224.828747] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.847647] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.879502] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.888222] device bridge_slave_1 entered promiscuous mode [ 224.941647] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.001431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.102609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.125960] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 225.139090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.166015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.190466] team0: Port device team_slave_0 added [ 225.252015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.275312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.315417] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.359043] team0: Port device team_slave_1 added [ 225.510931] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.534551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.558957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.572026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.647161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.693577] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.718482] team0: Port device team_slave_0 added [ 225.732743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.748452] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.754819] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.779531] device bridge_slave_0 entered promiscuous mode [ 225.810562] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.819144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.842396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.879513] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.886914] team0: Port device team_slave_1 added [ 225.920060] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.927257] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.945980] device bridge_slave_1 entered promiscuous mode [ 225.953853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.969003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.979226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.021152] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.072948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.089973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.097251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.119704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.149078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.164704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.225565] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.232243] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.249840] device bridge_slave_0 entered promiscuous mode [ 226.267540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.276054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.294101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.305677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.400985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.408112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.416899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.440301] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.446678] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.464181] device bridge_slave_1 entered promiscuous mode [ 226.561445] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.577637] team0: Port device team_slave_0 added [ 226.589438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.623247] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.712782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.733383] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.752950] team0: Port device team_slave_1 added [ 226.786305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.846905] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.869522] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.881975] device bridge_slave_0 entered promiscuous mode [ 226.899677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.965626] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.988762] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.014648] device bridge_slave_1 entered promiscuous mode [ 227.029214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.040300] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.047907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.153072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.161064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.175782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.190042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.210464] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.258799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.266040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.299028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.317205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.372613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.483193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.503115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.515040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.539160] team0: Port device team_slave_0 added [ 227.592879] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.599426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.606400] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.612827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.627781] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.640324] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.650124] team0: Port device team_slave_1 added [ 227.775616] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.795710] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.899324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.950396] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.966964] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.973401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.980128] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.986509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.032513] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.048179] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.055720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.072391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.080335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.090057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.102031] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.119787] team0: Port device team_slave_0 added [ 228.126005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.135626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.154622] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.171321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.199529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.264658] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.280185] team0: Port device team_slave_1 added [ 228.287417] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.310010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.425119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.437146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.448790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.560882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.568584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.588899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.709401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.716566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.739309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.749483] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.755845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.762594] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.768991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.776521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.797106] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.819204] team0: Port device team_slave_0 added [ 228.895379] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.909128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.920495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.969634] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.984018] team0: Port device team_slave_1 added [ 229.063330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.142438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.165136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.174055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.291332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 229.301482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.316097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.444786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.458871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.479312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.595835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.612349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.620927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.641173] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.647531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.654230] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.660670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.677103] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.071608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.435436] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.441872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.448615] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.454996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.475172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.098597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.142165] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.148604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.155264] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.161715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.169563] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.139317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.928737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.243293] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.301507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.719187] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.771983] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.778138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.785972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.065955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.199706] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.205879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.214952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.251921] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.530861] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.669745] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.840439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.057514] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.071663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.081094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.337982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.380202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.551449] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.749391] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.755568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.763503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.867862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.210510] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.341905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.348095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.359534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.419854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.872680] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.899191] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.369867] hrtimer: interrupt took 31757 ns [ 237.376747] bond0: Error: Device is in use and cannot be enslaved 02:04:57 executing program 1: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000440)='ns/user\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r0) r3 = add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000480)="b55d55117f939ca3782f8f17d7c4f2333e01ded5bb4f89807f7e922cee02dc643f45d57b3430e8ead3a35ccf2f5d69f8156d2746241e03f5c6b2bb007b8cb7d768fb224f789a1a57dda197572a9175564db0142b5db48f88c14a4307367373081283d7d6c8218eec672c9acad5dc87062945f5b70d91fcb999d5a076e587e3022c5bef1d81d0cc48f4738df2f086f37d617dda94ffdae488c5c2b7a0673e9e822c9013dc6e6eeb5c9909c00d6b5cf6b29a121e2b37de12252b2137ce3c62984022760b47c125b66809960a82392797edcb6cc96f5a255c506314a5451d0d7c92e516b7342fdb7a90eb89", 0xea, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r3, 0x101) pipe2(&(0x7f0000000340), 0x4000) fsetxattr$security_smack_transmute(r1, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x11, 0x40000000000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0, &(0x7f0000000780)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19", 0x1000, &(0x7f0000000100)) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) unlink(&(0x7f0000000100)='./file0\x00') r4 = fcntl$getown(r2, 0x9) syz_open_procfs$namespace(r4, &(0x7f0000000380)='ns/pid\x00') open(&(0x7f0000000300)='./file0\x00', 0x0, 0x20) [ 237.458419] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.468748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.475880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.520196] bond0: Error: Device is in use and cannot be enslaved 02:04:57 executing program 0: socket$inet6(0xa, 0x803, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x26, 0x4000000000004) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/sequencer2\x00', 0x141082, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1000000000001, 0x1, [0x1, 0x101, 0x3ff, 0x40, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x209ffe, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x40044, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000180)=ANY=[@ANYBLOB="000128bd7000fdb1beb7d4000000080003003bddff19080001064e230000dba2"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000800)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="09022b1f805d441ff1c13b948900e21d2975ed345d7c1ac477714acbcf55748aaeea2768e13b1bfa08bcbdb6248478a2f0aed119d5dd8b14bd371235da86a012d3c2f6fc5e6b232c7b7be48c98393ba83dfc625b794a923ff648ef11276f4f6b4ef519e493a9e5b5fbe33ea817beae875051f4448462d6935fdac5f091b18f11236f170c5310f32b315ceb9cbbec87fa02d6e197b3aed7d43a402681c6374fa28584943e2a38bc14989895ec880ef6f71d13e522b26cb7159ced835aa57ea9734f602724552e9bb615"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r0, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r6, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="0800010000000030"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r2, 0x80089ec, &(0x7f0000000880)="039625617620ce22df177564b4b07c978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4aa56ad0c09ea49d5a2b1504ffa828508c3eaae4df2759d4d1abdea9a6f5dd2af16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcd") r7 = syz_open_dev$usb(&(0x7f0000000a80)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000780)='/dev/snd/timer\x00', 0x0, 0x40000407c) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f0000000240)) [ 237.704529] bond0: Error: Device is in use and cannot be enslaved 02:04:58 executing program 0: 02:04:58 executing program 0: [ 237.932474] 8021q: adding VLAN 0 to HW filter on device team0 02:04:58 executing program 0: 02:04:58 executing program 0: 02:04:58 executing program 0: 02:04:58 executing program 0: 02:04:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:04:59 executing program 3: 02:04:59 executing program 4: 02:04:59 executing program 5: 02:04:59 executing program 0: 02:04:59 executing program 1: 02:04:59 executing program 2: 02:04:59 executing program 3: 02:04:59 executing program 4: 02:04:59 executing program 4: 02:04:59 executing program 0: 02:04:59 executing program 5: 02:04:59 executing program 2: 02:04:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="140000000301ffffef7f12b685d3901b00000000"], 0x14}}, 0x0) 02:04:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) poll(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) unshare(0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) accept(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) 02:05:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrandom(0x0, 0x0, 0xfffffffffffffffe) 02:05:00 executing program 5: 02:05:00 executing program 2: 02:05:00 executing program 0: [ 239.961905] audit: type=1804 audit(1543802700.114:31): pid=7684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir095806948/syzkaller.swCwzQ/3/bus" dev="sda1" ino=16530 res=1 02:05:00 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) 02:05:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) 02:05:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) symlinkat(0x0, 0xffffffffffffffff, 0x0) 02:05:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) fstatfs(r0, &(0x7f0000000240)=""/145) 02:05:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000040)) 02:05:00 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x0) 02:05:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000500)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) [ 240.683634] audit: type=1804 audit(1543802700.854:32): pid=7680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir095806948/syzkaller.swCwzQ/3/bus" dev="sda1" ino=16530 res=1 [ 240.706676] audit: type=1804 audit(1543802700.864:33): pid=7684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir095806948/syzkaller.swCwzQ/3/bus" dev="sda1" ino=16530 res=1 [ 240.778004] syz-executor1 (7684) used greatest stack depth: 12544 bytes left [ 240.778185] audit: type=1800 audit(1543802700.944:34): pid=7680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor1" name="bus" dev="sda1" ino=16530 res=0 02:05:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'memory'}]}, 0x8) 02:05:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x10000005452, &(0x7f0000000440)=0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20008005, 0x0, 0x0) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x700, 0x0, 0xffffffffffffff39) 02:05:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) io_setup(0x5, &(0x7f0000000100)=0x0) io_destroy(r0) 02:05:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) io_destroy(0x0) 02:05:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) fremovexattr(0xffffffffffffffff, 0x0) 02:05:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/udp\x00') flock(r0, 0x2) 02:05:01 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, "3f2fa8546e518f1e"}, 0x120) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000980)="4acc582d79a664b845dfb8ee626a97eafc2a28e15d983cb110e823411f632d7041ff470738a9b7a5ea70f60278245a3464dd847146c05aad7d4ec68f4956390fe89703784898e641efc2a86854554b757ca0efe403f110e46481994ab09dbfadaa4cbe0079bc83eef7e47f40fd0f4f5af7d304968c963a19e20803b92b9cff7ded7f9cbc463e43c9a26b3d59e40ca26693f3310de13ac814276b90b9c7a4cb7613bdfafedcabc1a9595d4fe0928fdee85621275bc35fd9d2c2a4e6e63e63d4ead6ec198c7a68a59d76e528f8371024090186e540956371c7a429797c324068134d2230c98d93173ae680ab3b6416e2dc511c58c850d42cf2e115b44c9ba4b131067fe28e5ea9957ce4e58be93dc5038f264cbe37a739c6db8b5dd5812e31e95f95f210d10a56741fc91c6e6552d02e070d09e220cd89e67253a3a76470d0f6e0d43217b824f386b8a6d13198f55afcc51c8b23e4ac891f99ae7fdb341c08938f87346f86cd6b66ef82638b1e1ff361562b430d744359dd5dd6d5ee30c8b2d1357cd67f126b9eaf369877c0006c4c5e81a5c914f0cf028b1343d4b325b49c35e6c87f8ea7c9b8a1aad96ef2a7da871410824c8210637d75eca7156d4e955d19d3e45631414afcd62668b940e433ffa02b0269d42ebc3ddb803545a797be5471e0192b43c0b99899fa5d070f1c995721a00ecfc4507e0b8d518db888337eec3438a68dc4c44426f08d79115d5c63176bd8949569653913450f9e4d3b00ce4cf4a9d5bf8bfb94487225ae8369ef84001bcc38b7c455753f5790ec6aa5f8d3837a11b2c98e57e1b2cfd6cdeeb17de093bc41d8671c1af67525f1445effb54ef997469174b99c8b10416579666d3e9eb4f390baaf15cc1f0a1c77d7a5a5aa824c63a256724b451dfbffc7ceccd8665423e635130147c5d3c64b2c855f060a56a55b4619a8415d88b5447ad6ec3d077bff12b186b8639198d99d052b73b8a2449934be5c404cfbcce76b6cd127556a5de5b810a6e9edbdd78415b92f6c726b81337c8eab9e261a6cff077eec729f8ba460bb05d44b3825fa81adc066eec0d7c165ce345e09cea1fc40b5e7aedd991ac25dd58a59cee888231ef9b3325ff89bc0370142c4ae22e3cddeb0bcf5c7457311f255f62fbbff205e0510164f27ff9c30ec1369ef698152e88d7a3d1098a6090fb560cb2e0b92df2b0ea5b0ec813b4d2291c4c3c1baf57bc38cf20ad7cf473d7b5188be9350ac61d651eccdc34fe89b7088138982ca802022932ae594460af77bb05471ac389318cf046d536a753048364b03bb682aba6cb9597ff2fdb7f7fc64526a77d23c8deee6a84ff2f9b2215a100f8f99e5f53e31fcffc81f69b791d896a5f0600269b48f55aa454242bf581e1d2e1b35e725fb595c86bbae30ef6cdeb7dfb42257bf8ef51cf7134b53a0985328da46838562f202dd9b2c862e59959a5fd5755080e019321e712c5dfc1b2b2f78db30bae08a0f3384fa44616c72442b9a606303ab98dcde21a95fe5029d5f04c783d26f21737bb9b9f8006e1e5f4498f3518d2238b3baff5e76de08f699cc25f643ed0759f2cfd7061c9c1fc249de9f648e6959592a202f8e099b915713d015896ffa5d7d1e4c40a948779a502d3e6c9c8c544c404720f6607a241650393fde7bf5c2063a3a9075cb9fdb3a421cf310dcf38ddc228444b0e2de4bc350fd6c45f6fc99fcec8bd919fe280ec85867f0bf0f049f4a49fbc25e3c1977a0c40e621424fa4846d24dafd28a5471130e1a25ad4103642e362febce1fa7b3410d36fac3841326ce61981d17ab6072e93890a813533a8bcd3ce9f38adb7aa157f9e7fcda349493d291cddce6198adefe845186891431ecd7a3cd48e6b89ab373cedfddc55e17ee0ea2d2b349de29274b58a12803648288a7ba5a98763a66b8675ddf3605fdc286ec2b0754b73f135d8ce590b48e82cbce47d5427bf3f5ffd0ce7fbbe49ed766d02e077b0eed0e3fc691589d86e208df6529187d3faa46ba5fc6c24fc96f58aff544b6c2990983dab835aff7434f94dbc1f012cd19bb847050c7bb7d6916a2a0b64e971700083cd5e82392983ae8977fba2c4d98ecaf6aebf6d11840036148238d2214c91be4f167ff0be7cf06ddc5786bf57e66667ed6f7a8dc883f635cf845becc59f09ba4289e99b1f805335f15ef8bf90b588704bffa536c9b59ebb822e3d471c37b1bf089a49a0a0f8bbf928024f4953c455c31905fcc20bddd70a4b83066d3fd9e27a56d7348e3633abe95a5133945ce31c7d041f1747aebf0f551deab060e09ad5c761266ede6c0f27a96da731206cc443973296c715aa811bf2c6ab385afd2e575ffed39613c40c3e67ffe3a6a7cc7e35a2f966d24c82eb7a24e65da4e879c9436f8a247287d2506e8bdc0e6d12ef771c1f87f61e2afce7b1c3a9382e21ae3e2a420d820901210991dcea40cf91078b7468e12d866403663adc35891dd374b99d996f7e28546ff56ad9fed9d6fce6934bf7b5f167d4f4526ae81d3877fa52f0edb311db232eaf97c503f4f8622e1519ea17e827362eaae654b295bafec7784e471852d04c3abd38c19fabcc12d1d6c85d9580a00445e1871a0e48cc86ac6e3eb18e7860272db3be38ab2a71c5e9d02e86d464c20b4561a5dfd42a8cce104deeb487330b3dbad0b9304488b697843f7fd3737f0b3bee7cdbccdae2a6e45a4d3a92b53fe076af5ab2e9ad45d578a297d1bcb2d9aa1ad2f1c1e894597ed490c4e7a2d3859beb97d6a57bb06d1ee8109e2350a705f5baf855c5c0be57f47d2fc354c28010bddedc83f820a9f0661c9b85c5fd5991fa8ee0fcdf537f434743a008b87a555cdd86abfdebd45b5a2bebbf6b48a44205057a84796c8c6054fe3e12690033d4356174b2d478975425d9478917349ca60a26d79ed686292f2e006d4baf951a7de536b96f582e94de2a815dc39107194db71239fdbecd7ee611d4ae441e6886acabf090c2c2e1f4f655df7bde92d4969efdf2edefa1b9e3f83f766e9b88d9e8c95e5e6d2ac5c4dbd133234c5ec5c65f0086e84207706f74c262b5fdb3cbe13eec1db8bbdce738d4f4dd21e0381e930dbbbb2cb2728d21cd25304c42b87c7a4c039a1e2841069dab32e58d133173d164a6f2acd38a56e5fa899b2d8fc8bb63eab1cd74d416f78d6f3e658924d9f416fbf526e7c3795d9ffaf75528c109b9dd25ec3d380e52fd2b475362f9ff001e4e5b73bc2f2a19876800caa90f145588aeb83e76878d4ce4d7e8687ec2012d89752fbbda438c61aa863c308c540ae5c741769a38032808a87853136fed9164d7240dfb9b7baabcd5830aca574854d27d2ea078cbdf66a9e329977dcfe8d184e76a603c9e13c595152dca122ecdc9dedf8097b86a11119d8776bdd8f091a473a562f1d0f0847d08012a77618c21eac49d1ceeb1dd6312ff40420f109e8597c47c1976bf8c220ead6401371db163de5e76c021862be25a7620b399f6e671d5cfb39d5110386897b23057b443972a834032b1bf488ee769ccf96340f2c46841d549e3621486dc3be59d972e3c474d40dccddb58db66900f86480af024d5cf90c2378ab3f7c121e10f97c700cf03286dd9912fa278d955be34217fe302b596405cebe1d4825c053079b9201069db203c96a8ff80bbb49b0894c6f424d7fbf7965aa39daa2d41795ad922179898a9de64f642f7b02b1170a57e3663d0067f99fc6c0e0b4a851b4ea5ae12c6aa0dbc81ffeb6656e1037c2691df41bff813a095ebd95ded4418cfd0e717a9f3c52695f8a1f2e9e57bcbb65aa5c40760d1ccbf2810f53cc9a63cf2b622a01cf4d18f58f78ced2d4261230d6f1f7909d20c2014be0c5e1591cefccfccad0f32c0395ec2b7a4f90c0263277f38ff7ff437c813b8699d493de67d90776b052278d64a79c7b94573b581f205223297689810145ff97c7d9d1f7647d3177a2a1dbe99119dc008b51de568fe955c78148de3221de6c98cc39b6969eb16638b23330838676061e3fbc971c5d5fb7e412c284d228da054c2855567a2a96dd1a0d8309319e1402f5f5a9049b3bbf888c53589f34baf00996487741aa8706ed35fe72d0b7358b7fed808ce7d2b94cfa4d718e93a84712049ed1e53e65c2e227a166e95074a587066c3f5d97ab2b47816cb7c52b266c94831605fea47bc62aa7c2f16852aa1440b642cf809d6c1a110ad3f443675a219ff596b265ab70c21e1bab5d9209a975972ddedae9e02994721eea0bd318c3ac153d63443d6e3c0af700631066292f3781a12d8f812d10262871726e73731163a5ba0e56aa94213f8c226a86e79b30e40da3cd12373c3325d4b21c83fcf815890080fa5c868bb4689270de43a54d59775b5114cccf64d18a26a0dcd482ca6492b3bc8b3c945ace3ea6cc7ba36c9bf7b6ec4fda5af4330b08e100de127204b933eb71fb021921b0dbb7d1a69c4cd41040aa239074e1893cd2159b49184089cee861e4e3f34f4a051ade0c4e550c2194aee4c507683b7437707d2cd82ab25892c2254680d2ea96724e005e161949e6a5b0f7326966692e207e7741b119d4ce90ab7c3a56098f6151146bc5f42dd670d1fafc68159568cb1a81f9e184c951ad092bb0a08c9c6fc7b56a20702c5b867254161674c88372dcc6f9c55dabbf50dc374c0373233ce34dc874f653d49c6f42c02a593433dc297fba33706213621684bbf2e5588393f3915922f2d07cec7728fbaa752cfa49ed46b2e6e08600d642e8cadbb2e1eae960aecbab929d502ffc0f2f0c2f2e50e278ec7aee90caf5f12ced9c3db68416b32cec97883958a280ee5c95d210ebfc4de070b09a307f53ee7a7ff6eeac43efc92a7727ee384e4d7d48c31045ef7f24a08b6ba864d2c31f10d9df496eb431ed5dbeb59ece4e973a5c34e4f7a7c41a3c29d786d131d68cb26eb97da195b98e7ae0a814b6266cac3f24ea8c041b2a69bae2f0611a9d0fb93683c07eb8e3fe9b39fad4ce8dfda99b476e19c55390311cdfe9331bf3fceb8d27f287acdfe9992d7ac728eea2f1a0884e1312fbf177034643a4da4f67d97fca481803ca636020f0e699889a42d84f1bbfa66bc0f95220c4326d741c26cb41dcdc4f043ad510e8d97037b82a51aae7439666ff72204b7ddf706b1671d4f41c040bc4a20d73d4c73d85fb77992c0610fb50dc8d5dd1a9e084964ef05f126c3a56dc9f7803e595520a4882d994d9430b0fc2f83cd4f65140c110be2efb024e8e1523cf47ad56c3027abcb8fb59a94f314d668babd19635be8e8ce290cabd80ce2daaad60ed17e218c01c554a876189037c29ff42c9be4bb84a025c6ae4e6ccc1b5c57faeb87465ff0e5d092df67bf8aa5d0e43a400000000000000000000000000", 0xee4}], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 02:05:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup2(r1, r2) close(r0) 02:05:01 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x0, 0x0, &(0x7f0000000040), 0x0) 02:05:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x10000005452, &(0x7f0000000440)=0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x0, 0x2, 0x2, &(0x7f0000ffc000/0x4000)=nil}) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20008005, 0x0, 0x0) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x700, 0x0, 0xffffffffffffff39) 02:05:01 executing program 1: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, &(0x7f0000000080), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6000}, {}, {}]}, 0x108) tkill(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) 02:05:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, &(0x7f0000000100)=""/13, &(0x7f000033bffc)=0x282) [ 241.096939] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 02:05:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0x0, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69", 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x10000, 0x1ff, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x0, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={r3, 0xfffffffffffffff7}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1f"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) [ 241.137045] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 241.162781] hid-generic 0000:0000:0000.0001: unknown main item tag 0x5 02:05:01 executing program 0: clone(0x800182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)={0x2, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x400, 0x2}]}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) exit(0x11010000) r2 = dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="000428bd7000000000000c000000"], 0x1}, 0x1, 0x0, 0x0, 0x40c4}, 0x10) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000004c0)={0x0, 0x1, [0x40, 0xb6f9, 0x0, 0x7fc0, 0x5, 0x7, 0x1, 0x6]}) [ 241.195317] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.218022] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.234386] hid-generic 0000:0000:0000.0001: item fetching failed at offset -1162769400 02:05:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000faffffff0000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000003f2fa8546e518f1e"], 0x1) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000980)="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", 0xee4}], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 241.290085] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 02:05:01 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000140)=0x400001) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000100)={0xfffffffffffffff9, 0x4, 0x0, 0xfffffffffffffff9}) 02:05:01 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) 02:05:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000080)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) [ 241.600396] input: syz1 as /devices/virtual/input/input5 [ 241.627688] audit: type=1326 audit(1543802701.794:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7793 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 241.712323] input: syz1 as /devices/virtual/input/input7 02:05:01 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) sendfile(r0, r1, &(0x7f0000d83ff8)=0xc, 0x8000fffffffe) [ 241.969759] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:05:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0x0, 0x0, 0x0, [], 0x0}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:02 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000008c0)=""/255) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69", 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x10000, 0x1ff, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x0, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={r2, 0xfffffffffffffff7}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x0, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f00000001c0)=""/170) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a55"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:02 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x26, 0x4000000000004) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/sequencer2\x00', 0x141082, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1000000000001, 0x1, [0x1, 0x101, 0x3ff, 0x40, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x209ffe, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x40044, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000180)=ANY=[@ANYBLOB="000128bd7000fdb1beb7d4000000080003003bddff19080001064e230000dba2"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000800)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="09022b1f805d441ff1c13b948900e21d2975ed345d7c1ac477714acbcf55748aaeea2768e13b1bfa08bcbdb6248478a2f0aed119d5dd8b14bd371235da86a012d3c2f6fc5e6b232c7b7be48c98393ba83dfc625b794a923ff648ef11276f4f6b4ef519e493a9e5b5fbe33ea817beae875051f4448462d6935fdac5f091b18f11236f170c5310f32b315ceb9cbbec87fa02d6e197b3aed7d43a402681c6374fa28584943e2a38bc14989895ec880ef6f71d13e522b26cb7159ced835aa57ea9734f602724552e9bb615"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r0, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r6, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="0800010000000030"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r2, 0x80089ec, &(0x7f0000000880)="039625617620ce22df177564b4b07c978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4aa56ad0c09ea49d5a2b1504ffa828508c3eaae4df2759d4d1abdea9a6f5dd2af16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcd") r7 = syz_open_dev$usb(&(0x7f0000000a80)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000780)='/dev/snd/timer\x00', 0x0, 0x40000407c) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f0000000240)) 02:05:02 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x3, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9fe132e6"}, 0x0, 0x0, @userptr, 0x4}) 02:05:02 executing program 1: [ 242.369354] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 02:05:02 executing program 1: [ 242.421573] audit: type=1326 audit(1543802702.594:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7793 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 242.451464] bond0: Error: Device is in use and cannot be enslaved 02:05:02 executing program 1: 02:05:02 executing program 3: 02:05:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000080)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000080)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000080)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:02 executing program 3: [ 242.650370] bond0: Error: Device is in use and cannot be enslaved 02:05:02 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x26, 0x4000000000004) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/sequencer2\x00', 0x141082, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1000000000001, 0x1, [0x1, 0x101, 0x3ff, 0x40, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x209ffe, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x40044, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000180)=ANY=[@ANYBLOB="000128bd7000fdb1beb7d4000000080003003bddff19080001064e230000dba2"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000800)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="09022b1f805d441ff1c13b948900e21d2975ed345d7c1ac477714acbcf55748aaeea2768e13b1bfa08bcbdb6248478a2f0aed119d5dd8b14bd371235da86a012d3c2f6fc5e6b232c7b7be48c98393ba83dfc625b794a923ff648ef11276f4f6b4ef519e493a9e5b5fbe33ea817beae875051f4448462d6935fdac5f091b18f11236f170c5310f32b315ceb9cbbec87fa02d6e197b3aed7d43a402681c6374fa28584943e2a38bc14989895ec880ef6f71d13e522b26cb7159ced835aa57ea9734f602724552e9bb615"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r0, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r6, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="0800010000000030"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r2, 0x80089ec, &(0x7f0000000880)="039625617620ce22df177564b4b07c978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4aa56ad0c09ea49d5a2b1504ffa828508c3eaae4df2759d4d1abdea9a6f5dd2af16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcd") r7 = syz_open_dev$usb(&(0x7f0000000a80)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000780)='/dev/snd/timer\x00', 0x0, 0x40000407c) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f0000000240)) 02:05:02 executing program 5: 02:05:03 executing program 3: 02:05:03 executing program 3: 02:05:03 executing program 5: [ 242.946762] bond0: Error: Device is in use and cannot be enslaved 02:05:03 executing program 5: 02:05:03 executing program 3: 02:05:03 executing program 2: 02:05:03 executing program 0: 02:05:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000080)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:03 executing program 2: 02:05:03 executing program 3: 02:05:03 executing program 5: 02:05:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000008c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000080)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0900000000000000240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000804ca000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000f1b54a581b10baa0adc0f7d05a5500fa0fe6369933ebc3b972b7d01098dc8373440dc98a1ac95465375c8d1fc1"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:03 executing program 2: 02:05:03 executing program 0: 02:05:03 executing program 3: 02:05:03 executing program 5: 02:05:03 executing program 2: 02:05:03 executing program 3: 02:05:03 executing program 0: 02:05:03 executing program 4: 02:05:03 executing program 2: 02:05:03 executing program 5: 02:05:03 executing program 0: 02:05:03 executing program 3: 02:05:03 executing program 1: 02:05:03 executing program 5: 02:05:03 executing program 1: 02:05:04 executing program 3: 02:05:04 executing program 0: 02:05:04 executing program 2: 02:05:04 executing program 4: 02:05:04 executing program 2: 02:05:04 executing program 3: 02:05:04 executing program 5: 02:05:04 executing program 1: 02:05:04 executing program 0: 02:05:04 executing program 4: 02:05:04 executing program 5: 02:05:04 executing program 2: 02:05:04 executing program 3: 02:05:04 executing program 0: 02:05:04 executing program 4: 02:05:04 executing program 1: 02:05:04 executing program 2: 02:05:04 executing program 0: 02:05:04 executing program 4: 02:05:04 executing program 5: 02:05:04 executing program 3: 02:05:04 executing program 1: 02:05:04 executing program 2: 02:05:04 executing program 4: 02:05:04 executing program 0: 02:05:04 executing program 5: 02:05:04 executing program 3: 02:05:04 executing program 2: 02:05:04 executing program 1: 02:05:04 executing program 4: 02:05:04 executing program 5: 02:05:04 executing program 3: 02:05:04 executing program 4: 02:05:04 executing program 0: 02:05:04 executing program 1: 02:05:04 executing program 2: 02:05:04 executing program 4: 02:05:04 executing program 3: 02:05:04 executing program 5: 02:05:04 executing program 0: 02:05:05 executing program 2: 02:05:05 executing program 1: 02:05:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x10000005452, &(0x7f0000000440)=0xffffffffffffffff) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20008005, 0x0, 0x0) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x700, 0x0, 0xffffffffffffff39) 02:05:05 executing program 5: unlink(&(0x7f0000000240)='./file0\x00') r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000002c0)={0x7ff, 0x0, 0x4, 'queue0\x00', 0x6a9}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x31) readlinkat(0xffffffffffffffff, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)=""/25, 0x19) lstat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000600)) futimesat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000540)={{0x0, 0x2710}}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000004c0)={0x1f, 0x1f}) openat$md(0xffffffffffffff9c, &(0x7f0000000440)='/dev/md0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f0000000480)='{)\x00') pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') connect$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e22, 0x6, @empty, 0x2}, 0x1c) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x4d2, 0x7}]}, 0x9, 0x3) ioprio_set$uid(0x3, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) 02:05:05 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='net/ipv6_route\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0xfffffffd) 02:05:05 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000980)="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", 0xee4}], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 02:05:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) openat$cgroup_type(r0, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000028000e00000000000000000000000000"], 0x14}}, 0x0) 02:05:05 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x137480, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000080)) 02:05:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000100)=0x78) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x0, 0x0, 0xead, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x1) r2 = dup(r1) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000002c50b7e6f1985e81dc7100070000bf660b14a11100bceda78443"], 0x18}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xffffffffffffff09) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 02:05:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x18, 0x2e, 0x119, 0x0, 0x0, {0x2}, [@nested={0x4}]}, 0x18}}, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x5) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/215) 02:05:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc040, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x9, 0x1000, 0x10000, 0xc0000, 0x3f, 0x7f1b8ce1}) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0xd4, 0x7, 0x3, "f5961c5c88a270270ec8884d9bcb3bd8489833a705bfd13f583fd7a18d521039", 0x32315659}) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000040)={0x9, 0x9}) 02:05:05 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x200001, &(0x7f00000000c0)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46400) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00', 0x0) 02:05:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x0, &(0x7f0000000240)='\x00') r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x100000000000, 0x8) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x10001}, 0x4) 02:05:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000180)=@dstopts, 0x8) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000069c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) epoll_wait(r2, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x4) 02:05:05 executing program 1: syz_emit_ethernet(0x72, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c200fcff0080c200000008004800006400000000000090780000000000000000440c0603e00000010020880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000c51489cd9d535c1bfe2e5a0ee300000000000000"], &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x8) fcntl$setown(r0, 0x8, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000200)={r0, r0, 0x0, 0x1, &(0x7f00000000c0)="f4a05f5294e3dd7edda796fb086336fcb759a0e21c7029d1bebad93d0797cbaaed9d4ab55bc071ca4ace1add560c215b2fc82d77c4da2f5845a0e858a6157848d4ee51eb5904440e93623e210f052cacb93903d6d485b6cb95a5109df4070ffd49f425e923971298ea2fcd8191", 0x0, 0x6, 0xffff, 0xa2, 0x139a, 0x3, 0x1ff, "3076f29028f56086a8e2aa7a860fa431db4801932158b90c85d46361c5384dc155f26072a1e072eaa27318212482b521826053c788dcc7"}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000080)=0x40) 02:05:05 executing program 5: unlink(&(0x7f0000000240)='./file0\x00') r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000002c0)={0x7ff, 0x0, 0x4, 'queue0\x00', 0x6a9}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x31) readlinkat(0xffffffffffffffff, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)=""/25, 0x19) lstat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000600)) futimesat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000540)={{0x0, 0x2710}}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000004c0)={0x1f, 0x1f}) openat$md(0xffffffffffffff9c, &(0x7f0000000440)='/dev/md0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f0000000480)='{)\x00') pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') connect$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e22, 0x6, @empty, 0x2}, 0x1c) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x4d2, 0x7}]}, 0x9, 0x3) ioprio_set$uid(0x3, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) 02:05:05 executing program 4: unlink(&(0x7f0000000240)='./file0\x00') r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000002c0)={0x7ff, 0x0, 0x4, 'queue0\x00', 0x6a9}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x31) readlinkat(0xffffffffffffffff, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)=""/25, 0x19) lstat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000600)) futimesat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000540)={{0x0, 0x2710}}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000004c0)={0x1f, 0x1f}) openat$md(0xffffffffffffff9c, &(0x7f0000000440)='/dev/md0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f0000000480)='{)\x00') pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') connect$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e22, 0x6, @empty, 0x2}, 0x1c) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x4d2, 0x7}]}, 0x9, 0x3) ioprio_set$uid(0x3, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) 02:05:05 executing program 0: unlink(&(0x7f0000000240)='./file0\x00') r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000002c0)={0x7ff, 0x0, 0x4, 'queue0\x00', 0x6a9}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x31) readlinkat(0xffffffffffffffff, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)=""/25, 0x19) lstat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000600)) futimesat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000540)={{0x0, 0x2710}}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000004c0)={0x1f, 0x1f}) openat$md(0xffffffffffffff9c, &(0x7f0000000440)='/dev/md0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f0000000480)='{)\x00') pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') connect$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e22, 0x6, @empty, 0x2}, 0x1c) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x4d2, 0x7}]}, 0x9, 0x3) ioprio_set$uid(0x3, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) [ 245.409517] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:05:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x1, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) syz_emit_ethernet(0x3de, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0180c20000000000140000000800450000240000004000119078ac14140de00000014e2200010401907800d7050200f53475"], 0x0) 02:05:05 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@local}, 0x14) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000480)) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x1d2, 0x4000000, 0x0, 0x0) clone(0x200, &(0x7f0000000380)="25af2ae60aa23f0be234c2af129bbe372d30b3c6ed21e5c7519b786de5b6181798f7bed7b16203d3218023441bdcc948482f034051d429969b0a1297cae0117a7b181d569564d921e76c1851ec9a04a66492d5b6596422719160cf87f089fa0bd0c25edd7d3b96ddbf004f8ddb03f2131445c0b5a461eb40ce83d76edf1ebd32a4f97eeea3db52abfc7e8268ad07fcb08d023bdabc619e88d86aa799288d4a7804029aca215562a89314a97c5fb8c2a6cb4040456c2c6b40", 0x0, &(0x7f0000000300), &(0x7f0000000480)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000640)=0x200000205, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local}}, {{}, 0x0, @in=@local}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000009c0)={@mcast2}) setxattr$trusted_overlay_opaque(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000900)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}]}) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xfffffffffffffffa) bind$netlink(r2, &(0x7f0000000880)={0x10, 0x0, 0x25dfdbff, 0x20000000}, 0xc) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000280)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000a00)=""/186, 0xba) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000980)=0x20) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000340)='./file0\x00', 0x10100, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000200)) prctl$PR_SVE_GET_VL(0x33, 0x1c4b1) ftruncate(r2, 0x80080) [ 245.585174] block nbd2: Attempted send on invalid socket [ 245.591577] print_req_error: I/O error, dev nbd2, sector 0 [ 245.619058] XFS (nbd2): SB validate failed with error -5. 02:05:05 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@ax25, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/141, 0x8d}, {&(0x7f0000000280)=""/139, 0x8b}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000340)=""/99, 0x63}], 0x4, &(0x7f00000003c0)=""/109, 0x6d, 0x7}, 0x10000) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) connect$inet6(r1, &(0x7f0000000c80)={0xa, 0x0, 0x0, @local}, 0x1b) 02:05:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000000)=@ethernet, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)=""/189, 0xbd}, {&(0x7f0000000140)=""/167, 0xa7}, {&(0x7f0000000200)=""/224, 0xe0}, {&(0x7f0000000300)=""/38, 0x26}, {&(0x7f0000000340)=""/173, 0xad}, {&(0x7f0000000400)=""/166, 0xa6}, {&(0x7f00000004c0)=""/73, 0x49}], 0x7, &(0x7f00000005c0)=""/227, 0xe3, 0x5}, 0x7}, {{&(0x7f0000000780)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f0000000800)=""/115, 0x73}, {&(0x7f0000000880)=""/172, 0xac}, {&(0x7f0000000940)}], 0x3, 0x0, 0x0, 0x7}, 0x3}, {{&(0x7f00000009c0)=@ax25, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/94, 0x5e}, {&(0x7f0000001ac0)=""/170, 0xaa}, {&(0x7f0000001b80)=""/6, 0x6}, {&(0x7f0000001bc0)=""/24, 0x18}, {&(0x7f0000001c00)=""/29, 0x1d}, {&(0x7f0000001c40)=""/138, 0x8a}, {&(0x7f0000001d00)=""/108, 0x6c}, {&(0x7f0000001d80)=""/9, 0x9}, {&(0x7f0000001dc0)=""/4096, 0x1000}], 0xa, &(0x7f0000002e80)=""/124, 0x7c, 0x4}, 0xfffffffffffff800}, {{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000002f00)=""/24, 0x18}, {&(0x7f0000002f40)=""/57, 0x39}, {&(0x7f0000002f80)=""/69, 0x45}, {&(0x7f0000003000)=""/167, 0xa7}, {&(0x7f00000030c0)=""/52, 0x34}, {&(0x7f0000003100)=""/207, 0xcf}, {&(0x7f0000003200)=""/190, 0xbe}, {&(0x7f00000032c0)=""/43, 0x2b}], 0x8, 0x0, 0x0, 0x6000}, 0x8}, {{&(0x7f0000003380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003400)}, {&(0x7f0000003440)=""/4096, 0x1000}, {&(0x7f0000004440)=""/117, 0x75}], 0x3, &(0x7f0000004500)=""/117, 0x75, 0x5}}, {{&(0x7f0000004580)=@generic, 0x80, &(0x7f0000004c40)=[{&(0x7f0000004600)=""/197, 0xc5}, {&(0x7f0000004700)=""/226, 0xe2}, {&(0x7f0000004800)=""/226, 0xe2}, {&(0x7f0000004900)=""/224, 0xe0}, {&(0x7f0000004a00)=""/113, 0x71}, {&(0x7f0000004a80)=""/158, 0x9e}, {&(0x7f0000004b40)=""/67, 0x43}, {&(0x7f0000004bc0)=""/47, 0x2f}, {&(0x7f0000004c00)=""/47, 0x2f}], 0x9, &(0x7f0000004d00)=""/115, 0x73, 0xcb9}, 0x6}, {{&(0x7f0000004d80)=@can, 0x80, &(0x7f0000005140)=[{&(0x7f0000004e00)=""/180, 0xb4}, {&(0x7f0000004ec0)=""/226, 0xe2}, {&(0x7f0000004fc0)=""/214, 0xd6}, {&(0x7f00000050c0)=""/92, 0x5c}], 0x4, 0x0, 0x0, 0x9e8}, 0x2}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000005180)=""/32, 0x20}, {&(0x7f00000051c0)=""/133, 0x85}, {&(0x7f0000005280)=""/13, 0xd}, {&(0x7f00000052c0)=""/25, 0x19}, {&(0x7f0000005300)=""/8, 0x8}, {&(0x7f0000005340)=""/56, 0x38}, {&(0x7f0000005380)=""/193, 0xc1}], 0x7, &(0x7f0000005500)=""/153, 0x99, 0x7}, 0x80000000}], 0x8, 0x2000, &(0x7f00000057c0)={0x0, 0x989680}) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000005800)={'broute\x00'}, &(0x7f0000005880)=0x78) r1 = syz_open_dev$sndseq(&(0x7f0000000740)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000006c0)={0x2}) 02:05:05 executing program 1: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f757000b7ce76e737faf0ea5bdda2c1a7b334a85de6775dc931d6a185f716d654e3ab09ce8fa9876e96c926e745464784e641c28276db7abcb3e8e464922733120190f965dec00e327709f06d83efb8df6a2ec830f8e0b4505cd2ea6fa3c44421fc71031b98742c19ad92c5a7c67b748f0b43d88d10022e201a0247457c49314bbaf8bd40000000", 0x200002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x2, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0x9, 0x4) r2 = openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{&(0x7f0000001700)=@generic, 0x80, &(0x7f00000001c0), 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, &(0x7f0000001ac0)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400, 0x0) readv(r2, &(0x7f00000002c0), 0x34d) 02:05:05 executing program 5: unlink(&(0x7f0000000240)='./file0\x00') r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000002c0)={0x7ff, 0x0, 0x4, 'queue0\x00', 0x6a9}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x31) readlinkat(0xffffffffffffffff, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)=""/25, 0x19) lstat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000600)) futimesat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000540)={{0x0, 0x2710}}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000004c0)={0x1f, 0x1f}) openat$md(0xffffffffffffff9c, &(0x7f0000000440)='/dev/md0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f0000000480)='{)\x00') pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') connect$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e22, 0x6, @empty, 0x2}, 0x1c) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x4d2, 0x7}]}, 0x9, 0x3) ioprio_set$uid(0x3, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) 02:05:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x0, &(0x7f0000000240)='\x00') r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x100000000000, 0x8) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x10001}, 0x4) 02:05:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000900)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000002c0)="b9ec090000b808000000ba000000000f300fc76b07dc920080000067260fc7ac0b000f3808580026660f3880a100400000c4c2659f5d0d0fc7af0e000000660f01c80f01cf", 0x45}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={"6c6f0000001f0000000000005500", 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x58, &(0x7f0000000080)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e23, 0x4, @mcast1, 0x4}, @in6={0xa, 0x4e22, 0x3}, @in={0x2, 0x4e20, @local}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000200)={r3, 0x4}, 0x8) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x3353cd1e187a4f97, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 02:05:06 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, &(0x7f00000001c0)) r1 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x14}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x77359400}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000012) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000040)) ioctl$NBD_CLEAR_QUE(r2, 0xab05) [ 245.962495] IPVS: ftp: loaded support on port[0] = 21 02:05:06 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000080)={0x0, 0xfffffffffffffffe}) [ 246.041476] block nbd2: Attempted send on invalid socket [ 246.047044] print_req_error: I/O error, dev nbd2, sector 0 [ 246.053398] XFS (nbd2): SB validate failed with error -5. [ 246.067606] QAT: Invalid ioctl [ 246.078678] QAT: Invalid ioctl 02:05:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x8001, 0x3}) r2 = socket(0x1e, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt(r2, 0x800000010f, 0x82, &(0x7f00004ad000), &(0x7f0000a3c000)=0xffffff4c) 02:05:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='xfs\x00', 0x0, &(0x7f0000000240)='\x00') r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x100000000000, 0x8) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x10001}, 0x4) [ 246.317998] block nbd2: Attempted send on invalid socket [ 246.323571] print_req_error: I/O error, dev nbd2, sector 0 [ 246.331695] XFS (nbd2): SB validate failed with error -5. 02:05:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x8001, 0x3}) r2 = socket(0x1e, 0x1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt(r2, 0x800000010f, 0x82, &(0x7f00004ad000), &(0x7f0000a3c000)=0xffffff4c) 02:05:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'bond_slave_0\x00', 0x1133}) ioctl$TUNSETNOCSUM(r0, 0x800454e0, 0x0) 02:05:06 executing program 2: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x2, 0x0, 0x6, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = socket$kcm(0x29, 0x400000000005, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000280)={r2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x0, 0x4, 0x7fffffff, 0x1, 0x4, 0x0, 0x1f, 0x1, 0x101, 0x0, 0x4, 0x7f, 0x0, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x8, 0x8000, 0x0, 0xfff, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x0, 0x6, 0x100000000, 0x4, 0x9}, 0x0, 0x1, r0, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x10002}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75702e6370752f2f797a31a0", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0xc1, 0x0, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400), 0x4) socketpair(0x10, 0x1, 0x5, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000840)=0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000480)) close(r3) r5 = gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x200, 0x6, 0x3, 0x0, 0x80000000, 0x8040, 0xf, 0x80, 0x1, 0x80000000, 0x9, 0x4, 0x0, 0xfffffffeffffffff, 0x4, 0x0, 0x82a7, 0x5, 0x6, 0x3, 0x2, 0x80, 0xfffffffffffffffa, 0x80000001, 0x6, 0x7, 0xd6d, 0x2, 0xffffffffffff968e, 0x0, 0x3f, 0x0, 0x8000, 0x7, 0x1d2, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x9}, 0x50, 0xb6, 0x5, 0x2, 0x100, 0x4, 0xffffffffffffff00}, 0x0, 0x6, 0xffffffffffffff9c, 0x9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0xa72, 0x0, 0x3f, 0x7fffffff, 0x0, 0x200, 0x40, 0x6, 0x0, 0x4, 0x9, 0x4, 0x1, 0x6, 0x0, 0x8, 0x7, 0x2, 0x7b, 0x6, 0x2, 0x3565, 0x5, 0x4500, 0x5, 0x10000, 0x1800000, 0x2, 0x3, 0x5cc9, 0x1ff, 0x4, 0x4, 0x6, 0x6, 0x200, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x4000, 0xfffffffffffffffd, 0x0, 0x2, 0x3f, 0x0, 0x3}, r5, 0x2, r4, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) socketpair(0x0, 0x806, 0x101, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40286608, 0x20000001) 02:05:06 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x587180, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x40, 0x2, 0x8, [], &(0x7f0000000080)=0x80}) ioctl$BLKPG(r0, 0x4004092b, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff11, 0x0}) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000200)={@broadcast, @loopback}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) prctl$PR_SET_TIMERSLACK(0x1d, 0x10000000000) [ 246.591217] device bridge_slave_1 left promiscuous mode [ 246.606139] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.674739] device bridge_slave_0 left promiscuous mode [ 246.686402] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.717059] IPVS: ftp: loaded support on port[0] = 21 [ 246.765374] QAT: Invalid ioctl [ 246.768818] QAT: Invalid ioctl [ 246.783745] team0 (unregistering): Port device team_slave_1 removed [ 246.794282] team0 (unregistering): Port device team_slave_0 removed [ 246.806626] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 246.852077] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize [ 246.863685] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 246.919140] bond0 (unregistering): Released all slaves [ 247.022626] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize [ 247.982996] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.990717] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.998096] device bridge_slave_0 entered promiscuous mode [ 248.047600] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.054833] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.062232] device bridge_slave_1 entered promiscuous mode [ 248.127349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.170805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 248.313740] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.320282] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.327625] device bridge_slave_0 entered promiscuous mode [ 248.396721] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.403460] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.417313] device bridge_slave_1 entered promiscuous mode [ 248.436701] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.484001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.498771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.532194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 248.716472] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.779813] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.790556] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.797937] team0: Port device team_slave_0 added [ 248.847515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 248.855807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.880766] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.888090] team0: Port device team_slave_1 added [ 248.929129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.973124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.019251] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.026439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.037696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.277579] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.284837] team0: Port device team_slave_0 added [ 249.293161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.301347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.318458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.451890] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.459099] team0: Port device team_slave_1 added [ 249.632379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.640134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.648073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.804826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.818813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.826654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.992325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.000825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.008980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.172056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.180322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.188239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.769999] device bridge_slave_1 left promiscuous mode [ 250.775508] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.819126] device bridge_slave_0 left promiscuous mode [ 250.824583] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.910018] device bridge_slave_1 left promiscuous mode [ 250.915438] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.948998] device bridge_slave_0 left promiscuous mode [ 250.954436] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.070188] team0 (unregistering): Port device team_slave_1 removed [ 253.081396] team0 (unregistering): Port device team_slave_0 removed [ 253.091723] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 253.162073] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 253.247516] bond0 (unregistering): Released all slaves [ 253.340387] team0 (unregistering): Port device team_slave_1 removed [ 253.352104] team0 (unregistering): Port device team_slave_0 removed [ 253.361970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 253.412415] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 253.490970] bond0 (unregistering): Released all slaves [ 253.564073] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.570491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.577165] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.583590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.592247] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.600978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.818794] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.825187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.831901] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.838274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.845783] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.618756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.007219] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.164220] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.286701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.320032] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.326215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.334571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.455761] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.485734] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.608082] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.614660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.625751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.777368] 8021q: adding VLAN 0 to HW filter on device team0 02:05:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 02:05:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x7fff, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r0, &(0x7f0000000a40)={&(0x7f0000000300)={0x2, 0xfec000000e000000, @dev={0xac, 0x14, 0x14, 0x1a}, [0x500, 0xe00000054010000, 0x4000000000000000]}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x34000}], 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="580000000000000084000000080000000000000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0900120000000000000000000000040000000073c99818ab5f000000000000000000000000000000000000000000"], 0x58}, 0x0) 02:05:17 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x80000000008, 0xfffffffffffffea8) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x6) getdents(r0, &(0x7f0000000040)=""/251, 0xfb) 02:05:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80130000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="b4020000240000022abd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x2b4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 02:05:17 executing program 2: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x2, 0x0, 0x6, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = socket$kcm(0x29, 0x400000000005, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000280)={r2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x0, 0x4, 0x7fffffff, 0x1, 0x4, 0x0, 0x1f, 0x1, 0x101, 0x0, 0x4, 0x7f, 0x0, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x8, 0x8000, 0x0, 0xfff, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x0, 0x6, 0x100000000, 0x4, 0x9}, 0x0, 0x1, r0, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x10002}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75702e6370752f2f797a31a0", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0xc1, 0x0, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400), 0x4) socketpair(0x10, 0x1, 0x5, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000840)=0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000480)) close(r3) r5 = gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x200, 0x6, 0x3, 0x0, 0x80000000, 0x8040, 0xf, 0x80, 0x1, 0x80000000, 0x9, 0x4, 0x0, 0xfffffffeffffffff, 0x4, 0x0, 0x82a7, 0x5, 0x6, 0x3, 0x2, 0x80, 0xfffffffffffffffa, 0x80000001, 0x6, 0x7, 0xd6d, 0x2, 0xffffffffffff968e, 0x0, 0x3f, 0x0, 0x8000, 0x7, 0x1d2, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x9}, 0x50, 0xb6, 0x5, 0x2, 0x100, 0x4, 0xffffffffffffff00}, 0x0, 0x6, 0xffffffffffffff9c, 0x9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0xa72, 0x0, 0x3f, 0x7fffffff, 0x0, 0x200, 0x40, 0x6, 0x0, 0x4, 0x9, 0x4, 0x1, 0x6, 0x0, 0x8, 0x7, 0x2, 0x7b, 0x6, 0x2, 0x3565, 0x5, 0x4500, 0x5, 0x10000, 0x1800000, 0x2, 0x3, 0x5cc9, 0x1ff, 0x4, 0x4, 0x6, 0x6, 0x200, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x4000, 0xfffffffffffffffd, 0x0, 0x2, 0x3f, 0x0, 0x3}, r5, 0x2, r4, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) socketpair(0x0, 0x806, 0x101, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40286608, 0x20000001) 02:05:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x8001004000000016) 02:05:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='7:'], 0x2) [ 257.741300] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize 02:05:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='7:2\t'], 0x4) 02:05:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 257.865740] IPVS: ftp: loaded support on port[0] = 21 02:05:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='io.weight\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='7'], 0x1) [ 258.060381] md0: error: failed to get bitmap file 02:05:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='7'], 0x1) [ 258.080880] md0: error: failed to get bitmap file [ 258.138827] IPVS: ftp: loaded support on port[0] = 21 02:05:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x8004c00, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x700000000000000}}]}]}, 0x2c}}, 0x0) 02:05:18 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x2, 0x0) unshare(0x400) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 258.226034] netlink: del zone limit has 4 unknown bytes [ 258.349431] device bridge_slave_1 left promiscuous mode [ 258.355118] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.419561] device bridge_slave_0 left promiscuous mode [ 258.426357] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.535546] team0 (unregistering): Port device team_slave_1 removed [ 258.555305] team0 (unregistering): Port device team_slave_0 removed [ 258.573747] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 258.622206] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 258.715637] bond0 (unregistering): Released all slaves [ 260.023249] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.048488] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.055968] device bridge_slave_0 entered promiscuous mode [ 260.065428] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.081699] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.095939] device bridge_slave_0 entered promiscuous mode [ 260.128123] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.148463] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.159312] device bridge_slave_1 entered promiscuous mode [ 260.203758] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.218861] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.233152] device bridge_slave_1 entered promiscuous mode [ 260.248936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 260.346479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 260.362094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 260.463600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 260.634328] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.748781] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.763062] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 260.874253] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 260.957443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 260.978463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.989986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 260.996836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 261.086344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 261.108748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 261.207943] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 261.229666] team0: Port device team_slave_0 added [ 261.314299] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.322254] team0: Port device team_slave_1 added [ 261.387377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.422610] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 261.439317] team0: Port device team_slave_0 added [ 261.480054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.538617] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.545969] team0: Port device team_slave_1 added [ 261.570953] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.578707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.599061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.651405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.658642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.666580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.690223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.729520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.785028] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.792655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.808848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.860816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.867983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.879024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.295759] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.302227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.309024] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.315397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.323360] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 262.404108] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.410535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.417160] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.423605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.431766] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 262.868544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.875761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 264.007703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.099898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.164815] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.258813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.324509] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.330732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.337779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.422737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.430306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.437320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.492770] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.595499] 8021q: adding VLAN 0 to HW filter on device team0 02:05:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001240)=0x7fe, 0x7c) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000683ff0)=[{0x6, 0x0, 0x0, 0x7fe}]}, 0x10) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="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", 0xf89}], 0x1}, 0x0) 02:05:25 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) recvmmsg(r0, &(0x7f0000000f00), 0x40000000000019b, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000002780)='=', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) 02:05:25 executing program 2: clone(0x200, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000280)) mknod(&(0x7f00000001c0)='./file1\x00', 0xc042, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, &(0x7f0000000500)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000001c0)=ANY=[]) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000700), 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000009080)) 02:05:25 executing program 3: syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fa6e33e0f111040d91ad3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 02:05:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='team0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x34}}, 0x0) 02:05:25 executing program 5: r0 = socket$kcm(0x10, 0x8000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 02:05:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f0000000580)=[{0x14}, {0x6, 0x0, 0x0, 0xfffffffffffffffc}]}) ioctl(0xffffffffffffffff, 0x0, 0x0) 02:05:25 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) [ 265.664632] tls_set_device_offload_rx: netdev lo with no TLS offload 02:05:25 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)}], 0x1}, 0x0) [ 265.746058] audit: type=1326 audit(1543802725.914:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9274 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 02:05:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x40122000000003, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="2beef5ef6070"], 0x0, 0xf4, 0x0, 0x0, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0)=r2, 0x69) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x2fd) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = socket$kcm(0xa, 0x2, 0x11) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000380)) sendmsg$kcm(r1, &(0x7f0000000800)={&(0x7f0000000e40)=@ipx={0x4, 0x0, 0x10001, "8318cfdbc3b2", 0x400}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x100000000004000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000006c0), 0x80000000) setsockopt$sock_attach_bpf(r4, 0x29, 0x1b, &(0x7f0000000040)=r4, 0x52d) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', r2}, 0x10) r5 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000740)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x7fff, 0x8001, "95172d0aed80093448a57ca3933168b8452b38c0864a65f2a4c58d75d884061d4aabd1c914ae7ed5552e89dad2a0fa4a1a807a1246f753c2ac9da049e0df08", 0x5}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x20048014) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x800) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r4}) socket$kcm(0xa, 0x8000000, 0x11) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000600)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x2) close(r4) r6 = socket$kcm(0x2b, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) setsockopt$sock_attach_bpf(r5, 0x6, 0x4, &(0x7f00000005c0)=r6, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) mkdir(&(0x7f0000000140)="2e02", 0x0) sendmsg$kcm(r1, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8", 0x26}], 0x1}, 0x0) socket$kcm(0x29, 0x9, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) 02:05:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) 02:05:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, 0x0, 0x0, 0x0) 02:05:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180), 0x10) shutdown(r0, 0x0) 02:05:26 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, 0x0) dup(r2) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580), 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0x0, 0x0, 0x0, 0x0, [], [], [], 0xb48}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 02:05:26 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x1800000000}) 02:05:26 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0200a5ffffff0145da68ff", 0xb, 0x1c0}]) [ 266.239883] Dev loop2: unable to read RDB block 1 [ 266.246010] loop2: unable to read partition table [ 266.257321] loop2: partition table beyond EOD, truncated [ 266.280148] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 266.366061] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 266.429390] Dev loop2: unable to read RDB block 1 [ 266.435384] loop2: unable to read partition table [ 266.440836] loop2: partition table beyond EOD, truncated [ 266.459067] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 266.528498] audit: type=1326 audit(1543802726.694:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9274 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 266.594938] team0 (unregistering): Port device team_slave_0 removed [ 266.623153] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 266.806907] team0 (unregistering): Port device team_slave_1 removed 02:05:27 executing program 4: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x20400, 0x20) r1 = socket$netlink(0x10, 0x3, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x1ff, 0x7fffffff, 0x4, 0x3}) r2 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f000023efa8)={0x80, 0x0, 0x3}) pipe2(0x0, 0x100) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) bind(r3, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x2, 0x0, 0x2, {0xa, 0x4e21}}}, 0x80) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f00000000c0)={0x0, @rand_addr=0x4, 0x4e21, 0x2, 'fo\x00', 0x20, 0xba7, 0x23}, 0x2c) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='bridge_slave_1\x00'}) 02:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) io_setup(0x5, &(0x7f0000000100)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getpgrp(0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x94, 0x17, 0x10, 0x70bd26, 0x25dfdbfe, {0xd}, [@nested={0x80, 0x5b, [@typed={0x7c, 0xe, @binary="1c686353a9f90bca98511627f0704906fd37820cb6b9990031c0f820d28fe0842449ef2c3e6a706fc0849757430a1880a51b141bd9591cca969674299a3dc25bf31cc2d5885dd6c6ea1f7cd9063115e03ed619b027585c5c7c7567d6ede15e43774d995938967883adf73edeaca37ca0fcde884a98"}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x40090}, 0x4004) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = shmget(0x3, 0x600000, 0x78000470, &(0x7f00009fe000/0x600000)=nil) r3 = dup3(r1, r1, 0x80000) ioctl$TIOCGPTPEER(r3, 0x5441, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000000)=""/146) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) shutdown(r1, 0x1) 02:05:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pread64(r0, 0x0, 0x0, 0x0) 02:05:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x51, @time}) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 02:05:27 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) 02:05:27 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @void, @mpls={[], @ipv6={0x1, 0x6, "89f08b", 0x38, 0x0, 0xa44, @dev={0xfe, 0x80, [], 0x1e}, @mcast1, {[@hopopts={0x3a, 0x3, [], [@pad1, @hao={0xc9, 0x10, @ipv4={[], [], @remote}}, @jumbo]}], @icmpv6=@ni={0x8b, 0x0, 0x0, 0x8, 0xff}}}}}, 0x60) 02:05:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x80, 0x0, 0x0, 0xf5}) 02:05:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) shmdt(r0) 02:05:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x4d, @time}) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc04c5349, &(0x7f0000000240)={0x3, 0x0, 'client0\x00', 0x0, "9980008a000800f4", "ecf6586f21a25f9a1c9be387d92f4204ec6e8caa5a6216eff1c9dc8bedbfa244"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() timer_create(0x0, &(0x7f0000000500)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 02:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) clock_adjtime(0x0, &(0x7f00000000c0)) 02:05:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0), 0x0) 02:05:27 executing program 0: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) 02:05:27 executing program 5: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 02:05:27 executing program 0: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x7) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000540)='./file0\x00', 0x5ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000280)='./file0\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pwritev(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="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", 0xff}, {0x0}, {0x0}], 0x3, 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 02:05:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0x8, 0x0) 02:05:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x4, 0x45cb}) r0 = getpid() r1 = syz_open_procfs(r0, 0x0) io_setup(0xfb58, &(0x7f0000000000)=0x0) io_destroy(r2) fcntl$setsig(r1, 0xa, 0x3c) 02:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() 02:05:27 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000530ff8)=0x4) 02:05:27 executing program 1: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x7) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'icmp6\x00'}, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000480)) 02:05:28 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x10}, 0xc) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffffffffffff00", 'syz1\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x4d6) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x33e) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040), 0x21c}], 0x8) 02:05:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x100) [ 267.895227] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 267.929158] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 267.964078] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 267.972021] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 267.979287] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 267.986151] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 267.993480] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.000639] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.217912] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.245852] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.253095] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.260464] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 02:05:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) [ 268.267334] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.274552] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.287752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.301015] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.308288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.324977] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.339911] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.364489] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 02:05:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460106cd00ffffffff0000000003003f00060000003a020800380000e82f9205000000000000002000010005000800000000000000000000600100000000000000000100003f000000f8ffff0010000000010000000400000007000000b20000003f000000090000000400000008000000ffff000038ec80ef54b41744025fb1a9a4ccc792d927ca3a5fa04ab207142646674e97d123c5650906f10f9b4312ee18e3b4f891a8693b0caff427f63008e193770829b1e40f3c153a2510a40fc9ee5ddfc5a62f0553053a0fb0c33d80310694ba9b9ea31b439600a74089bc9bf47254ca9aa46be14a28b3728de565a95baea6b696d8cc39331b19269c82d933be9d2ffe321454f1fd15b45edbf2636ef293c5793df5c4aaa1fa6a173c443f15f55bdeadf185c872d74f7148dc633c7fd312c17e9ef1952257907dead5216971fdaa0173295ca28331c5d92020d40e78c29f7f5d792653630813"], 0x15b) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x3}) [ 268.378923] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.400690] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.414604] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.445042] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.461519] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.490418] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.519088] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.544373] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.573861] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.600836] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 02:05:28 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='^\x00') 02:05:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) [ 268.697955] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.705538] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.712501] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.719522] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.726243] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 02:05:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0x4038ae7a, 0x80ffff) [ 268.742676] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.749448] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.756388] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.763240] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.770252] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.777163] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.784841] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.794455] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.801236] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.808124] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.816342] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.823144] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.838530] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.855885] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.863223] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.884374] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.911077] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.918170] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.925959] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.939896] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.946858] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.954178] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.960914] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.967587] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.974415] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.981140] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.987816] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 268.994523] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.001224] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.007909] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.014873] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.021651] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.028776] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.035591] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.042332] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.049053] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.055811] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.063389] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.076167] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.083540] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.090306] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.096990] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.104020] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.110754] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.117441] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.124166] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.130885] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.137549] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.144258] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.150973] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.157632] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.164345] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.171045] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.177739] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.184655] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.191394] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.198106] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.204825] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.211537] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.218203] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.224934] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.231767] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.238506] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.245189] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.251902] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.258657] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.265348] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.272055] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.278850] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.285522] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.292248] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.298991] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.305667] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.312386] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.319117] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.325801] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.332519] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.339376] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.346040] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.352764] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.359506] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.366185] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.372908] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.379620] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.386294] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.393036] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.399743] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.406405] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.413130] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.419957] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.426619] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.433417] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.440142] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.446808] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.453539] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.460247] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.466912] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.473648] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.480382] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.487079] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.493847] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.500596] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.507256] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.514018] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.520740] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.527402] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.534119] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.540833] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.547506] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.554291] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.560999] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.567659] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.574409] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.581145] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.587817] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.594560] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.601295] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.607957] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.614683] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.621424] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.628083] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.634822] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.641557] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.648228] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.654943] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.661664] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.668407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.675089] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.681845] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.688559] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.695221] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.701937] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.708667] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.715341] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.722167] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.728932] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.735615] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.742379] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.749104] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.755773] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.762521] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.769246] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.775926] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.782654] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.789363] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.796021] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.802797] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.809503] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.816190] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.822965] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.829686] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.836349] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.843111] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.849868] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.856559] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.863293] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.870019] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.876694] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.883481] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.890202] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 269.900416] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 02:05:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460106cd00ffffffff0000000003003f00060000003a020800380000e82f9205000000000000002000010005000800000000000000000000600100000000000000000100003f000000f8ffff0010000000010000000400000007000000b20000003f000000090000000400000008000000ffff000038ec80ef54b41744025fb1a9a4ccc792d927ca3a5fa04ab207142646674e97d123c5650906f10f9b4312ee18e3b4f891a8693b0caff427f63008e193770829b1e40f3c153a2510a40fc9ee5ddfc5a62f0553053a0fb0c33d80310694ba9b9ea31b439600a74089bc9bf47254ca9aa46be14a28b3728de565a95baea6b696d8cc39331b19269c82d933be9d2ffe321454f1fd15b45edbf2636ef293c5793df5c4aaa1fa6a173c443f15f55bdeadf185c872d74f7148dc633c7fd312c17e9ef1952257907dead5216971fdaa0173295ca28331c5d92020d40e78c29f7f5d792653630813"], 0x15b) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x3}) 02:05:30 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x80000001}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="100000140000000000000002b153"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 02:05:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x40000) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_create(0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='security.apparmor\x00') vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:05:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000002700)="6e65742f7463703600e556415d4b5fd26746729ec8545dc39eb333ef10e554d62e0ef7f86e4e7a9093e3e600660a8694f49cd8bcce760978a4a2aeaf92ad5760b0d8314eed2f302d3251b3e047ddb49fc48a0790b31a13c6675b2236b681cc0f81555c1fbb29dd000682fe6dcac9e25cf78f03a46659a46aea54b58edf3a5646151ccf26461684ca157801371c260000000000000000b54e000000000000") preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0xcb8}], 0x1, 0x0) 02:05:30 executing program 5: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) 02:05:30 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) tee(r1, r0, 0x5, 0x0) 02:05:30 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000003c0)=ANY=[@ANYBLOB="163338c5"]) sendmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="4c5af6762f6c6f703000406cde8e96c17ef9626ea540344c412320129247a2"], 0x0, 0x0, 0x1000000, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000001040)=""/4096) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00), &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) exit(0x0) 02:05:30 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 02:05:30 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1f0000000104ff00fd01000000000020000501000800010003f2511a10df00", 0x1f) recvmmsg(r0, &(0x7f000000a4c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000008b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, 0x0}}], 0x2, 0x0, 0x0) vmsplice(r1, &(0x7f000000c880)=[{&(0x7f000000c7c0)="1c6f8093d384b207f219cf63d3161b27d02ca8928444a803fc53b774a96f819a8af55817a8c83357ecac3904f94d0897bf3b8496c02f7f12c777cd885510bfa1d410a0dfd885a0c063bab1f751e876522ecab7762f67766db5def3439f9879a98b41dd4a60674a31a93ae445b82ebdeab49def9972acf1532b6e91b2e6796cab4bbde52166ed82bea1d9b129bb74208a550ccd8b76bb34e709c4be522ea0b88dbc536d7efd62", 0xa6}], 0x1, 0xa) 02:05:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460106cd00ffffffff0000000003003f00060000003a020800380000e82f9205000000000000002000010005000800000000000000000000600100000000000000000100003f000000f8ffff0010000000010000000400000007000000b20000003f000000090000000400000008000000ffff000038ec80ef54b41744025fb1a9a4ccc792d927ca3a5fa04ab207142646674e97d123c5650906f10f9b4312ee18e3b4f891a8693b0caff427f63008e193770829b1e40f3c153a2510a40fc9ee5ddfc5a62f0553053a0fb0c33d80310694ba9b9ea31b439600a74089bc9bf47254ca9aa46be14a28b3728de565a95baea6b696d8cc39331b19269c82d933be9d2ffe321454f1fd15b45edbf2636ef293c5793df5c4aaa1fa6a173c443f15f55bdeadf185c872d74f7148dc633c7fd312c17e9ef1952257907dead5216971fdaa0173295ca28331c5d92020d40e78c29f7f5d792653630813"], 0x15b) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x3}) 02:05:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x15b) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x3}) 02:05:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000180)=""/157, 0x9d}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000240)=""/28, 0x1c}], 0x1, 0x0) 02:05:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb3c, 0x0, 0x5}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$poke(0x2, r1, &(0x7f00000000c0), 0x707000) 02:05:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:31 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) creat(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fdatasync(0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') socket(0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x523, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f000030efc4)=[{{&(0x7f0000413ffa)=@hci, 0xc9, &(0x7f0000b60000), 0x0, &(0x7f00004f9000), 0xffffffffffffffad}}], 0x400000000000124, 0x0, 0x0) 02:05:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000e82fe0)={r0, &(0x7f0000d9df52), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f000032afe8)={r0, &(0x7f0000b74000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000bc2000)={r0, &(0x7f00009f8f49)="01", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000035bfe0)={r0, &(0x7f0000918ff8), 0x0}, 0x20) [ 271.095617] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 271.212600] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:32 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000003c0)=ANY=[@ANYBLOB="163338c5"]) sendmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="4c5af6762f6c6f703000406cde8e96c17ef9626ea540344c412320129247a2"], 0x0, 0x0, 0x1000000, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000001040)=""/4096) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00), &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) exit(0x0) 02:05:32 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1f0000000104ff00fd01000000000020000501000800010003f2511a10df00", 0x1f) recvmmsg(r0, &(0x7f000000a4c0)=[{{&(0x7f0000008b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) vmsplice(r1, &(0x7f000000c880)=[{&(0x7f000000a780)="bd", 0x1}], 0x1, 0x0) 02:05:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006f00)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@ipv4_newaddr={0x20, 0x14, 0x41b, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0) 02:05:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:32 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa0002, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000700)=""/214, 0xd6}], 0x1) 02:05:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x21, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in6, @in={0x2, 0x4e23, @local}], 0x2c) close(r2) close(r1) 02:05:32 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local}, 0xc) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 272.032079] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") fcntl$setstatus(r0, 0x4, 0x14400) pread64(r0, 0x0, 0x0, 0x0) 02:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020e00001000000000000000000000000800120000000100000000000000000006000000000000000000000000000000e000000100000000000000000000000000000000000000000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632b91c5200000000000ff"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 272.258706] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:33 executing program 1: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x3) 02:05:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 02:05:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 02:05:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000004c0)=@srh={0x0, 0x0, 0x4, 0x0, 0x287a02d8}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) 02:05:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 273.358485] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x1100082) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x2000005) 02:05:33 executing program 1: mlock(&(0x7f000053a000/0x3000)=nil, 0x3000) munmap(&(0x7f000053c000/0x1000)=nil, 0x1000) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 02:05:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x168, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, '\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xa0, 0xa0, 0xd8, [@cgroup0={'cgroup\x00', 0x8}]}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x1e0) 02:05:33 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d243c126285718070") socket(0x0, 0x0, 0x0) gettid() ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, 0x0, &(0x7f0000000380)) 02:05:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f0000000040)=@vsock, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000020000000014fdffffffffffffff79460000000000000000"], 0x1b, 0x8081}, 0x20004000) sendmmsg(r0, &(0x7f0000007e00), 0x115, 0x0) 02:05:33 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) [ 273.644231] x_tables: eb_tables: cgroup match: used from hooks POSTROUTING, but only valid from INPUT/OUTPUT/POSTROUTING [ 273.710867] x_tables: eb_tables: cgroup match: used from hooks POSTROUTING, but only valid from INPUT/OUTPUT/POSTROUTING 02:05:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="ef92776d650f0f", 0x7}], 0x1}, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x115, 0x0) 02:05:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6(0xa, 0x803, 0x5) r2 = socket(0x200000000000011, 0x4000000000080002, 0x8000000000000008) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bond0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bond0\x00', 0x8a03}) 02:05:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) 02:05:34 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x4000)=nil, 0x4000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x0, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:34 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 02:05:34 executing program 5: clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() pause() 02:05:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:34 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0xe, 0x0, 0x0, 0xffffffffffffffff, 0x12}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f0000000780)="fe4cd95dd21c2e6aec754d9a7bedb171f16209a88af1913c12ac5138f18694cde44b6c080130db04567bf47560b8ca933bd90739381b803b92d153a33d422730623f18dce13f455a801f94f2f80db9b16efc7f9b301ef5ff84653b14eb31fae6f2bb78c9e66f4ccf25d7e6a5232bcf5e2ca4326d7cff1107d89bf9d141d85f382b0e01458f1b6aaa1af1f0d9b614dd8c72e59c08381c386b417260523d9a374275518acbf47e27e40f2184ca3606542658"}, 0x10) unshare(0x40000000) r2 = dup(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0002000023f357419b5571a8474f48e959ae78135241e6b2799cb0e889b2eb2667b33c2c5857d320fcf34d886bcc0fcf8db3bec9ef3e5724deb2d8953379b19016816fa06ac8ad54010000000100000085700835e4a8c92a941a279e2c7e00000000258d02ee8133033d3767a151322cf4cb8283996b0a34e6e399ed92d0b3a489c6eaff49f1c8ccabbc4df5b73af67f3c38729902618c9bb77ea1add6cd53baecd4d0d36c0000"], 0xa7}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x20000) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'yam0\x00', {0x2, 0x4e1d, @local}}) ioctl(r0, 0xc0884123, &(0x7f0000000000)) 02:05:34 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 274.451379] IPVS: ftp: loaded support on port[0] = 21 02:05:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:34 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 274.794543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.830953] overlayfs: filesystem on './file0' not supported as upperdir 02:05:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000005c0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @broadcast}, 0x0, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000580)='teql0\x00', 0x3d9f115b, 0x6}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x4af2, 0x7, 0x30ac}) listen(r3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @rand_addr, @loopback}, &(0x7f0000000240)=0xc) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) pipe2(0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x7}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000000140)=ANY=[@ANYBLOB="d318788fb0ebd5d72e994d2c28acf1041a902463b70136d078c051b4f0dc"], 0x1}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000100)={0x1, 0x0, 0x800}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000540)=[@in6={0xa, 0x4e21, 0x0, @local}], 0x1c) 02:05:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:35 executing program 1: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff0000b408000000fab771172119000020002000004e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:05:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 275.272710] IPVS: ftp: loaded support on port[0] = 21 02:05:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") 02:05:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:37 executing program 5: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) r1 = dup2(r0, r0) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) 02:05:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, 0x0) 02:05:37 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) io_submit(0x0, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000005c0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @broadcast}, 0x0, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000580)='teql0\x00', 0x3d9f115b, 0x6}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x4af2, 0x7, 0x30ac}) listen(r3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @rand_addr, @loopback}, &(0x7f0000000240)=0xc) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) pipe2(0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x7}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000000140)=ANY=[@ANYBLOB="d318788fb0ebd5d72e994d2c28acf1041a902463b70136d078c051b4f0dc"], 0x1}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000100)={0x1, 0x0, 0x800}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000540)=[@in6={0xa, 0x4e21, 0x0, @local}], 0x1c) 02:05:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101801) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0xa7}) 02:05:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 277.412697] EXT4-fs (sda1): re-mounted. Opts: 02:05:37 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, 0x0) 02:05:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, 0x0) 02:05:37 executing program 5: 02:05:37 executing program 2: 02:05:37 executing program 5: 02:05:37 executing program 4: io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0xfffffce4}]) 02:05:37 executing program 5: 02:05:37 executing program 2: [ 277.707209] EXT4-fs (sda1): re-mounted. Opts: 02:05:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc02c5341, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9934ae47e1d6b1f4", "ecf6586f21a25f7c1c9bc7e0d92f4204ec6e8caa5a6216eff1c9dc8bedbfa244"}) 02:05:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, 0x0) [ 277.962540] EXT4-fs (sda1): re-mounted. Opts: 02:05:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:38 executing program 5: 02:05:38 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:38 executing program 2: 02:05:38 executing program 1: 02:05:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)) 02:05:38 executing program 1: 02:05:38 executing program 5: 02:05:38 executing program 2: [ 278.247744] EXT4-fs (sda1): re-mounted. Opts: 02:05:38 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)) 02:05:38 executing program 2: [ 278.500906] EXT4-fs (sda1): re-mounted. Opts: 02:05:39 executing program 1: 02:05:39 executing program 5: 02:05:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:39 executing program 2: 02:05:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)) 02:05:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:39 executing program 2: [ 279.123279] EXT4-fs (sda1): re-mounted. Opts: 02:05:39 executing program 1: 02:05:39 executing program 5: 02:05:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, 0x0) io_submit(0x0, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:39 executing program 2: 02:05:39 executing program 1: 02:05:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)) io_submit(0x0, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:39 executing program 5: 02:05:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 02:05:40 executing program 0: 02:05:40 executing program 2: 02:05:40 executing program 1: 02:05:40 executing program 5: 02:05:40 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 02:05:40 executing program 5: 02:05:40 executing program 2: 02:05:40 executing program 1: 02:05:40 executing program 0: 02:05:40 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 02:05:40 executing program 2: 02:05:40 executing program 0: 02:05:40 executing program 5: 02:05:40 executing program 1: 02:05:40 executing program 2: 02:05:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 02:05:41 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 02:05:41 executing program 5: 02:05:41 executing program 2: 02:05:41 executing program 0: 02:05:41 executing program 1: 02:05:41 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, &(0x7f0000001540)) 02:05:41 executing program 2: 02:05:41 executing program 0: 02:05:41 executing program 5: 02:05:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) 02:05:41 executing program 2: [ 281.228980] input: syz1 as /devices/virtual/input/input8 [ 281.290054] input: syz1 as /devices/virtual/input/input9 02:05:41 executing program 0: 02:05:41 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, &(0x7f0000001540)) 02:05:41 executing program 5: 02:05:41 executing program 2: 02:05:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 02:05:41 executing program 1: 02:05:41 executing program 1: 02:05:41 executing program 2: 02:05:42 executing program 0: 02:05:42 executing program 5: 02:05:42 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, &(0x7f0000001540)) 02:05:42 executing program 1: 02:05:42 executing program 2: 02:05:42 executing program 0: 02:05:42 executing program 5: 02:05:42 executing program 1: 02:05:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:42 executing program 2: 02:05:42 executing program 0: 02:05:42 executing program 5: 02:05:42 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000001540)=[0x0]) 02:05:42 executing program 1: 02:05:42 executing program 0: 02:05:42 executing program 2: 02:05:42 executing program 1: 02:05:42 executing program 5: 02:05:42 executing program 1: 02:05:42 executing program 0: 02:05:43 executing program 2: 02:05:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:43 executing program 5: 02:05:43 executing program 1: 02:05:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:43 executing program 0: 02:05:43 executing program 2: 02:05:43 executing program 1: 02:05:43 executing program 5: 02:05:43 executing program 0: 02:05:43 executing program 2: 02:05:43 executing program 1: 02:05:43 executing program 0: 02:05:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:43 executing program 5: 02:05:43 executing program 2: 02:05:44 executing program 0: 02:05:44 executing program 1: 02:05:44 executing program 5: 02:05:44 executing program 2: 02:05:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:44 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:44 executing program 1: 02:05:44 executing program 2: 02:05:44 executing program 0: 02:05:44 executing program 5: 02:05:44 executing program 0: 02:05:44 executing program 2: 02:05:44 executing program 5: 02:05:44 executing program 1: 02:05:44 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r0, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0xfffffce4}]) 02:05:44 executing program 0: 02:05:45 executing program 0: 02:05:45 executing program 2: 02:05:45 executing program 1: 02:05:45 executing program 5: 02:05:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:45 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, 0x0}]) 02:05:45 executing program 5: 02:05:45 executing program 1: 02:05:45 executing program 2: 02:05:45 executing program 0: 02:05:45 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, 0x0}]) 02:05:45 executing program 5: 02:05:45 executing program 0: 02:05:45 executing program 1: 02:05:45 executing program 2: 02:05:45 executing program 0: 02:05:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:46 executing program 1: 02:05:46 executing program 2: 02:05:46 executing program 5: 02:05:46 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, 0x0}]) 02:05:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@allocspi={0xf8, 0x16, 0x311, 0x0, 0x0, {{{@in, @in=@broadcast, 0x4e24, 0xffff, 0x4e20, 0x0, 0x2, 0x20, 0x80, 0x32}, {@in6=@local, 0x4d5, 0x6c}, @in6, {0xfc, 0x0, 0x0, 0x0, 0x100, 0x299880000000000, 0x8, 0x1e25}, {0x8001}, {}, 0x0, 0x3506, 0x0, 0x2, 0x4, 0x10}, 0x1, 0x9}}, 0xf8}, 0x8}, 0x0) 02:05:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0x5d1, 0x12) 02:05:46 executing program 5: 02:05:46 executing program 2: 02:05:46 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x587180, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x40, 0x2, 0x8, [], &(0x7f0000000080)=0x80}) ioctl$BLKPG(r0, 0x4004092b, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff11, 0x0}) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000200)={@broadcast, @loopback}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) prctl$PR_SET_TIMERSLACK(0x1d, 0x10000000000) 02:05:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80130000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="b4020000240000022abd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x2b4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 02:05:46 executing program 5: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x2, 0x0, 0x6, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = socket$kcm(0x29, 0x400000000005, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000280)={r2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x0, 0x4, 0x7fffffff, 0x1, 0x4, 0x0, 0x1f, 0x1, 0x101, 0x0, 0x4, 0x7f, 0x0, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x8, 0x8000, 0x0, 0xfff, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x0, 0x6, 0x100000000, 0x4, 0x9}, 0x0, 0x1, r0, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x10002}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75702e6370752f2f797a31a0", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0xc1, 0x0, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400), 0x4) socketpair(0x10, 0x1, 0x5, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000840)=0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000480)) close(r3) r5 = gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x200, 0x6, 0x3, 0x0, 0x80000000, 0x8040, 0xf, 0x80, 0x1, 0x80000000, 0x9, 0x4, 0x0, 0xfffffffeffffffff, 0x4, 0x0, 0x82a7, 0x5, 0x6, 0x3, 0x2, 0x80, 0xfffffffffffffffa, 0x80000001, 0x6, 0x7, 0xd6d, 0x2, 0xffffffffffff968e, 0x0, 0x3f, 0x0, 0x8000, 0x7, 0x1d2, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x9}, 0x50, 0xb6, 0x5, 0x2, 0x100, 0x4, 0xffffffffffffff00}, 0x0, 0x6, 0xffffffffffffff9c, 0x9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0xa72, 0x0, 0x3f, 0x7fffffff, 0x0, 0x200, 0x40, 0x6, 0x0, 0x4, 0x9, 0x4, 0x1, 0x6, 0x0, 0x8, 0x7, 0x2, 0x7b, 0x6, 0x2, 0x3565, 0x5, 0x4500, 0x5, 0x10000, 0x1800000, 0x2, 0x3, 0x5cc9, 0x1ff, 0x4, 0x4, 0x6, 0x6, 0x200, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x4000, 0xfffffffffffffffd, 0x0, 0x2, 0x3f, 0x0, 0x3}, r5, 0x2, r4, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) socketpair(0x0, 0x806, 0x101, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40286608, 0x20000001) [ 286.523697] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize 02:05:47 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:47 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:47 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x587180, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x40, 0x2, 0x8, [], &(0x7f0000000080)=0x80}) ioctl$BLKPG(r0, 0x4004092b, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff11, 0x0}) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000200)={@broadcast, @loopback}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) prctl$PR_SET_TIMERSLACK(0x1d, 0x10000000000) 02:05:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80130000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="b4020000240000022abd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0f00060008000f00fffff3ffffff0500003a0000840008000c000000040007000000020000000300000006000000000000000800020000000000140002009100030053d061080080400aab0000000c00020009000800051800001800020001002a04248c0900ff7f80008000ffff04000100180002000000bfff030001800300c00080ff07000000000008000100846564003c010200c80001000600000004000000e09e00000c1818020800030006000000080003003f000000040102008dec8ec6535298d058b9b86f9fee769ca9d982859e32ff51d2629365c53db4ae8c9f68d03da4f1fc9876666e627649b8c6df62226a1de17de70685aea6f4fafeccb84cb24b584f6eac9ca352316ee8220efc0dafa2d0284b448d9dda41147ec7019a7b66dd9efcd20a63e73b4457c9c3c5ee068d314bb5cf5e0f4c56ab89075db25ef773b30ea169202e53cb7d4033403929de2ea4b69e896e25d0b6f6f35d17823acb72a47c7f216a89cae497e945bc1dbe532cf15474f62f6384a7753df9db17893a1beb43fe4091c5628ff1d2be93493726866a57fc766fc640fdc06c043a8a5c71fcc5b43cf1ccc774b2292a0c35114c5b1730a08242d41e64d545515c1f080003000004000008000300e809000008000e00ffffff7f0800050081ff0000080005000220000008000d00e200000008000d00090000009000080008000200018002001c000100640002000100000037c3788a8c0d000001040000060000001c0001000107f2c1d54d000000000000ff7f000009000000060000001c0001000403020006000000010000000100000000000000000000001c000100553f0400150000000000000000000000070000000800000014000200ff03cf000000000211b600000000000008000da5717df6bf899127e935414f8bfa167af73f7486f25ccb43146fea9ebd9a0c986287f4d25984187ad81400000000000000000000000000000e004f3ebd7cde8688bdb3ae000000000000000000686fba78ee49"], 0x2b4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 02:05:47 executing program 5: socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000080)=@ethtool_link_settings}) [ 287.063816] FAULT_INJECTION: forcing a failure. [ 287.063816] name failslab, interval 1, probability 0, space 0, times 1 [ 287.077993] FAULT_INJECTION: forcing a failure. [ 287.077993] name failslab, interval 1, probability 0, space 0, times 1 [ 287.106274] CPU: 0 PID: 10205 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 287.114905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.124279] Call Trace: [ 287.126979] dump_stack+0x244/0x39d [ 287.130627] ? dump_stack_print_info.cold.1+0x20/0x20 [ 287.135875] ? kasan_check_read+0x11/0x20 [ 287.140101] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 287.145448] should_fail.cold.4+0xa/0x17 [ 287.149529] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.154690] ? __lock_acquire+0x62f/0x4c20 [ 287.158945] ? up_read+0x225/0x2c0 [ 287.162505] ? graph_lock+0x270/0x270 [ 287.166325] ? mark_held_locks+0x130/0x130 [ 287.170574] ? find_held_lock+0x36/0x1c0 [ 287.174734] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.180193] ? lock_release+0xa10/0xa10 [ 287.184204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.189764] __should_failslab+0x124/0x180 [ 287.194105] should_failslab+0x9/0x14 [ 287.197916] kmem_cache_alloc+0x2be/0x730 [ 287.202093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.207699] ? _copy_from_user+0xdf/0x150 [ 287.211903] io_submit_one+0x1a2/0xf80 [ 287.215822] ? aio_poll+0x1420/0x1420 [ 287.219672] ? __might_fault+0x12b/0x1e0 [ 287.223750] ? lock_downgrade+0x900/0x900 [ 287.227925] ? lock_release+0xa10/0xa10 [ 287.231924] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.237411] ? blk_lld_busy+0xa0/0xa0 [ 287.241224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.246785] __x64_sys_io_submit+0x1ab/0x580 [ 287.251205] ? __ia32_sys_io_destroy+0x580/0x580 [ 287.255965] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 287.260598] ? __ia32_sys_read+0xb0/0xb0 [ 287.264709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.270129] ? trace_hardirqs_off_caller+0x300/0x300 [ 287.275337] do_syscall_64+0x1b9/0x820 [ 287.279238] ? __ia32_sys_io_destroy+0x580/0x580 [ 287.284040] ? do_syscall_64+0x1b9/0x820 [ 287.288111] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.293490] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.298447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.303312] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.308372] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.313409] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.318443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.323322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.328518] RIP: 0033:0x457569 [ 287.331719] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:05:47 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x587180, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x40, 0x2, 0x8, [], &(0x7f0000000080)=0x80}) ioctl$BLKPG(r0, 0x4004092b, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff11, 0x0}) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000200)={@broadcast, @loopback}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) prctl$PR_SET_TIMERSLACK(0x1d, 0x10000000000) 02:05:47 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000080)={0xd, {0x6, 0x2, 0xfffffffffffffe00, 0x2}, {0x6, 0x200, 0xd4bea22, 0x8}, {0x9, 0x1}}) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) read(r2, &(0x7f0000000400)=""/91, 0x5b) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000000c0)={'bond_slave_0\x00', 0x40}) 02:05:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x70, 0x9, 0x200, 0x2, 0xff, 0x0, 0xda, 0x10000, 0xb, 0x6fe, 0x2, 0xff, 0x8001, 0x3c, 0xb3, 0x0, 0x1, 0x53, 0x2, 0x6, 0x8000, 0x2, 0x1ff, 0x9eab, 0x6, 0x4, 0x57cc, 0x218, 0x8b63, 0x5, 0x0, 0x100000001, 0x3, 0x7, 0xe9f, 0x35, 0xae, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x8, 0xfffffffffffffffc, 0x8, 0x8, 0x2, 0x2, 0xf55d}, r1, 0x1, r0, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111}}, 0x20) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x3, &(0x7f0000000000), 0x7, 0x2000000000002) write$apparmor_exec(r1, &(0x7f0000000040)={'exec ', '$:eth0F\x00'}, 0xd) fcntl$setstatus(r1, 0x4, 0x400) syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x40) dup(r1) [ 287.350626] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 287.358354] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 287.365634] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 287.372908] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 287.380187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 287.387462] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 [ 287.394764] CPU: 1 PID: 10200 Comm: syz-executor1 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 287.403365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.412735] Call Trace: [ 287.415333] dump_stack+0x244/0x39d [ 287.418977] ? dump_stack_print_info.cold.1+0x20/0x20 [ 287.424199] ? lock_downgrade+0x900/0x900 [ 287.428368] should_fail.cold.4+0xa/0x17 [ 287.432462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.437581] ? lock_downgrade+0x900/0x900 [ 287.441442] mmap: syz-executor0 (10221) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:05:47 executing program 5: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"b61d3bbe52d75028290785806c026a89b9b1f382d910b3a4aa7b7a3be01627489bc78960dc4a8d8006367a195b9537b7da7acbd83e0c7d61ff9ee151c07b4a894822001e51c79ea8d975f519bd4c83773fab6d212d3bc009fdbe498bc54a964bc215400866865357fa8e35ef56474dc150404bf29ed0456914aa67901bf3d7bb3ba29e324fca8bd4a0b1b2bd278ea3a0576d82c8ae7d8e1fa5e723eee2bb10337bbd3c66f17e7948f81d8da2527dde4a2cd834303701ba103fd94a0c993fa9b5aa87cac21aa20bbe3c531f3c9e8669beca073b815e7c537fa9be19d59d746dda736ce163d030baae4f0950b5b23c7075cf9d19230bc6bf00eb1f130720d75a0f79ba1dd1d46a35bb539fc1d8a9393157a475375c53ed18909358365b478f1fbbea0a1ca9f467747ffb219a8c84c16bc5eb0f2799ef3bb223983ae829346b4f97dd22a040076fcd796b6c96b69b772fc9647ccfb451421195eab4dcec01a0ae5cf1eeb88cbf60a9a58a252997574fa4d3fa15bd5730bcb6b3dcbd030a02b62adf0c5f9b866d768f638248db923b0360cb0ebee0377228f71abe62f9c8b381f7d43be979417a721d041799eaddcaf7f92ffc2b207469251cab19ede5712a340c7c809ae5071851eae8307e464c4c9f04a6be73b0131401cbead4c9772e1bff9a75610e5ef0f22ea700bdac176d1d303bc4fc45f1a80cf38dd8cc2040c0fdec25243ab41e2d5b4371e25c4374926e7ef808821f05ff339ceca62ad91e010389279989f4146fe45ed09b80d32bce8176eeb5b00ef3c7cc5594f59d0dc9e48a4744f6d380ffb7dd8a7f662c1487e78c6941dd35a8d17c29d2c6905a770da057b33ee6e7a03a228ba26b3b9d703548ee6b2a680ee570919d73055421056009ad7f97409b83769aa2be3cbde957d65ea0396d045ad838d993ead88f01649a9c0e868ca9ee0fdd32fe11d1d18fb37bb61537f83680a80aa67c3a7b1bc26025b0286042bc453c3487fabc7d173a4edc3cb978f55cbdcc8d84d85dbaff93970e623f235b40485ca6ffdea0d56c9b87879fbcbea0f1e3e3d70d6d804d4de7e09bfa292d63b68139abe327863c86f559c3933ddc3651fd6fe5552e1654b1bca74f0dd11734a38f4de120a13f5a28fa4a16bc886c47f2a1c47572ec37de795a9aa8c943ee5162219171c3f78603e3ffeec37c20fbbd1394eda40b7e9d8a6b863f1ba8bfe778bb98527aa6e65f8d192f1b50b6d9890ae25c1ffc8e0fa432fe93d4cc7cd80d2715722a8e65f811f20176bc92e5cb1845824fc21c65d654e2d5f7d2810bcaefd14b26fb183f48606343fc981b35133d50f125bdc32f7510a7bb866b9f7d57c393ea253834ca0726e00640ebf77cffcd343dd203946443b16f59d43e59dff2e35701bc5852fafa68c03d486e2a4a65a0ef69fe29931828d5ba94ce954f3b21b493db"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x36c, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001bc0)=""/18, 0x82}, 0xffffffffffffff2b) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="c800005443089711304c0f1202a2ebd00af6915795e53269a0fff34faa059918c6711215caae1acadf1867872409b1cb38f008790d4e2ffcdffad547c1482069fbc24519626f184ba7e2459d25b40998ace0f1ce4a6aaead1a2e2c8226b4839e71d4085d4497b728db878eacf2a8c934221c0600220549082dd892359b4d3c09368e1bbae3ce5f77609c191b144e4ba5034633ecce36d720784bea8f7d5a89ec3bea8e2d54e438fc3087337c0680e012ee13d786aeed58b6ca73e1fe47c96cb70081dbb933563db61628cc7a65451debfd06eae4b8f86e1b05d95c221466864a0b4140e612d4dc12d4e106cf72ff296c4391cb45134a85824a9221fcabebaa70d88f1a40f444d17462df2bdfcd90c15c191b198e1122f434b17af185d13ca3d296043f0f6f841972850073893b5244907bd91dbe47803c1c8dacd4e32f9750fc82ef7a81a29c973a3ade63640816ce007d1dca2d9f7dbda912ba61594706d9bf09fed154fbde7d3490aeb3c6f32552655ebba49396fdd186edec8bf69cf78900000000000000000000000060be47984ddac41cf8be000000cfc0056c7923e873ff06bb1fd1cad47e4a1049a714cc5c684655aa4c1cefe8a45f9348ae9d939b813df5bdea0f599a74f5f7b6dc7c3a6189962c705c1d14d5f4d8e36e08cc126807780008000000000000715e0eeeb1e5efc91efa2091534a3b1d62c883af8a9c7238769345326e0a87fc15440640c3da1088ed1b529cfabba0c11076e3759f5a6124a335d917a9d5881ccae5c36836a4a521ebb492c225c1b5d8a396b4b835b8deb066191b759200d317607575903acdc9dbc784986129c61b17cf9a0dfeab9b72ffc812cc39c79233da2ea8ac29908518f779e83479c1eab9c445b6ccc9ccaf9ab54d1f994e1aa8420e0eb3544281b7a1819fd3c537d5271169c030695ccb036afd936fd64d8948cda440511916e84477c0e4d8ff4fc3bc5671943a93c9f961f69ec57b66ba12663eb089789865d3323b857571a2dfcccb552c69f2827a0900b688f1c68dcef5edb1638218cc"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0xb35f) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r1, 0x891a, &(0x7f0000001800)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 02:05:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80130000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="b4020000240000022abd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x2b4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 287.441791] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 287.441879] ? proc_fail_nth_write+0x9e/0x210 [ 287.441897] ? proc_cwd_link+0x1d0/0x1d0 [ 287.467507] ? find_held_lock+0x36/0x1c0 [ 287.471602] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.477111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.482696] __should_failslab+0x124/0x180 [ 287.486949] should_failslab+0x9/0x14 [ 287.490792] __kmalloc+0x2e0/0x760 [ 287.494344] ? strncpy_from_user+0x5a0/0x5a0 [ 287.498790] ? fput+0x130/0x1a0 [ 287.502083] ? do_syscall_64+0x9a/0x820 [ 287.506067] ? __x64_sys_memfd_create+0x142/0x4f0 [ 287.510921] ? do_syscall_64+0x9a/0x820 [ 287.514911] __x64_sys_memfd_create+0x142/0x4f0 [ 287.519594] ? memfd_fcntl+0x1910/0x1910 [ 287.523695] do_syscall_64+0x1b9/0x820 [ 287.527595] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.532965] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.537896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.537917] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.537932] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.537948] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.537965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.537984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.537994] RIP: 0033:0x457569 [ 287.538007] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.538014] RSP: 002b:00007fed97edaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.538026] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 287.538033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 287.538041] RBP: 000000000072bf00 R08: 0000000000100024 R09: 00000000fbad8001 [ 287.568058] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed97edb6d4 [ 287.568067] R13: 00000000004c5178 R14: 00000000004d8f50 R15: 0000000000000003 02:05:47 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:48 executing program 5: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x36c, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001bc0)=""/18, 0x82}, 0xffffffffffffff2b) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0xb35f) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r1, 0x891a, &(0x7f0000001800)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 02:05:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:48 executing program 1 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) [ 287.902916] FAULT_INJECTION: forcing a failure. [ 287.902916] name failslab, interval 1, probability 0, space 0, times 0 [ 288.015454] CPU: 1 PID: 10234 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 288.024077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.033436] Call Trace: [ 288.036038] dump_stack+0x244/0x39d [ 288.039712] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.044919] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 288.050223] should_fail.cold.4+0xa/0x17 [ 288.054311] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.059526] ? filemap_map_pages+0xd92/0x1a20 [ 288.064052] ? print_usage_bug+0xc0/0xc0 [ 288.068126] ? __lock_acquire+0x62f/0x4c20 [ 288.070453] FAULT_INJECTION: forcing a failure. [ 288.070453] name failslab, interval 1, probability 0, space 0, times 0 [ 288.072381] ? check_preemption_disabled+0x48/0x280 [ 288.072404] ? print_usage_bug+0xc0/0xc0 [ 288.072432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.072473] ? invalidate_inode_pages2_range+0x15ef/0x1cb0 [ 288.103843] ? __lock_acquire+0x62f/0x4c20 [ 288.108116] __should_failslab+0x124/0x180 [ 288.112406] ? mempool_free+0x370/0x370 [ 288.116482] should_failslab+0x9/0x14 [ 288.120316] kmem_cache_alloc+0x47/0x730 [ 288.124414] ? mempool_free+0x370/0x370 [ 288.128401] mempool_alloc_slab+0x44/0x60 [ 288.132566] mempool_alloc+0x193/0x4a0 [ 288.136478] ? __lock_is_held+0xb5/0x140 [ 288.136503] ? mempool_destroy+0x30/0x30 [ 288.136526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.150259] ? xas_start+0x23d/0x740 [ 288.153992] ? xas_pause+0x490/0x490 [ 288.157718] ? graph_lock+0x270/0x270 [ 288.161540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.167149] bio_alloc_bioset+0x3a8/0x700 [ 288.171363] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 288.176564] ? bvec_alloc+0x2d0/0x2d0 [ 288.176582] ? find_held_lock+0x36/0x1c0 [ 288.176631] blkdev_direct_IO+0x335/0x1180 [ 288.176650] ? filemap_range_has_page+0x381/0x4e0 [ 288.193585] ? lock_downgrade+0x900/0x900 [ 288.197748] ? check_preemption_disabled+0x48/0x280 [ 288.202794] ? check_memory_region+0xe1/0x1b0 [ 288.207312] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 288.212616] ? generic_update_time+0x26a/0x450 [ 288.217213] ? may_umount_tree+0x210/0x210 [ 288.221481] ? filemap_range_has_page+0x223/0x4e0 [ 288.226337] ? unaccount_page_cache_page+0x1450/0x1450 [ 288.231641] ? __mnt_drop_write_file+0x31/0x40 [ 288.236332] ? current_time+0x1b0/0x1b0 [ 288.240362] generic_file_direct_write+0x275/0x4b0 [ 288.245331] __generic_file_write_iter+0x2ff/0x630 [ 288.250292] blkdev_write_iter+0x23d/0x450 [ 288.254544] ? blkdev_close+0xb0/0xb0 [ 288.258429] ? apparmor_file_permission+0x24/0x30 [ 288.263296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.268898] ? security_file_permission+0x1c2/0x220 [ 288.273940] aio_write+0x3b1/0x610 [ 288.277510] ? aio_complete_rw+0x640/0x640 [ 288.281764] ? lock_downgrade+0x900/0x900 [ 288.281797] ? kasan_check_read+0x11/0x20 [ 288.281817] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 288.290158] io_submit_one+0xaa1/0xf80 [ 288.290179] ? aio_poll+0x1420/0x1420 [ 288.290204] ? __might_fault+0x12b/0x1e0 [ 288.290223] ? lock_downgrade+0x900/0x900 [ 288.290243] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.290258] ? blk_lld_busy+0xa0/0xa0 [ 288.290286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.290317] __x64_sys_io_submit+0x1ab/0x580 [ 288.330600] ? __ia32_sys_io_destroy+0x580/0x580 [ 288.335374] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 288.339969] ? __ia32_sys_read+0xb0/0xb0 [ 288.344045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.349435] ? trace_hardirqs_off_caller+0x300/0x300 [ 288.354572] do_syscall_64+0x1b9/0x820 [ 288.358474] ? __ia32_sys_io_destroy+0x580/0x580 [ 288.363241] ? do_syscall_64+0x1b9/0x820 [ 288.367332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.372712] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.377659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.382530] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.387559] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.392606] ? prepare_exit_to_usermode+0x291/0x3b0 [ 288.397670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.402530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.407726] RIP: 0033:0x457569 [ 288.410928] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.429828] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 288.437558] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 288.444845] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 288.444868] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 288.444877] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 288.444887] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 [ 288.445175] CPU: 1 PID: 10244 Comm: syz-executor1 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 288.459476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.459482] Call Trace: [ 288.459515] dump_stack+0x244/0x39d [ 288.459550] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.459577] should_fail.cold.4+0xa/0x17 [ 288.459597] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.459615] ? find_held_lock+0x36/0x1c0 02:05:48 executing program 0: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x36c, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001bc0)=""/18, 0x82}, 0xffffffffffffff2b) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0xb35f) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r1, 0x891a, &(0x7f0000001800)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 02:05:48 executing program 5: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3, 0x3}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000001b40)={&(0x7f0000001b00)=[0x81, 0x10000, 0xff, 0x7, 0xffffffff, 0x7, 0x7fffffff, 0x1], 0x8, 0x8, 0x5, 0x4, 0x9, 0x1, {0x94d0, 0xffffffffffffffff, 0x7, 0x8001, 0x1, 0x38000000, 0x8d, 0x0, 0xd3f4, 0x8000, 0x6000000000000000, 0x200, 0x5, 0x6, "be5c17866ecdfe67be815db6f779891a5f47e0529168c95ba5f390bf32dddb21"}}) r5 = semget(0xffffffffffffffff, 0x7, 0x200) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000000680)=""/4096) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r5, 0x7, 0xc, &(0x7f0000001680)=""/161) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001840)={r4, 0x0, 0x36c, 0x12, &(0x7f0000001780)="a6a87f2640002bda765a36e58f5b01ca79b2b15f3cc116611cb281e513e99bd07e31f0c509193fcac3833851e7822d951d56901c85ac177b2b44102393b20421fe33a3a1a4516b892d5b9eaffa2ec995f1a581a492d013633ec4ac8a497e09ed8f250b7dd86bd4bf9eb24de111504bc523", &(0x7f0000001bc0)=""/18, 0x82}, 0xffffffffffffff2b) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000001740)={0x221, 0x7, 0x800, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], &(0x7f0000001cc0)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001d00)={0x0, 0x3f, 0x20}, 0xc) r6 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$KDADDIO(r4, 0x4b34, 0xb35f) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x7) ioctl(r1, 0x891a, &(0x7f0000001800)="0a5cc80700315f85715070") r8 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x1a8) getsockopt$inet6_buf(r6, 0x29, 0x15, &(0x7f0000001900)=""/145, &(0x7f00000019c0)=0x91) ftruncate(r2, 0x7cf) semctl$GETVAL(r5, 0x3, 0xc, &(0x7f0000001a00)=""/193) 02:05:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) [ 288.459638] ? graph_lock+0x270/0x270 [ 288.459654] ? __lock_acquire+0x62f/0x4c20 [ 288.459669] ? lock_downgrade+0x900/0x900 [ 288.459699] ? check_preemption_disabled+0x48/0x280 [ 288.459718] ? find_held_lock+0x36/0x1c0 [ 288.459752] ? expand_files.part.8+0x571/0x9a0 [ 288.459767] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.459793] ? find_held_lock+0x36/0x1c0 [ 288.459814] __should_failslab+0x124/0x180 [ 288.503691] should_failslab+0x9/0x14 [ 288.512871] kmem_cache_alloc+0x2be/0x730 [ 288.512895] ? shmem_destroy_callback+0xc0/0xc0 [ 288.512913] shmem_alloc_inode+0x1b/0x40 [ 288.512927] alloc_inode+0x63/0x190 [ 288.512943] new_inode_pseudo+0x71/0x1a0 [ 288.512958] ? prune_icache_sb+0x1c0/0x1c0 [ 288.512978] ? _raw_spin_unlock+0x2c/0x50 [ 288.589313] new_inode+0x1c/0x40 [ 288.592697] shmem_get_inode+0xf1/0x920 [ 288.596736] ? shmem_encode_fh+0x340/0x340 [ 288.600980] ? lock_downgrade+0x900/0x900 [ 288.605145] ? lock_release+0xa10/0xa10 [ 288.609129] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.614593] ? usercopy_warn+0x110/0x110 [ 288.618676] __shmem_file_setup.part.50+0x83/0x2a0 [ 288.623625] shmem_file_setup+0x65/0x90 [ 288.627615] __x64_sys_memfd_create+0x2af/0x4f0 [ 288.632323] ? memfd_fcntl+0x1910/0x1910 [ 288.636408] do_syscall_64+0x1b9/0x820 [ 288.640304] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.645677] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.650632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.655527] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.660584] ? prepare_exit_to_usermode+0x3b0/0x3b0 02:05:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x101, 0x402) recvfrom$llc(r1, &(0x7f0000000200)=""/213, 0xd5, 0x100, &(0x7f0000000300)={0x1a, 0x324, 0x614, 0x1a56, 0x1000, 0x5}, 0x10) getsockopt$inet6_tcp_int(r1, 0x6, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000004, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/202) open$dir(&(0x7f00000001c0)='./file0\x00', 0x4001, 0x115) [ 288.665612] ? prepare_exit_to_usermode+0x291/0x3b0 [ 288.670643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.675514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.680710] RIP: 0033:0x457569 [ 288.683915] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.702822] RSP: 002b:00007fed97edaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 288.710537] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 288.717817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 288.725108] RBP: 000000000072bf00 R08: 0000000000100024 R09: 00000000fbad8001 [ 288.732823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed97edb6d4 [ 288.740212] R13: 00000000004c5178 R14: 00000000004d8f50 R15: 0000000000000003 02:05:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000089c0)={0x1, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000000000ad00010000000000661f0100000000000076ebb52fa258d095"], &(0x7f0000003ff6)='syzkaller\x00', 0x9d84, 0x3e9, &(0x7f0000000140)=""/195, 0x0, 0x0, [0x1b515f]}, 0x48) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000080)) 02:05:49 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:49 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, r2, 0x10001d00) 02:05:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) 02:05:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) [ 288.916178] FAULT_INJECTION: forcing a failure. [ 288.916178] name failslab, interval 1, probability 0, space 0, times 0 [ 288.965353] CPU: 1 PID: 10270 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 288.973952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.983321] Call Trace: [ 288.985968] dump_stack+0x244/0x39d [ 288.989616] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.994988] ? is_bpf_text_address+0xd3/0x170 [ 288.999514] should_fail.cold.4+0xa/0x17 [ 289.003613] ? __save_stack_trace+0x8d/0xf0 [ 289.007952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.007981] ? save_stack+0xa9/0xd0 [ 289.008000] ? kasan_kmalloc+0xc7/0xe0 [ 289.008014] ? kasan_slab_alloc+0x12/0x20 [ 289.008034] ? kmem_cache_alloc+0x12e/0x730 [ 289.016800] ? mempool_alloc_slab+0x44/0x60 [ 289.016817] ? mempool_alloc+0x193/0x4a0 [ 289.016834] ? bio_alloc_bioset+0x3a8/0x700 [ 289.016850] ? blkdev_direct_IO+0x335/0x1180 [ 289.016869] ? generic_file_direct_write+0x275/0x4b0 [ 289.024878] ? __generic_file_write_iter+0x2ff/0x630 [ 289.024892] ? blkdev_write_iter+0x23d/0x450 [ 289.024907] ? aio_write+0x3b1/0x610 02:05:49 executing program 5: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="99861f207760b3f4ad5bc1b541de2c1aad92805fc67d794af024cb95e58367ce137ac8c354a94ccd4cdb1cb62d12b9a098e289e1313266cd36946a518042c3d0c350ae20c9e024024db937c48f195cbbc08ef7462e9bdd31f2499eaf671f685600f5b3b7258c055dad3d76fca35a99d33621fcc98dd2b335a36fefadbae23c36b7a3b70f96f52c2c3079c16667b4b115afe0a3732cd86fd03f867b45c93960b736c72b4f75aaae80ef51239aff366d13780ecb075251a502ab6594594c8e3c185adfe25c1cc00e3ff4d16e9c13032165c931567f84cd3d4fa774c542b83a469031776764510ba534a5b9f40335fdd70f72"]) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) bind(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x1, 0x3, 0x4, 0x4}}, 0x7f) [ 289.024921] ? io_submit_one+0xaa1/0xf80 [ 289.024936] ? __x64_sys_io_submit+0x1ab/0x580 [ 289.024955] ? do_syscall_64+0x1b9/0x820 [ 289.068687] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.068710] ? find_held_lock+0x36/0x1c0 [ 289.068749] ? kmem_cache_alloc+0x58f/0x730 [ 289.068792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.086854] ? check_preemption_disabled+0x48/0x280 [ 289.086885] __should_failslab+0x124/0x180 [ 289.086903] ? mempool_free+0x370/0x370 [ 289.086924] should_failslab+0x9/0x14 02:05:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) [ 289.113806] kmem_cache_alloc+0x47/0x730 [ 289.117883] ? mempool_free+0x370/0x370 [ 289.117903] mempool_alloc_slab+0x44/0x60 [ 289.117921] mempool_alloc+0x193/0x4a0 [ 289.117944] ? mempool_destroy+0x30/0x30 [ 289.133972] ? kasan_check_write+0x14/0x20 [ 289.138232] ? bio_init+0x13c/0x270 [ 289.141907] ? bio_add_page+0x130/0x130 [ 289.145900] ? xas_start+0x23d/0x740 [ 289.149635] bvec_alloc+0x12a/0x2d0 [ 289.153295] bio_alloc_bioset+0x47a/0x700 [ 289.157488] ? bvec_alloc+0x2d0/0x2d0 [ 289.161312] ? find_held_lock+0x36/0x1c0 [ 289.165439] blkdev_direct_IO+0x335/0x1180 [ 289.169695] ? filemap_range_has_page+0x381/0x4e0 [ 289.174550] ? lock_downgrade+0x900/0x900 [ 289.178707] ? check_preemption_disabled+0x48/0x280 [ 289.183736] ? check_memory_region+0xe1/0x1b0 [ 289.188256] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 289.193619] ? generic_update_time+0x26a/0x450 [ 289.198214] ? may_umount_tree+0x210/0x210 [ 289.202478] ? filemap_range_has_page+0x223/0x4e0 [ 289.202516] ? unaccount_page_cache_page+0x1450/0x1450 [ 289.202533] ? __mnt_drop_write_file+0x31/0x40 [ 289.202553] ? current_time+0x1b0/0x1b0 [ 289.202578] generic_file_direct_write+0x275/0x4b0 [ 289.202605] __generic_file_write_iter+0x2ff/0x630 [ 289.202628] blkdev_write_iter+0x23d/0x450 [ 289.212835] ? blkdev_close+0xb0/0xb0 [ 289.212854] ? apparmor_file_permission+0x24/0x30 [ 289.212873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.212892] ? security_file_permission+0x1c2/0x220 [ 289.212920] aio_write+0x3b1/0x610 [ 289.212943] ? aio_complete_rw+0x640/0x640 [ 289.212971] ? lock_downgrade+0x900/0x900 [ 289.212998] ? kasan_check_read+0x11/0x20 [ 289.213014] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 289.213046] io_submit_one+0xaa1/0xf80 [ 289.213067] ? aio_poll+0x1420/0x1420 [ 289.213090] ? __might_fault+0x12b/0x1e0 [ 289.279257] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 289.280113] ? lock_downgrade+0x900/0x900 [ 289.280134] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.280150] ? blk_lld_busy+0xa0/0xa0 [ 289.280168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.280215] __x64_sys_io_submit+0x1ab/0x580 [ 289.280237] ? __ia32_sys_io_destroy+0x580/0x580 [ 289.280258] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 289.326654] ? __ia32_sys_read+0xb0/0xb0 [ 289.330712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.336063] ? trace_hardirqs_off_caller+0x300/0x300 [ 289.341178] do_syscall_64+0x1b9/0x820 [ 289.345051] ? __ia32_sys_io_destroy+0x580/0x580 [ 289.349799] ? do_syscall_64+0x1b9/0x820 [ 289.353850] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.359229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.364147] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.368980] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.373982] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.379011] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.384047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.388880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.394053] RIP: 0033:0x457569 [ 289.397232] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.416133] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 289.423911] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 289.431180] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 289.438439] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.445705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 289.452975] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 02:05:49 executing program 4 (fault-call:2 fault-nth:3): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 289.560385] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:05:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) socket$inet(0x2, 0x840000000003, 0x2) [ 289.673419] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2140c0, 0x0) 02:05:49 executing program 5: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="99861f207760b3f4ad5bc1b541de2c1aad92805fc67d794af024cb95e58367ce137ac8c354a94ccd4cdb1cb62d12b9a098e289e1313266cd36946a518042c3d0c350ae20c9e024024db937c48f195cbbc08ef7462e9bdd31f2499eaf671f685600f5b3b7258c055dad3d76fca35a99d33621fcc98dd2b335a36fefadbae23c36b7a3b70f96f52c2c3079c16667b4b115afe0a3732cd86fd03f867b45c93960b736c72b4f75aaae80ef51239aff366d13780ecb075251a502ab6594594c8e3c185adfe25c1cc00e3ff4d16e9c13032165c931567f84cd3d4fa774c542b83a469031776764510ba534a5b9f40335fdd70f72"]) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) bind(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x1, 0x3, 0x4, 0x4}}, 0x7f) [ 289.700555] FAULT_INJECTION: forcing a failure. [ 289.700555] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 289.712386] CPU: 0 PID: 10309 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 289.721427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.730790] Call Trace: [ 289.733404] dump_stack+0x244/0x39d [ 289.737036] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.742255] ? rwlock_bug.part.2+0x90/0x90 [ 289.746540] should_fail.cold.4+0xa/0x17 [ 289.750607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.755714] ? is_bpf_text_address+0xac/0x170 [ 289.760200] ? lock_downgrade+0x900/0x900 [ 289.764442] ? check_preemption_disabled+0x48/0x280 [ 289.769450] ? kasan_check_read+0x11/0x20 [ 289.773597] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 289.778877] ? rcu_read_unlock_special+0x370/0x370 [ 289.783803] ? rcu_softirq_qs+0x20/0x20 [ 289.787834] ? unwind_dump+0x190/0x190 [ 289.791750] ? is_bpf_text_address+0xd3/0x170 [ 289.796373] ? kernel_text_address+0x79/0xf0 02:05:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 289.800789] ? __kernel_text_address+0xd/0x40 [ 289.805314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.810884] ? should_fail+0x22d/0xd01 [ 289.814775] ? __save_stack_trace+0x8d/0xf0 [ 289.819097] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.824206] __alloc_pages_nodemask+0x34b/0xdd0 [ 289.828862] ? save_stack+0xa9/0xd0 [ 289.832479] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 289.837499] ? mempool_alloc_slab+0x44/0x60 [ 289.841811] ? bio_alloc_bioset+0x3a8/0x700 [ 289.846134] ? blkdev_direct_IO+0x335/0x1180 [ 289.850532] ? generic_file_direct_write+0x275/0x4b0 [ 289.855623] ? __generic_file_write_iter+0x2ff/0x630 [ 289.860726] ? blkdev_write_iter+0x23d/0x450 [ 289.865121] ? aio_write+0x3b1/0x610 [ 289.868833] ? io_submit_one+0xaa1/0xf80 [ 289.872892] ? do_syscall_64+0x1b9/0x820 [ 289.876940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.882323] ? kmem_cache_alloc+0x58f/0x730 [ 289.886649] ? trace_hardirqs_off+0xb8/0x310 [ 289.891049] cache_grow_begin+0xa5/0x8c0 [ 289.895120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.900673] ? check_preemption_disabled+0x48/0x280 [ 289.905677] kmem_cache_alloc+0x66b/0x730 [ 289.909817] ? mempool_free+0x370/0x370 [ 289.913789] mempool_alloc_slab+0x44/0x60 [ 289.918102] mempool_alloc+0x193/0x4a0 [ 289.921982] ? mempool_destroy+0x30/0x30 [ 289.926037] ? kasan_check_write+0x14/0x20 [ 289.930314] ? bio_init+0x13c/0x270 [ 289.933944] ? bio_add_page+0x130/0x130 [ 289.937934] ? xas_start+0x23d/0x740 [ 289.941641] bvec_alloc+0x12a/0x2d0 [ 289.945277] bio_alloc_bioset+0x47a/0x700 [ 289.949445] ? bvec_alloc+0x2d0/0x2d0 [ 289.953249] ? find_held_lock+0x36/0x1c0 [ 289.957326] blkdev_direct_IO+0x335/0x1180 [ 289.961553] ? filemap_range_has_page+0x381/0x4e0 [ 289.966384] ? lock_downgrade+0x900/0x900 [ 289.970519] ? check_preemption_disabled+0x48/0x280 [ 289.975524] ? check_memory_region+0xe1/0x1b0 [ 289.980007] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 289.985276] ? generic_update_time+0x26a/0x450 [ 289.989849] ? may_umount_tree+0x210/0x210 [ 289.994073] ? filemap_range_has_page+0x223/0x4e0 [ 289.998912] ? unaccount_page_cache_page+0x1450/0x1450 [ 290.004184] ? __mnt_drop_write_file+0x31/0x40 [ 290.008749] ? current_time+0x1b0/0x1b0 [ 290.012713] generic_file_direct_write+0x275/0x4b0 [ 290.017635] __generic_file_write_iter+0x2ff/0x630 [ 290.022568] blkdev_write_iter+0x23d/0x450 [ 290.026802] ? blkdev_close+0xb0/0xb0 [ 290.030610] ? apparmor_file_permission+0x24/0x30 [ 290.035460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.041000] ? security_file_permission+0x1c2/0x220 [ 290.046023] aio_write+0x3b1/0x610 [ 290.049564] ? aio_complete_rw+0x640/0x640 [ 290.053809] ? lock_downgrade+0x900/0x900 [ 290.057948] ? kasan_check_read+0x11/0x20 [ 290.062095] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 290.067365] io_submit_one+0xaa1/0xf80 [ 290.071239] ? aio_poll+0x1420/0x1420 [ 290.075053] ? __might_fault+0x12b/0x1e0 [ 290.079124] ? lock_downgrade+0x900/0x900 [ 290.083281] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.088723] ? blk_lld_busy+0xa0/0xa0 [ 290.092529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.098059] __x64_sys_io_submit+0x1ab/0x580 [ 290.102458] ? __ia32_sys_io_destroy+0x580/0x580 [ 290.107203] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 290.111771] ? __ia32_sys_read+0xb0/0xb0 [ 290.115833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.121201] ? trace_hardirqs_off_caller+0x300/0x300 [ 290.126319] do_syscall_64+0x1b9/0x820 [ 290.130191] ? __ia32_sys_io_destroy+0x580/0x580 [ 290.134945] ? do_syscall_64+0x1b9/0x820 [ 290.138991] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.144355] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.149276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.154118] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.159132] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.164148] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.169151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.173993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.179165] RIP: 0033:0x457569 [ 290.182345] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.201227] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 290.208919] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 290.216176] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 290.223441] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.230705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 290.237972] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 02:05:50 executing program 4 (fault-call:2 fault-nth:4): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) [ 290.487543] FAULT_INJECTION: forcing a failure. [ 290.487543] name failslab, interval 1, probability 0, space 0, times 0 [ 290.498898] CPU: 1 PID: 10332 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 290.505758] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 290.507475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.507482] Call Trace: [ 290.507507] dump_stack+0x244/0x39d [ 290.507530] ? dump_stack_print_info.cold.1+0x20/0x20 02:05:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x40000000000d0, &(0x7f0000000280), 0x1) [ 290.507548] ? update_load_avg+0x2470/0x2470 [ 290.507577] should_fail.cold.4+0xa/0x17 [ 290.507599] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.507632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.507655] ? graph_lock+0x270/0x270 [ 290.557104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.562686] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 290.567875] ? find_held_lock+0x36/0x1c0 [ 290.571946] ? finish_task_switch+0x1f4/0x920 [ 290.576448] ? _raw_spin_unlock_irq+0x27/0x80 [ 290.580934] ? graph_lock+0x270/0x270 [ 290.584761] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 290.589375] ? trace_hardirqs_on+0xbd/0x310 [ 290.593710] ? kasan_check_read+0x11/0x20 [ 290.597862] __should_failslab+0x124/0x180 [ 290.602090] should_failslab+0x9/0x14 [ 290.605877] kmem_cache_alloc_node+0x56/0x730 [ 290.610369] ? find_held_lock+0x36/0x1c0 [ 290.614488] create_task_io_context+0xbd/0x580 [ 290.619065] ? ioc_clear_queue+0x6c0/0x6c0 [ 290.623299] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.628774] ? __schedule+0x8d7/0x21d0 [ 290.632683] generic_make_request_checks+0x1f0b/0x2660 [ 290.637950] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 290.642695] ? trace_event_raw_event_block_rq_requeue+0x6f0/0x6f0 [ 290.648912] ? trace_hardirqs_on_caller+0xc0/0x310 [ 290.653841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 290.658586] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 290.664290] ? retint_kernel+0x1b/0x2d [ 290.668196] ? trace_hardirqs_on+0x310/0x310 [ 290.672605] ? save_stack+0xa9/0xd0 [ 290.676227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 290.680975] ? retint_kernel+0x2d/0x2d [ 290.684863] ? get_user_pages_fast+0x260/0x450 [ 290.689436] ? get_user_pages_fast+0x267/0x450 [ 290.694008] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 290.699021] ? get_user_pages_fast+0x2a9/0x450 [ 290.703621] ? __get_user_pages_fast+0x3f0/0x3f0 [ 290.708420] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 290.713968] generic_make_request+0x2c7/0x1890 [ 290.718560] ? blk_queue_enter+0x1200/0x1200 [ 290.722999] ? csum_and_copy_from_iter+0x14f0/0x14f0 [ 290.728106] ? mempool_alloc_slab+0x44/0x60 [ 290.732429] ? mempool_free+0x370/0x370 [ 290.736392] ? mempool_alloc_slab+0x44/0x60 [ 290.740716] ? mempool_alloc+0x1a0/0x4a0 [ 290.744772] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 290.749796] ? iov_iter_advance+0x306/0x13f0 [ 290.754191] ? mempool_destroy+0x30/0x30 [ 290.758239] ? kasan_check_write+0x14/0x20 [ 290.762473] ? bio_init+0x13c/0x270 [ 290.766088] ? _copy_to_iter_mcsafe+0x1680/0x1680 [ 290.770914] ? bio_add_page+0xf9/0x130 [ 290.774795] submit_bio+0xba/0x460 [ 290.778332] ? submit_bio+0xba/0x460 [ 290.782047] ? generic_make_request+0x1890/0x1890 [ 290.786879] ? iov_iter_for_each_range+0xc90/0xc90 [ 290.791811] ? find_held_lock+0x36/0x1c0 [ 290.795881] blkdev_direct_IO+0x75b/0x1180 [ 290.800113] ? aio_complete+0xc20/0xc20 [ 290.804110] ? check_memory_region+0xe1/0x1b0 [ 290.808612] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 290.813881] ? generic_update_time+0x26a/0x450 [ 290.818464] ? may_umount_tree+0x210/0x210 [ 290.822698] ? filemap_range_has_page+0x223/0x4e0 [ 290.827542] ? unaccount_page_cache_page+0x1450/0x1450 [ 290.832834] ? __mnt_drop_write_file+0x31/0x40 [ 290.837404] ? current_time+0x1b0/0x1b0 [ 290.841373] generic_file_direct_write+0x275/0x4b0 [ 290.846316] __generic_file_write_iter+0x2ff/0x630 [ 290.851235] blkdev_write_iter+0x23d/0x450 [ 290.855493] ? blkdev_close+0xb0/0xb0 [ 290.859289] ? apparmor_file_permission+0x24/0x30 [ 290.864123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.869662] ? security_file_permission+0x1c2/0x220 [ 290.874683] aio_write+0x3b1/0x610 [ 290.878212] ? aio_complete_rw+0x640/0x640 [ 290.882454] ? lock_downgrade+0x900/0x900 [ 290.886613] ? kasan_check_read+0x11/0x20 [ 290.890762] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 290.896039] io_submit_one+0xaa1/0xf80 [ 290.899918] ? aio_poll+0x1420/0x1420 [ 290.903769] ? __might_fault+0x12b/0x1e0 [ 290.907820] ? lock_downgrade+0x900/0x900 [ 290.911967] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.917415] ? blk_lld_busy+0xa0/0xa0 [ 290.921201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.926749] __x64_sys_io_submit+0x1ab/0x580 [ 290.931170] ? __ia32_sys_io_destroy+0x580/0x580 [ 290.935940] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 290.940530] ? __ia32_sys_read+0xb0/0xb0 [ 290.944595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.949957] ? trace_hardirqs_off_caller+0x300/0x300 [ 290.955096] do_syscall_64+0x1b9/0x820 [ 290.959002] ? __ia32_sys_io_destroy+0x580/0x580 [ 290.963741] ? do_syscall_64+0x1b9/0x820 [ 290.967823] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.973196] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.978126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.982973] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.987975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.992994] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.998018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.002878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.008065] RIP: 0033:0x457569 [ 291.011279] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.030170] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 291.037864] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 291.045119] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 291.052372] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 291.059657] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 291.066922] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 02:05:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:51 executing program 4 (fault-call:2 fault-nth:5): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:51 executing program 5: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="99861f207760b3f4ad5bc1b541de2c1aad92805fc67d794af024cb95e58367ce137ac8c354a94ccd4cdb1cb62d12b9a098e289e1313266cd36946a518042c3d0c350ae20c9e024024db937c48f195cbbc08ef7462e9bdd31f2499eaf671f685600f5b3b7258c055dad3d76fca35a99d33621fcc98dd2b335a36fefadbae23c36b7a3b70f96f52c2c3079c16667b4b115afe0a3732cd86fd03f867b45c93960b736c72b4f75aaae80ef51239aff366d13780ecb075251a502ab6594594c8e3c185adfe25c1cc00e3ff4d16e9c13032165c931567f84cd3d4fa774c542b83a469031776764510ba534a5b9f40335fdd70f72"]) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) bind(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x1, 0x3, 0x4, 0x4}}, 0x7f) 02:05:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) socket$inet(0x2, 0x840000000003, 0x2) 02:05:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 291.234106] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 291.298871] FAULT_INJECTION: forcing a failure. [ 291.298871] name failslab, interval 1, probability 0, space 0, times 0 [ 291.310190] CPU: 1 PID: 10351 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 291.318776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.328142] Call Trace: [ 291.330762] dump_stack+0x244/0x39d [ 291.334401] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.339579] ? get_page_from_freelist+0x49da/0x5340 [ 291.344602] should_fail.cold.4+0xa/0x17 [ 291.348650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.353741] ? print_usage_bug+0xc0/0xc0 [ 291.357798] ? __isolate_free_page+0x610/0x610 [ 291.362381] ? print_usage_bug+0xc0/0xc0 [ 291.366433] ? __lock_acquire+0x62f/0x4c20 [ 291.370668] ? mark_held_locks+0x130/0x130 [ 291.374914] __should_failslab+0x124/0x180 [ 291.379161] ? mempool_free+0x370/0x370 [ 291.383121] should_failslab+0x9/0x14 [ 291.386932] kmem_cache_alloc+0x47/0x730 [ 291.390991] ? find_held_lock+0x36/0x1c0 [ 291.395043] ? mempool_free+0x370/0x370 [ 291.399034] mempool_alloc_slab+0x44/0x60 [ 291.403167] mempool_alloc+0x193/0x4a0 [ 291.407043] ? mempool_destroy+0x30/0x30 [ 291.411088] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 291.416360] ? rcu_read_unlock_special+0x370/0x370 [ 291.421291] ? print_usage_bug+0xc0/0xc0 [ 291.425342] ? print_usage_bug+0xc0/0xc0 [ 291.429398] bio_alloc_bioset+0x3a8/0x700 [ 291.433535] ? __debug_object_init+0x57d/0x1290 [ 291.438190] ? bvec_alloc+0x2d0/0x2d0 [ 291.441979] ? __lock_acquire+0x62f/0x4c20 [ 291.446202] bio_clone_fast+0x26/0x110 [ 291.450106] bio_split+0x86/0x260 [ 291.453589] blk_queue_split+0xa0d/0x2060 [ 291.457790] ? blk_queue_bounce+0x126/0x28b3 [ 291.462208] ? blk_rq_map_sg+0x1ac0/0x1ac0 [ 291.466433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.471977] ? __lock_is_held+0xb5/0x140 [ 291.476034] ? graph_lock+0x270/0x270 [ 291.479834] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.485374] blk_mq_make_request+0x35a/0x24c0 [ 291.489865] ? blk_mq_try_issue_directly+0x1f0/0x1f0 [ 291.494966] ? find_held_lock+0x36/0x1c0 [ 291.499032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.504564] ? check_preemption_disabled+0x48/0x280 [ 291.509571] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.515095] ? rcu_pm_notify+0xc0/0xc0 [ 291.518997] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.524532] ? generic_make_request_checks+0x65b/0x2660 [ 291.529920] ? __save_stack_trace+0x8d/0xf0 [ 291.534241] ? trace_event_raw_event_block_rq_requeue+0x6f0/0x6f0 [ 291.540474] ? save_stack+0xa9/0xd0 [ 291.544088] ? save_stack+0x43/0xd0 [ 291.547699] ? kasan_slab_alloc+0x12/0x20 [ 291.551832] ? kmem_cache_alloc+0x12e/0x730 [ 291.556160] ? mempool_alloc_slab+0x44/0x60 [ 291.560485] ? mempool_alloc+0x193/0x4a0 [ 291.564543] ? bio_alloc_bioset+0x47a/0x700 [ 291.568853] ? get_user_pages_fast+0x22b/0x450 [ 291.573427] ? get_user_pages_fast+0x22b/0x450 [ 291.578059] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 291.582661] ? trace_hardirqs_on+0xbd/0x310 [ 291.586974] ? iov_iter_get_pages+0x2fa/0x12a0 [ 291.591543] ? trace_hardirqs_off_caller+0x300/0x300 [ 291.596660] ? cache_grow_end+0xa8/0x190 [ 291.600727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 291.605739] ? get_user_pages_fast+0x2a9/0x450 [ 291.610337] ? __get_user_pages_fast+0x3f0/0x3f0 [ 291.615092] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.620635] generic_make_request+0x9ab/0x1890 [ 291.625207] ? blk_queue_enter+0x1200/0x1200 [ 291.629626] ? csum_and_copy_from_iter+0x14f0/0x14f0 [ 291.634717] ? mempool_alloc_slab+0x44/0x60 [ 291.639045] ? mempool_free+0x370/0x370 [ 291.643005] ? mempool_alloc_slab+0x44/0x60 [ 291.647330] ? mempool_alloc+0x1a0/0x4a0 [ 291.651381] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 291.656385] ? iov_iter_advance+0x306/0x13f0 [ 291.660814] ? mempool_destroy+0x30/0x30 [ 291.664879] ? kasan_check_write+0x14/0x20 [ 291.669130] ? bio_init+0x13c/0x270 [ 291.672776] ? _copy_to_iter_mcsafe+0x1680/0x1680 [ 291.677615] ? bio_add_page+0xf9/0x130 [ 291.681516] submit_bio+0xba/0x460 [ 291.685071] ? submit_bio+0xba/0x460 [ 291.688794] ? generic_make_request+0x1890/0x1890 [ 291.693625] ? iov_iter_for_each_range+0xc90/0xc90 [ 291.698558] ? find_held_lock+0x36/0x1c0 [ 291.702612] blkdev_direct_IO+0x75b/0x1180 [ 291.706845] ? aio_complete+0xc20/0xc20 [ 291.710824] ? check_memory_region+0xe1/0x1b0 [ 291.715329] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 291.720716] ? generic_update_time+0x26a/0x450 [ 291.725302] ? may_umount_tree+0x210/0x210 [ 291.729550] ? filemap_range_has_page+0x223/0x4e0 [ 291.734411] ? unaccount_page_cache_page+0x1450/0x1450 [ 291.739673] ? __mnt_drop_write_file+0x31/0x40 [ 291.744244] ? current_time+0x1b0/0x1b0 [ 291.748220] generic_file_direct_write+0x275/0x4b0 [ 291.753139] __generic_file_write_iter+0x2ff/0x630 [ 291.758071] blkdev_write_iter+0x23d/0x450 [ 291.762308] ? blkdev_close+0xb0/0xb0 [ 291.766098] ? apparmor_file_permission+0x24/0x30 [ 291.770942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.776468] ? security_file_permission+0x1c2/0x220 [ 291.781475] aio_write+0x3b1/0x610 [ 291.785006] ? aio_complete_rw+0x640/0x640 [ 291.789253] ? lock_downgrade+0x900/0x900 [ 291.793420] ? kasan_check_read+0x11/0x20 [ 291.797559] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 291.802827] io_submit_one+0xaa1/0xf80 [ 291.806714] ? aio_poll+0x1420/0x1420 [ 291.810530] ? __might_fault+0x12b/0x1e0 [ 291.814592] ? lock_downgrade+0x900/0x900 [ 291.818737] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.824185] ? blk_lld_busy+0xa0/0xa0 [ 291.827994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.833525] __x64_sys_io_submit+0x1ab/0x580 [ 291.837922] ? __ia32_sys_io_destroy+0x580/0x580 [ 291.842684] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 291.847254] ? __ia32_sys_read+0xb0/0xb0 [ 291.851315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.856692] ? trace_hardirqs_off_caller+0x300/0x300 [ 291.861807] do_syscall_64+0x1b9/0x820 [ 291.865737] ? __ia32_sys_io_destroy+0x580/0x580 [ 291.870518] ? do_syscall_64+0x1b9/0x820 [ 291.874585] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.879950] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.884872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.889750] ? trace_hardirqs_on_caller+0x310/0x310 [ 291.894755] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.899770] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.904810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.909644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.914840] RIP: 0033:0x457569 [ 291.918021] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.936911] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 291.944619] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 291.951876] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 291.959127] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 291.966380] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 291.973632] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 02:05:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) rt_sigtimedwait(&(0x7f0000000240)={0x4}, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) 02:05:52 executing program 4 (fault-call:2 fault-nth:6): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 292.224717] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 292.246861] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 292.319369] FAULT_INJECTION: forcing a failure. [ 292.319369] name failslab, interval 1, probability 0, space 0, times 0 [ 292.338435] CPU: 0 PID: 10384 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 292.347030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.356389] Call Trace: [ 292.359007] dump_stack+0x244/0x39d [ 292.362651] ? dump_stack_print_info.cold.1+0x20/0x20 02:05:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) [ 292.367859] should_fail.cold.4+0xa/0x17 [ 292.371937] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.377045] ? rcu_softirq_qs+0x20/0x20 [ 292.381027] ? lock_downgrade+0x900/0x900 [ 292.385204] ? check_preemption_disabled+0x48/0x280 [ 292.390244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.395816] ? blk_queue_exit+0x1b0/0x330 [ 292.399978] ? direct_make_request+0x580/0x580 [ 292.404574] ? trace_event_raw_event_block_rq_requeue+0x6f0/0x6f0 [ 292.410811] ? blkdev_write_iter+0x23d/0x450 02:05:52 executing program 5: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="99861f207760b3f4ad5bc1b541de2c1aad92805fc67d794af024cb95e58367ce137ac8c354a94ccd4cdb1cb62d12b9a098e289e1313266cd36946a518042c3d0c350ae20c9e024024db937c48f195cbbc08ef7462e9bdd31f2499eaf671f685600f5b3b7258c055dad3d76fca35a99d33621fcc98dd2b335a36fefadbae23c36b7a3b70f96f52c2c3079c16667b4b115afe0a3732cd86fd03f867b45c93960b736c72b4f75aaae80ef51239aff366d13780ecb075251a502ab6594594c8e3c185adfe25c1cc00e3ff4d16e9c13032165c931567f84cd3d4fa774c542b83a469031776764510ba534a5b9f40335fdd70f72"]) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) bind(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x1, 0x3, 0x4, 0x4}}, 0x7f) [ 292.415239] ? blk_mq_queue_tag_busy_iter+0x72b/0xeb0 [ 292.420457] ? print_usage_bug+0xc0/0xc0 [ 292.424525] ? blk_mq_stop_hw_queues+0x140/0x140 [ 292.429309] ? __lock_acquire+0x62f/0x4c20 [ 292.433605] ? blk_mq_put_tag+0x170/0x170 [ 292.437774] __should_failslab+0x124/0x180 [ 292.442019] ? mempool_free+0x370/0x370 [ 292.446007] should_failslab+0x9/0x14 [ 292.449823] kmem_cache_alloc+0x47/0x730 [ 292.453897] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 292.459224] ? mempool_free+0x370/0x370 [ 292.463258] mempool_alloc_slab+0x44/0x60 [ 292.467454] mempool_alloc+0x193/0x4a0 [ 292.471377] ? mempool_destroy+0x30/0x30 [ 292.475476] ? graph_lock+0x270/0x270 [ 292.479306] ? part_in_flight+0xe4/0x5b0 [ 292.483395] ? __lock_is_held+0xb5/0x140 [ 292.487473] ? part_dec_in_flight+0x130/0x130 [ 292.491991] bio_alloc_bioset+0x3a8/0x700 [ 292.496155] ? bvec_alloc+0x2d0/0x2d0 [ 292.499991] bio_clone_fast+0x26/0x110 [ 292.500012] bio_split+0x86/0x260 [ 292.500031] blk_queue_split+0xa0d/0x2060 [ 292.500046] ? blk_queue_bounce+0x126/0x28b3 [ 292.500071] ? blk_rq_map_sg+0x1ac0/0x1ac0 [ 292.507400] ? blk_account_io_done+0xb00/0xb00 [ 292.507421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.507438] ? check_preemption_disabled+0x48/0x280 [ 292.507465] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.507482] ? rcu_pm_notify+0xc0/0xc0 [ 292.507513] blk_mq_make_request+0x35a/0x24c0 [ 292.507542] ? blk_mq_try_issue_directly+0x1f0/0x1f0 [ 292.554448] ? find_held_lock+0x36/0x1c0 [ 292.557500] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 292.558540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.558558] ? check_preemption_disabled+0x48/0x280 [ 292.558584] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.558603] ? rcu_pm_notify+0xc0/0xc0 [ 292.558633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.558651] ? generic_make_request_checks+0x65b/0x2660 [ 292.558674] ? __save_stack_trace+0x8d/0xf0 [ 292.558696] ? trace_event_raw_event_block_rq_requeue+0x6f0/0x6f0 [ 292.605868] ? save_stack+0xa9/0xd0 [ 292.609497] ? save_stack+0x43/0xd0 [ 292.613132] ? kasan_slab_alloc+0x12/0x20 [ 292.617276] ? kmem_cache_alloc+0x12e/0x730 [ 292.621623] ? mempool_alloc_slab+0x44/0x60 [ 292.625956] ? mempool_alloc+0x193/0x4a0 [ 292.630031] ? bio_alloc_bioset+0x47a/0x700 [ 292.634365] ? get_user_pages_fast+0x22b/0x450 [ 292.638957] ? get_user_pages_fast+0x22b/0x450 [ 292.643555] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 292.648126] ? trace_hardirqs_on+0xbd/0x310 [ 292.652470] ? iov_iter_get_pages+0x2fa/0x12a0 [ 292.657055] ? trace_hardirqs_off_caller+0x300/0x300 [ 292.662162] ? cache_grow_end+0xa8/0x190 [ 292.666226] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 292.671239] ? get_user_pages_fast+0x2a9/0x450 [ 292.675857] ? __get_user_pages_fast+0x3f0/0x3f0 [ 292.680626] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.686165] generic_make_request+0x9ab/0x1890 [ 292.690766] ? blk_queue_enter+0x1200/0x1200 [ 292.695189] ? csum_and_copy_from_iter+0x14f0/0x14f0 [ 292.700302] ? mempool_alloc_slab+0x44/0x60 [ 292.704615] ? mempool_alloc_slab+0x44/0x60 [ 292.708963] ? mempool_alloc+0x1a0/0x4a0 [ 292.713025] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 292.718039] ? iov_iter_advance+0x306/0x13f0 [ 292.722507] ? mempool_destroy+0x30/0x30 [ 292.726574] ? kasan_check_write+0x14/0x20 [ 292.730834] ? bio_init+0x13c/0x270 [ 292.734478] ? _copy_to_iter_mcsafe+0x1680/0x1680 [ 292.739347] ? bio_add_page+0xf9/0x130 [ 292.743256] submit_bio+0xba/0x460 [ 292.746818] ? submit_bio+0xba/0x460 [ 292.750535] ? generic_make_request+0x1890/0x1890 [ 292.755381] ? iov_iter_for_each_range+0xc90/0xc90 [ 292.760334] ? find_held_lock+0x36/0x1c0 [ 292.764402] blkdev_direct_IO+0x75b/0x1180 [ 292.768623] ? aio_complete+0xc20/0xc20 [ 292.772588] ? check_memory_region+0xe1/0x1b0 [ 292.777072] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 292.782334] ? generic_update_time+0x26a/0x450 [ 292.786912] ? may_umount_tree+0x210/0x210 [ 292.791142] ? filemap_range_has_page+0x223/0x4e0 [ 292.795984] ? unaccount_page_cache_page+0x1450/0x1450 [ 292.801254] ? __mnt_drop_write_file+0x31/0x40 [ 292.805851] ? current_time+0x1b0/0x1b0 [ 292.809823] generic_file_direct_write+0x275/0x4b0 [ 292.814758] __generic_file_write_iter+0x2ff/0x630 [ 292.819683] blkdev_write_iter+0x23d/0x450 [ 292.823918] ? blkdev_close+0xb0/0xb0 [ 292.827721] ? apparmor_file_permission+0x24/0x30 [ 292.832561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.838106] ? security_file_permission+0x1c2/0x220 [ 292.843140] aio_write+0x3b1/0x610 [ 292.846713] ? aio_complete_rw+0x640/0x640 [ 292.851153] ? lock_downgrade+0x900/0x900 [ 292.855300] ? kasan_check_read+0x11/0x20 [ 292.859438] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 292.864727] io_submit_one+0xaa1/0xf80 [ 292.868617] ? aio_poll+0x1420/0x1420 [ 292.872425] ? __might_fault+0x12b/0x1e0 [ 292.876479] ? lock_downgrade+0x900/0x900 [ 292.880614] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.886118] ? blk_lld_busy+0xa0/0xa0 [ 292.889935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.895488] __x64_sys_io_submit+0x1ab/0x580 [ 292.899890] ? __ia32_sys_io_destroy+0x580/0x580 [ 292.904674] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 292.909256] ? __ia32_sys_read+0xb0/0xb0 [ 292.913324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.918686] ? trace_hardirqs_off_caller+0x300/0x300 [ 292.923794] do_syscall_64+0x1b9/0x820 [ 292.927695] ? __ia32_sys_io_destroy+0x580/0x580 [ 292.932463] ? do_syscall_64+0x1b9/0x820 [ 292.936522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.941871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.946783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.951631] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.956680] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.961688] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.966739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.971588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.976762] RIP: 0033:0x457569 [ 292.979941] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.998838] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 293.006550] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 293.013820] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 02:05:53 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 293.021075] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 293.028339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 293.035606] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 [ 293.161966] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:53 executing program 4 (fault-call:2 fault-nth:7): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:53 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000140)='./bus\x00', 0xa0240, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r1], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 293.257562] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 293.299990] FAULT_INJECTION: forcing a failure. [ 293.299990] name failslab, interval 1, probability 0, space 0, times 0 02:05:53 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000002780)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000011000100000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000008002e0000000004faedd5399ab60600"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 293.365077] CPU: 0 PID: 10413 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 293.373685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.383035] Call Trace: [ 293.385634] dump_stack+0x244/0x39d [ 293.389307] ? dump_stack_print_info.cold.1+0x20/0x20 [ 293.394528] ? mark_held_locks+0x130/0x130 [ 293.398782] should_fail.cold.4+0xa/0x17 [ 293.402859] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.407969] ? percpu_counter_add_batch+0x141/0x190 [ 293.413005] ? print_usage_bug+0xc0/0xc0 [ 293.417083] ? trace_event_raw_event_block_rq_requeue+0x6f0/0x6f0 [ 293.423355] ? blkdev_write_iter+0x23d/0x450 [ 293.427779] ? mark_held_locks+0x130/0x130 [ 293.432018] ? __lock_acquire+0x62f/0x4c20 [ 293.436300] ? __lock_acquire+0x62f/0x4c20 [ 293.440540] ? find_next_zero_bit+0x111/0x140 [ 293.445053] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.450591] ? __sbitmap_get_word+0xed/0x100 [ 293.455041] __should_failslab+0x124/0x180 [ 293.459295] ? mempool_free+0x370/0x370 [ 293.463280] should_failslab+0x9/0x14 [ 293.467092] kmem_cache_alloc+0x47/0x730 [ 293.471156] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 293.476454] ? mempool_free+0x370/0x370 [ 293.480448] mempool_alloc_slab+0x44/0x60 [ 293.484600] mempool_alloc+0x193/0x4a0 [ 293.488488] ? graph_lock+0x270/0x270 [ 293.492319] ? mempool_destroy+0x30/0x30 [ 293.496405] ? graph_lock+0x270/0x270 [ 293.500206] ? __lock_is_held+0xb5/0x140 [ 293.504324] bio_alloc_bioset+0x3a8/0x700 [ 293.508496] ? bvec_alloc+0x2d0/0x2d0 [ 293.512332] bio_clone_fast+0x26/0x110 [ 293.516222] bio_split+0x86/0x260 [ 293.519678] blk_queue_split+0xa0d/0x2060 [ 293.523916] ? blk_queue_bounce+0x126/0x28b3 [ 293.528342] ? blk_rq_map_sg+0x1ac0/0x1ac0 [ 293.532613] ? blk_account_io_done+0xb00/0xb00 [ 293.537213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.542751] ? check_preemption_disabled+0x48/0x280 [ 293.547785] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 293.552977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.558519] ? bio_phys_segments+0x5c/0xc0 [ 293.562754] ? blk_rq_bio_prep+0x26f/0x360 [ 293.567000] blk_mq_make_request+0x35a/0x24c0 [ 293.571506] ? blk_mq_try_issue_directly+0x1f0/0x1f0 [ 293.576622] ? find_held_lock+0x36/0x1c0 [ 293.580698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.586240] ? check_preemption_disabled+0x48/0x280 [ 293.591316] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 293.596857] ? rcu_pm_notify+0xc0/0xc0 [ 293.600794] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.606345] ? generic_make_request_checks+0x65b/0x2660 [ 293.611718] ? trace_event_raw_event_block_rq_requeue+0x6f0/0x6f0 [ 293.617947] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 293.622566] ? trace_hardirqs_on+0xbd/0x310 [ 293.626888] ? kasan_check_read+0x11/0x20 [ 293.631036] ? finish_task_switch+0x1f4/0x920 [ 293.635533] ? trace_hardirqs_off_caller+0x300/0x300 [ 293.640703] ? compat_start_thread+0x80/0x80 [ 293.645132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.650679] ? finish_task_switch+0x2f4/0x920 [ 293.655179] ? __switch_to_asm+0x40/0x70 [ 293.659245] ? preempt_notifier_register+0x200/0x200 [ 293.664362] ? __switch_to_asm+0x34/0x70 [ 293.668428] ? __switch_to_asm+0x40/0x70 [ 293.672505] ? __switch_to_asm+0x34/0x70 [ 293.676566] ? __switch_to_asm+0x40/0x70 [ 293.680628] ? __switch_to_asm+0x34/0x70 [ 293.684693] ? __switch_to_asm+0x40/0x70 [ 293.688791] ? __switch_to_asm+0x34/0x70 [ 293.692856] ? __switch_to_asm+0x34/0x70 [ 293.696918] ? __switch_to_asm+0x40/0x70 [ 293.700996] ? __switch_to_asm+0x34/0x70 [ 293.705061] ? __switch_to_asm+0x40/0x70 [ 293.709148] ? __switch_to_asm+0x40/0x70 [ 293.713230] ? __schedule+0x8d7/0x21d0 [ 293.717130] ? __get_user_pages_fast+0x3f0/0x3f0 [ 293.722388] ? __sched_text_start+0x8/0x8 [ 293.726560] generic_make_request+0x9ab/0x1890 [ 293.731164] ? blk_queue_enter+0x1200/0x1200 [ 293.735601] ? retint_kernel+0x2d/0x2d [ 293.739493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 293.744247] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 293.749711] ? trace_hardirqs_on+0x310/0x310 [ 293.754124] ? mempool_alloc_slab+0x44/0x60 [ 293.758454] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 293.763472] ? iov_iter_advance+0x306/0x13f0 [ 293.767894] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 293.772692] ? _copy_to_iter_mcsafe+0x1680/0x1680 [ 293.777540] ? bio_add_page+0xf9/0x130 [ 293.781481] submit_bio+0xba/0x460 [ 293.785022] ? submit_bio+0xba/0x460 [ 293.788768] ? generic_make_request+0x1890/0x1890 [ 293.793614] ? iov_iter_for_each_range+0xc90/0xc90 [ 293.798551] ? find_held_lock+0x36/0x1c0 [ 293.802627] blkdev_direct_IO+0x75b/0x1180 [ 293.806872] ? aio_complete+0xc20/0xc20 [ 293.810855] ? check_memory_region+0xe1/0x1b0 [ 293.815375] ? __blkdev_direct_IO_simple+0x1130/0x1130 [ 293.820651] ? generic_update_time+0x26a/0x450 [ 293.825231] ? may_umount_tree+0x210/0x210 [ 293.829484] ? filemap_range_has_page+0x223/0x4e0 [ 293.834334] ? unaccount_page_cache_page+0x1450/0x1450 [ 293.839611] ? __mnt_drop_write_file+0x31/0x40 [ 293.844213] ? current_time+0x1b0/0x1b0 [ 293.848197] generic_file_direct_write+0x275/0x4b0 [ 293.853156] __generic_file_write_iter+0x2ff/0x630 [ 293.858090] blkdev_write_iter+0x23d/0x450 [ 293.862332] ? blkdev_close+0xb0/0xb0 [ 293.866154] ? apparmor_file_permission+0x24/0x30 [ 293.870998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.876538] ? security_file_permission+0x1c2/0x220 [ 293.881567] aio_write+0x3b1/0x610 [ 293.885115] ? aio_complete_rw+0x640/0x640 [ 293.889420] ? lock_downgrade+0x900/0x900 [ 293.893597] ? kasan_check_read+0x11/0x20 [ 293.897742] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 293.903034] io_submit_one+0xaa1/0xf80 [ 293.906927] ? aio_poll+0x1420/0x1420 [ 293.910732] ? __might_fault+0x12b/0x1e0 [ 293.914801] ? lock_downgrade+0x900/0x900 [ 293.918955] ? perf_trace_sched_process_exec+0x860/0x860 [ 293.924408] ? blk_lld_busy+0xa0/0xa0 [ 293.928209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.933781] __x64_sys_io_submit+0x1ab/0x580 [ 293.938195] ? __ia32_sys_io_destroy+0x580/0x580 [ 293.942966] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 293.947550] ? __ia32_sys_read+0xb0/0xb0 [ 293.951617] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.957000] ? trace_hardirqs_off_caller+0x300/0x300 [ 293.962136] do_syscall_64+0x1b9/0x820 [ 293.966025] ? __ia32_sys_io_destroy+0x580/0x580 [ 293.970809] ? do_syscall_64+0x1b9/0x820 [ 293.974873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.980244] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.985182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.990027] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.995044] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.000067] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.005087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.009935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.015119] RIP: 0033:0x457569 [ 294.018314] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.037217] RSP: 002b:00007f29628b6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 294.044967] RAX: ffffffffffffffda RBX: 00007f29628b6c90 RCX: 0000000000457569 [ 294.052232] RDX: 0000000020001540 RSI: 0000000000000111 RDI: 00007f2962880000 [ 294.059507] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 02:05:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:54 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 294.066807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29628b76d4 [ 294.074073] R13: 00000000004be7ed R14: 00000000004ced68 R15: 0000000000000004 02:05:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x200, 0x0) sendmsg$unix(r1, &(0x7f0000000a00)={&(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000580)="0392538bb318cf98c53b3e6fc6e625d51390520d66aef481dadcab9c463bfcbb8ed06eddafbac798a2f2249abeb0eda284b6cd593e92d7b8afa253f7e40c3ddb996f5b0f8c43123a9b3a788f39c0e3f32e917bf50399dac7c2ce41cc7643d538f25c7fdf2d1996ecf496bb5c66390171aea7cf12cf3d761911e1a8423bb0aa669ab537c372e13a2a15d2f68a14db6ffb7557ea5de4d1c188aad0b736efa5d8ea7028f44542102f7eba18d8c5e68d2ae66a04c930d36eedd22c1bbb6d6def1d8ae0458f5fa685f28b80257ec31e63fb08ccbc8af76dbd839a59b1d7be279c57d33e603174e7449c0c08ac15595a666e666d1e", 0xf2}, {&(0x7f0000000680)="e59c198bfef4176f6308d139d70c99add54c3db322b8d259ae8b1e60a0a556ad18e200", 0x23}, {&(0x7f00000006c0)="0bac158d9a9a55498c54f6df6be93f2eb7417ae1b5af91056bb5bf2c465af64fb7b7a49e56d6559d32accddd96259c51da307ea7b9f05bfcd0ac0194cab27c0c60126f37321f6604294a4a23daaa0e4245064711391642e8b407eee3de5712789dd7d21c80132489eaffbadd20ce95374974841b8c05dda03f3c275d552c4459c2c0ad494a358d2e688a19133004f9cdb01c03cca084ccef3fc8b33b02e56c3244797c1f1c886a1a670d09f6ec493bf09ee03f1f804261f4a0d680eca4b82a", 0xbf}, {&(0x7f0000000780)="60a28d631044a0f867700d23f4c34aa5c86ed160633aeba3704bfdbe418c45d6025a685443574cf1d415ed4825b7ae918955a0a6b6425bd4959e7c268114f09de8bae141a45c4c2967cf1facd5fb8c23fad8a802d5ddd6f298d43c0c98ea143655c46567b447d88fc07f24e921bfb01523491d16e2c659240a9ea33237e7c0717d70ab4b43e7b0e87b9a5906f0ebd34738444ac371736ad83fccfdb656aa89810202a0098420986ece8686d07bad374ec474a036e17ec87dd7738cc2218c1c56b25fb5fc60ec2d834f62f890a4d39282a4a178dbb183320164e1d6ff46c644f3f13bbffc04", 0xe5}, {&(0x7f0000000880)="5e9f2f98a1c9987e7aedcdc4587de9a4832208cef27e2c4f8ba6b9357925678111ab0177afb52a33545c18e44e6e2971b9f01adeda2bb2f07db2def955a87dfcd2ee0616970673d301e9c46d1d742abadfa742080393249d", 0x58}, {&(0x7f0000000900)="e63516e8e1c6201ea2a445335398f1869ecc9bca09ac0228d1849323297bce16093349c41a8fa4dce922f2447aa4bb328419ef6bbd", 0x35}], 0x6, &(0x7f00000009c0), 0x0, 0x20008000}, 0x1) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:ld_so_cache_t:s0\x00', 0x23, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r3}) dup3(r2, r3, 0x0) [ 294.141064] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 294.174915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 02:05:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="9500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f0000001940)={0x8, "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", 0xffffffffffffff6b}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f00000000c0)) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)) [ 294.421820] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x121c, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 294.500140] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 294.515331] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:05:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:54 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80, 0x0) r0 = timerfd_create(0x8, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x3, 0x1000, 0x8001, 0x7, 0x8}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x280) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x7, 0x4, 0x0, 0x1, 0x5, 0x527, 0x1, 0x7, 0x3, 0x1, 0x7ff, 0x20, 0x3, 0x5, 0x14, 0x3c}}) close(r0) 02:05:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 294.763000] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 294.847767] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/snapshot\x00', 0x90000, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x200001, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000480)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x210001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000400500001001000020020000000000000000000000000000700451007004000070040000700400007004000005000000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000472000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e415400000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000fe8000000000000000000000000000bb04004e21fe80000000000000000000000000000e0000000000000000000000000000000000000000ffffffffffffff00000000ff0000000000000000ffffffffffffff00763e7851555f746f5f6272696467650076657468315f746f5f7465616d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008900000024000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000002000000ffffffff000000000000000000000000e00000010000000000000000000000004e244e2400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000106000000ffffffff0000000000000000000000000000000000000000000000000000000101004e2200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f80040010000000000000000000000000000000000000000000000003000737268000000000000000000000000000000000000000000000000000000bf04040900000020d5da00000000000048004e45544d415000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbac14141e0000000000000000000000004e204e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x5a0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r4 = semget$private(0x0, 0x2, 0x544) semctl$GETZCNT(r4, 0x4, 0xf, &(0x7f0000000bc0)=""/168) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000200)={{0x1, 0x2, 0x8001, 0x5, 'syz0\x00', 0xfffffffffffffffb}, 0x5, 0x0, 0x1000000000, r6, 0x6, 0x6, 'syz1\x00', &(0x7f0000000100)=['*em0:\x00', '*{\x00', 'selinuxvmnet1^[ppp0vboxnet0eth1\x00', 'wlan1\x00', '\\posix_acl_access,]\x00', 'posix_acl_access&.\x00'], 0x56, [], [0x8, 0x80000000, 0x4c27, 0xbe]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000000c0)=""/33}, 0x18) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000b80)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r5, &(0x7f0000000380)="29fc74eb565f5df8ed", &(0x7f00000003c0)=""/43}, 0x18) 02:05:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:55 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x121d, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/snapshot\x00', 0x90000, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x200001, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000480)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x210001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000400500001001000020020000000000000000000000000000700451007004000070040000700400007004000005000000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000472000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e415400000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000fe8000000000000000000000000000bb04004e21fe80000000000000000000000000000e0000000000000000000000000000000000000000ffffffffffffff00000000ff0000000000000000ffffffffffffff00763e7851555f746f5f6272696467650076657468315f746f5f7465616d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008900000024000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000002000000ffffffff000000000000000000000000e00000010000000000000000000000004e244e2400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000106000000ffffffff0000000000000000000000000000000000000000000000000000000101004e2200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f80040010000000000000000000000000000000000000000000000003000737268000000000000000000000000000000000000000000000000000000bf04040900000020d5da00000000000048004e45544d415000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbac14141e0000000000000000000000004e204e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x5a0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r4 = semget$private(0x0, 0x2, 0x544) semctl$GETZCNT(r4, 0x4, 0xf, &(0x7f0000000bc0)=""/168) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000200)={{0x1, 0x2, 0x8001, 0x5, 'syz0\x00', 0xfffffffffffffffb}, 0x5, 0x0, 0x1000000000, r6, 0x6, 0x6, 'syz1\x00', &(0x7f0000000100)=['*em0:\x00', '*{\x00', 'selinuxvmnet1^[ppp0vboxnet0eth1\x00', 'wlan1\x00', '\\posix_acl_access,]\x00', 'posix_acl_access&.\x00'], 0x56, [], [0x8, 0x80000000, 0x4c27, 0xbe]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000000c0)=""/33}, 0x18) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000b80)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r5, &(0x7f0000000380)="29fc74eb565f5df8ed", &(0x7f00000003c0)=""/43}, 0x18) [ 295.179157] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 295.278852] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/snapshot\x00', 0x90000, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x200001, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000480)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x210001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000400500001001000020020000000000000000000000000000700451007004000070040000700400007004000005000000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000472000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e415400000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000fe8000000000000000000000000000bb04004e21fe80000000000000000000000000000e0000000000000000000000000000000000000000ffffffffffffff00000000ff0000000000000000ffffffffffffff00763e7851555f746f5f6272696467650076657468315f746f5f7465616d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008900000024000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000002000000ffffffff000000000000000000000000e00000010000000000000000000000004e244e2400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000106000000ffffffff0000000000000000000000000000000000000000000000000000000101004e2200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f80040010000000000000000000000000000000000000000000000003000737268000000000000000000000000000000000000000000000000000000bf04040900000020d5da00000000000048004e45544d415000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbac14141e0000000000000000000000004e204e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x5a0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r4 = semget$private(0x0, 0x2, 0x544) semctl$GETZCNT(r4, 0x4, 0xf, &(0x7f0000000bc0)=""/168) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000200)={{0x1, 0x2, 0x8001, 0x5, 'syz0\x00', 0xfffffffffffffffb}, 0x5, 0x0, 0x1000000000, r6, 0x6, 0x6, 'syz1\x00', &(0x7f0000000100)=['*em0:\x00', '*{\x00', 'selinuxvmnet1^[ppp0vboxnet0eth1\x00', 'wlan1\x00', '\\posix_acl_access,]\x00', 'posix_acl_access&.\x00'], 0x56, [], [0x8, 0x80000000, 0x4c27, 0xbe]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000000c0)=""/33}, 0x18) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000b80)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r5, &(0x7f0000000380)="29fc74eb565f5df8ed", &(0x7f00000003c0)=""/43}, 0x18) 02:05:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:55 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 295.557185] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 295.625623] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) 02:05:55 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1204, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:55 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:55 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'tunl0\x00', 0x0}) sendto$packet(r0, &(0x7f00000000c0)="b03f2bc6a87c8465427d00f30b12290dc7aa7eb5dc4df3f6deb32f0c2915aba94758a01feed55d16b50e3c881dd23664ec15b4fa73baab1e83b51e5aff4f623616a9448b91fc7bd4d5212f1a94f35394f9dfecd5a5d82ee9a3c802b26b3ad18cd7941cc83664e7aa213580a53c892e820233470e44a2256571486015a5a3c22a24de4f7b2aa812e79152cc28eb78640c673053410bb447f40d70289d37", 0x9d, 0x0, &(0x7f00000004c0)={0x11, 0x4, r1, 0x1, 0x100, 0x6, @dev={[], 0x1c}}, 0x14) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0a5c2d023c126285718070") socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xb) open_by_handle_at(r2, &(0x7f00000001c0)={0x55, 0x20000000001, "8510f1f1c3fd3a9efd668b31293dc39334f2c557c32527963ae146882d16758e44ab9cd1af61563c7dd7e5e06f3a5b2fbdf70a8fe9b7d4bc9381efedcae531583410601424fe72ae97be961ec8"}, 0x0) 02:05:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 295.858846] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = dup(r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000400)=@l2, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000000)=""/117, 0x75}, 0x7}], 0x1, 0x0, &(0x7f0000000cc0)) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x10}}], 0x2, 0x8000) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_buf(r2, 0x0, 0x4, &(0x7f0000000140)="5456f38505ff1b8dd44f67def0579693e9f9a42f6f20b8253cc24fd7d10da65df010d257349b3d513cc00e616d8348c544ff4c01dfdf9852db26192b49e0ecebbdc0565e2bb5c1f2e841dbef8a696a7e42a245b236ffae741b9acb59eeea2d7d9b7f6c72f4e5d828f2fa24fd4a172eb18e303175ef05834731718c658024f81b229794a2fb799e89861ad8e4c7da7f17194c246c4c7a0e96339f8a131a85a4e3e8e216ea8f6f4dbb5628dc0107b0b893b6b51ca95d300981983f95b09b37fb14abc088a971edc76a8f83e223057f0b207a2b11234a8b6de2629363476b0db650bd2307", 0xe3) r3 = fcntl$getown(r1, 0x9) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000240)=r3) [ 295.932846] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:56 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 296.199553] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:56 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1226, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:56 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 02:05:56 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:56 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x202000, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0x6, "e195b1cb6dcf86ecadd958961093a1c1b958e4ae4fa85cfca54173d4ecf4a045", 0x2, 0x1}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000080)={0x1000, "e90a89342f5e922eb59bd108ceb5434aade6ac035b77259ae9dd6fb00eb183fb", 0x1, 0x1}) flistxattr(r0, &(0x7f00000000c0)=""/179, 0xb3) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={r1, 0x5f, "548eb345887d22a4bc460b7313731d79325cfadc228c0250bd24564b57828804d36272f72fc7c304d5af106ff87d77dfb5351818f2ed2447cab146fea8c47ffdea660a438ddd73f76f9b1712fa47ea7eacb7af87247e649078fe76a170c56b"}, &(0x7f00000002c0)=0x67) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = accept4$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000380)=0x6e, 0x800) getsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r0, 0x0, 0xfb, 0x1000, &(0x7f0000000440)="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", &(0x7f0000000540)=""/4096, 0x81}, 0x28) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000001580)={0x0, @speck128, 0x2, "8ddc1c858f003f3f"}) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000015c0)={0x20, 0x0, 0x0, 0x80000000}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000001600)={0x7, r4, 0x10001, 0x4}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000001640)=0x800) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000001680)='/dev/dsp#\x00', 0x7fffffff, 0x381100) seccomp(0x0, 0x0, &(0x7f0000001700)={0x5, &(0x7f00000016c0)=[{0x9, 0x6, 0xfffffffffffffff9, 0xff}, {0x800, 0x80000001, 0xd6cc, 0x9}, {0x3f, 0xffff, 0xbc, 0xfffffffffffff000}, {0xfffffffffffffff9, 0x2, 0x2, 0xdf}, {0x8, 0xd81e, 0x3ff, 0x9}]}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xa) ioctl$EXT4_IOC_RESIZE_FS(r5, 0x40086610, &(0x7f0000001740)=0x40) ioctl$VHOST_SET_VRING_CALL(r5, 0x4008af21, &(0x7f0000001780)={0x2}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000017c0)={0x5, 0xf, 0x4, 0x4000040, {}, {0x2, 0x8, 0x4, 0x6, 0x2b5e, 0x100000000, "359f1bd0"}, 0x6, 0x7, @fd=r2, 0x4}) ioctl$KVM_GET_TSC_KHZ(r5, 0xaea3) open_by_handle_at(r5, &(0x7f0000001840)={0x6c, 0x5, "c35cb458a31b65b88522abaa06183ca421c12498521f1a1b5e4cbd7b8e567521390672e0d051bf6f4a5514cb87ef83ddbfd2f9e32a8a3e35de9e247865f379b59bbbceffb5483bbb911433ce6e952c1e4dc8602eab4055da4b40477a3e1fa283f7ef60f8"}, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) shutdown(r2, 0x1) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f00000018c0), &(0x7f0000001900)=0x10) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001940)='/dev/mixer\x00', 0x200, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000001980)={0x2, r6}) 02:05:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) [ 296.709243] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:05:56 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:56 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x18000, 0x880e}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, 0x0, 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_open_dev$dspn(0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000240)='-\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, 0x0) 02:05:57 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x120d, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x200000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @window, @sack_perm], 0x3) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000800)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x0, 0x90, [], 0x0, 0x0, &(0x7f0000000680)=[{}, {0x3}, {}]}, 0x108) [ 297.100906] kernel msg: ebtables bug: please report to author: entries_size too small 02:05:57 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 02:05:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:05:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:57 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1225, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:58 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1224, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:58 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 02:05:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:58 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:58 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1202, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:58 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:05:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:58 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x121a, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:59 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 02:05:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:05:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:59 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0xff00, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:05:59 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:05:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:05:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:00 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1223, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:00 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 02:06:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:00 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:00 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1219, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 300.216948] EXT4-fs: 15 callbacks suppressed [ 300.216959] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 300.345046] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:00 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x121b, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) [ 300.701117] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:01 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 02:06:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x2000, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:01 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) 02:06:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 301.083804] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 301.197480] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x121e, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x750e0000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 301.466627] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:02 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 02:06:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x2, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:02 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 301.943079] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 302.017397] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1228, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 302.473471] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 302.532692] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:02 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 02:06:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1210, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:03 executing program 5: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpriority(0x2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:03 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x100000, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:03 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 02:06:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:03 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1221, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1222, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:04 executing program 5: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpriority(0x2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1227, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1203, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:04 executing program 3: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpriority(0x2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x120f, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:05 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1208, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:05 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:05 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1217, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 305.228033] EXT4-fs: 14 callbacks suppressed [ 305.228043] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 305.309497] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:05 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1209, 0x800000000000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:05 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x80000007ffff000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 305.744500] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 305.804968] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:06 executing program 3: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpriority(0x2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x68, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:06 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x80000001e000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 306.087904] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 306.224321] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:06 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:06 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x80000000d000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 306.658448] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 306.719092] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000009, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 307.008019] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 307.070626] EXT4-fs (sda1): re-mounted. Opts: noquota, 02:06:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000002000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:07 executing program 3: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpriority(0x2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) 02:06:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2a00000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:07 executing program 5: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpriority(0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x92) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 02:06:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000000000d00, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 02:06:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0xfeffffff}}, 0x30) 02:06:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) 02:06:08 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x800000025000000, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 02:06:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 02:06:08 executing program 3: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0xffffffffffffffb0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpriority(0x2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92c}) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) shmctl$IPC_RMID(0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f}) 02:06:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, 0x0, 0x100024, &(0x7f0000000180)={[{@noquota='noquota'}]}) [ 308.413155] kasan: CONFIG_KASAN_INLINE enabled 02:06:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfeffffff}}, 0x30) [ 308.434243] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 308.455245] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 308.461523] CPU: 0 PID: 11303 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 308.470103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.479569] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3810 [ 308.484773] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 dc 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 82 [ 308.503682] RSP: 0018:ffff8801ae33f4b8 EFLAGS: 00010247 [ 308.509047] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009dfd000 [ 308.516312] RDX: 0000000000000000 RSI: ffffffff828b12d3 RDI: 0000000000000004 [ 308.523582] RBP: ffff8801ae33fa50 R08: ffff8801b8642200 R09: ffffed00363caa82 [ 308.530851] R10: ffffed00363caa82 R11: ffff8801b1e55413 R12: 0000000000000000 [ 308.538115] R13: ffff8801b1e553f0 R14: 0000000000000000 R15: 0000000000000030 [ 308.545385] FS: 00007f7e3874f700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 308.553607] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 308.559488] CR2: 00007ffd224fa488 CR3: 00000001ba198000 CR4: 00000000001406f0 [ 308.566772] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 308.574039] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 308.581304] Call Trace: [ 308.583893] ? __lock_acquire+0x62f/0x4c20 [ 308.588133] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 308.593247] ? fuse_dev_read+0x250/0x250 [ 308.597322] ? mark_held_locks+0x130/0x130 [ 308.601563] ? mark_held_locks+0x130/0x130 [ 308.605929] ? futex_wake+0x613/0x760 [ 308.609736] ? lock_downgrade+0x900/0x900 [ 308.613892] ? kasan_check_read+0x11/0x20 [ 308.618041] ? print_usage_bug+0xc0/0xc0 [ 308.622101] ? do_raw_spin_trylock+0x270/0x270 [ 308.626683] ? print_usage_bug+0xc0/0xc0 [ 308.630760] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 308.635970] ? graph_lock+0x270/0x270 [ 308.639783] ? futex_wake+0x304/0x760 [ 308.643590] ? graph_lock+0x270/0x270 [ 308.647396] ? find_held_lock+0x36/0x1c0 [ 308.651466] ? aa_file_perm+0x469/0x1060 [ 308.655531] ? lock_downgrade+0x900/0x900 [ 308.659682] ? check_preemption_disabled+0x48/0x280 [ 308.664704] ? kasan_check_read+0x11/0x20 [ 308.668854] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.674129] ? rcu_read_unlock_special+0x370/0x370 [ 308.679098] ? aa_file_perm+0x490/0x1060 [ 308.683167] ? memset+0x31/0x40 [ 308.686454] fuse_dev_write+0x19a/0x240 [ 308.690431] ? fuse_dev_splice_write+0xe70/0xe70 [ 308.695189] ? __save_stack_trace+0x8d/0xf0 [ 308.699520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.705060] ? iov_iter_init+0xe5/0x210 [ 308.709057] __vfs_write+0x6b8/0x9f0 [ 308.712777] ? kernel_read+0x120/0x120 [ 308.716669] ? apparmor_path_rmdir+0x30/0x30 [ 308.721078] ? trace_hardirqs_off_caller+0x300/0x300 [ 308.726196] ? apparmor_file_permission+0x24/0x30 [ 308.731046] ? rw_verify_area+0x118/0x360 [ 308.735198] vfs_write+0x1fc/0x560 [ 308.738746] ksys_write+0x101/0x260 [ 308.742379] ? __ia32_sys_read+0xb0/0xb0 [ 308.746443] ? trace_hardirqs_off_caller+0x300/0x300 [ 308.751567] __x64_sys_write+0x73/0xb0 [ 308.755458] do_syscall_64+0x1b9/0x820 [ 308.759350] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.764718] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.769652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.774512] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.779542] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.784558] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.789579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.794428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.799617] RIP: 0033:0x457569 [ 308.802813] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.821711] RSP: 002b:00007f7e3874ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 308.829417] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 308.836683] RDX: 0000000000000030 RSI: 0000000020000080 RDI: 0000000000000003 [ 308.843952] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 308.851408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e3874f6d4 [ 308.858674] R13: 00000000004c587b R14: 00000000004d9970 R15: 00000000ffffffff [ 308.865947] Modules linked in: [ 308.878817] ---[ end trace e376da27cc860508 ]--- [ 308.883611] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3810 [ 308.890914] kobject: 'loop1' (00000000e5bf4688): kobject_uevent_env [ 308.897659] kobject: '0:45' (0000000080e70937): kobject_uevent_env [ 308.901216] kobject: 'loop1' (00000000e5bf4688): fill_kobj_path: path = '/devices/virtual/block/loop1' 02:06:09 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x1200, 0x8000000000003fc, 0xf000000000001d, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 308.928926] kobject: '0:45' (0000000080e70937): fill_kobj_path: path = '/devices/virtual/bdi/0:45' [ 308.929336] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 dc 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 82 [ 308.938171] kobject: '0:45' (0000000080e70937): kobject_cleanup, parent (null) [ 308.977810] kobject: 'loop1' (00000000e5bf4688): kobject_uevent_env [ 308.988433] kobject: 'loop1' (00000000e5bf4688): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.018726] kobject: 'loop4' (0000000085a26405): kobject_uevent_env [ 309.025219] kobject: 'loop4' (0000000085a26405): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 309.034335] kobject: '0:45' (0000000080e70937): calling ktype release [ 309.042347] RSP: 0018:ffff8801ae33f4b8 EFLAGS: 00010247 [ 309.051074] kobject: '0:45': free name [ 309.053945] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009dfd000 [ 309.080966] RDX: 0000000000000000 RSI: ffffffff828b12d3 RDI: 0000000000000004 [ 309.089224] kobject: 'loop1' (00000000e5bf4688): kobject_uevent_env [ 309.095741] kobject: 'loop1' (00000000e5bf4688): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.125922] kobject: 'loop0' (000000009678caca): kobject_uevent_env [ 309.138531] RBP: ffff8801ae33fa50 R08: ffff8801b8642200 R09: ffffed00363caa82 [ 309.158036] kobject: 'loop0' (000000009678caca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 309.159089] kobject: '0:45' (0000000009f91b89): kobject_add_internal: parent: 'bdi', set: 'devices' [ 309.182594] kobject: 'nullb0' (0000000060cf3ef7): kobject_uevent_env [ 309.197437] R10: ffffed00363caa82 R11: ffff8801b1e55413 R12: 0000000000000000 [ 309.204935] kobject: 'nullb0' (0000000060cf3ef7): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 309.207948] kobject: '0:45' (0000000009f91b89): kobject_uevent_env [ 309.217226] R13: ffff8801b1e553f0 R14: 0000000000000000 R15: 0000000000000030 [ 309.246054] kobject: '0:45' (0000000009f91b89): fill_kobj_path: path = '/devices/virtual/bdi/0:45' [ 309.248582] FS: 00007f7e3874f700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 309.267135] kobject: 'loop1' (00000000e5bf4688): kobject_uevent_env [ 309.274995] kobject: 'loop1' (00000000e5bf4688): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.298518] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 309.304841] CR2: 00007fb788ef3e70 CR3: 00000001ba198000 CR4: 00000000001406f0 [ 309.320406] kobject: 'loop3' (00000000e55f1de1): kobject_uevent_env [ 309.321691] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 309.326871] kobject: 'loop3' (00000000e55f1de1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 309.345159] kobject: 'loop4' (0000000085a26405): kobject_uevent_env [ 309.347716] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 309.351652] kobject: 'loop4' (0000000085a26405): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 309.359381] Kernel panic - not syncing: Fatal exception [ 309.374817] Kernel Offset: disabled [ 309.378439] Rebooting in 86400 seconds..